Chapter 3. User Accounts

Here’s a short pop quiz. If it weren’t for users, system administration would be:

  1. More pleasant

  2. Nonexistent

Despite the comments you may hear from system administrators on their most beleaguered days, 2 is the best answer to this question. As I mentioned in the first chapter, ultimately system administration is about making it possible for people to use the available technology.

Why all the grumbling, then? Users introduce two things that make the systems and networks we administer significantly more complex: nondeterminism and individuality. We’ll address the nondeterminism issues when we discuss user activity in the next chapter; for now, let’s focus on individuality.

In most cases, users want to retain their own separate identities. Not only do they want unique names, but they want unique “stuff” too. They want to be able to say, “These are my files. I keep them in my directories. I print them with my print quota. I make them available from my web page.” Modern operating systems keep an account of all of these details for each user.

But who keeps track of all of the accounts on a system or network of systems? Who is ultimately responsible for creating, protecting, and disposing with these little shells for individuals? I’d hazard a guess and say “You, dear reader”—or if not you personally, the tools you’ll build to act as your proxy. This chapter is designed to help you with that responsibility.

Let’s begin our discussion of users by addressing some of the pieces ...

Get Automating System Administration with Perl, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.