O'Reilly logo

Solaris™ Operating Environment Boot Camp by Dominic Butler, David Rhodes

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Assigning Shells to Users

A shell is assigned to a user when the user is first created by the system administrator (see Chapter 3, “User Administration”) and the full path of the user's shell is stored in the rightmost field of the password file.

When users log in to the system, the program defined in the shell field of their password file entry is executed. If the field contained /bin/ksh then that is the command that would run. Likewise, if the field contained /bin/who then that would run instead. In this case, it would display a list of who is currently logged in (which would include the users in question) and then exit back to the login prompt. This kind of entry is often used to enable specific functions to be performed by users who do not ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required