Shadow passwords

  • Enabling the use of shadow passwords can enhance local security by making encrypted passwords harder to steal.

  • The use of shadow passwords causes the removal of password information from the publicly readable passwd file and places it in shadow, readable only by root.

  • A similar system is implemented for shadow groups, using the gshadow file.

Get LPI Linux Certification in a Nutshell, 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.