3 .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author]
4 .\" Generator: DocBook XSL Stylesheets v1.75.2 <http://docbook.sf.net/>
6 .\" Manual: Polecenia użytkownik\('ow
7 .\" Source: Polecenia użytkownik\('ow
10 .TH "GPASSWD" "1" "02/16/2011" "Polecenia użytkownik\('ow" "Polecenia użytkownik\('ow"
11 .\" -----------------------------------------------------------------
12 .\" * Define some portability stuff
13 .\" -----------------------------------------------------------------
14 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
15 .\" http://bugs.debian.org/507673
16 .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html
17 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
20 .\" -----------------------------------------------------------------
21 .\" * set default formatting
22 .\" -----------------------------------------------------------------
23 .\" disable hyphenation
25 .\" disable justification (adjust text to left margin only)
27 .\" -----------------------------------------------------------------
28 .\" * MAIN CONTENT STARTS HERE *
29 .\" -----------------------------------------------------------------
31 gpasswd \- administer /etc/group and /etc/gshadow
33 .HP \w'\fBgpasswd\fR\ 'u
34 \fBgpasswd\fR [\fIoption\fR] \fIgroup\fR
39 command is used to administer
40 /etc/group, and /etc/gshadow\&. Every group can have
42 members and a password\&.
44 System administrators can use the
46 option to define group administrator(s) and the
48 option to define members\&. They have all rights of group administrators and members\&.
54 with a group name only prompts for the new password of the
57 If a password is set the members can still use
59 without a password, and non\-members must supply the password\&.
60 .SS "Notes about group passwords"
62 Group passwords are an inherent security problem since more than one person is permitted to know the password\&. However, groups are a useful tool for permitting co\-operation between different users\&.
69 options, the options cannot be combined\&.
71 The options which apply to the
75 \fB\-a\fR, \fB\-\-add\fR \fIuser\fR
83 \fB\-d\fR, \fB\-\-delete\fR \fIuser\fR
91 \fB\-r\fR, \fB\-\-remove\-password\fR
93 Remove the password from the named
94 \fIgroup\fR\&. Only group members will be allowed to use
100 \fB\-R\fR, \fB\-\-restrict\fR
102 Restrict the access to the named
103 \fIgroup\fR\&. Only group members will be allowed to use
109 \fB\-A\fR, \fB\-\-administrators\fR \fIuser\fR,\&.\&.\&.
111 Set the list of administrative users\&.
114 \fB\-M\fR, \fB\-\-members\fR \fIuser\fR,\&.\&.\&.
116 Set the list of group members\&.
120 This tool only operates on the
122 and /etc/gshadow files\&.
123 Thus you cannot change any NIS or LDAP group\&. This must be performed on the corresponding server\&.
126 The following configuration variables in
128 change the behavior of this tool:
130 \fBENCRYPT_METHOD\fR (string)
132 This defines the system default encryption algorithm for encrypting passwords (if no algorithm are specified on the command line)\&.
134 It can take one of these values:
181 Note: this parameter overrides the
186 \fBMAX_MEMBERS_PER_GROUP\fR (number)
188 Maximum members per group entry\&. When the maximum is reached, a new group entry (line) is started in
190 (with the same name, same password, and same GID)\&.
192 The default value is 0, meaning that there are no limits in the number of members in a group\&.
194 This feature (split group) permits to limit the length of lines in the group file\&. This is useful to make sure that lines for NIS groups are not larger than 1024 characters\&.
196 If you need to enforce such limit, you can use 25\&.
198 Note: split groups may not be supported by all tools (even in the Shadow toolsuite)\&. You should not use this variable unless you really need it\&.
201 \fBMD5_CRYPT_ENAB\fR (boolean)
203 Indicate if passwords must be encrypted using the MD5\-based algorithm\&. If set to
204 \fIyes\fR, new passwords will be encrypted using the MD5\-based algorithm compatible with the one used by recent releases of FreeBSD\&. It supports passwords of unlimited length and longer salt strings\&. Set to
206 if you need to copy encrypted passwords to other systems which don\*(Aqt understand the new algorithm\&. Default is
209 This variable is superceded by the
211 variable or by any command line option used to configure the encryption algorithm\&.
213 This variable is deprecated\&. You should use
214 \fBENCRYPT_METHOD\fR\&.
217 \fBSHA_CRYPT_MIN_ROUNDS\fR (number), \fBSHA_CRYPT_MAX_ROUNDS\fR (number)
224 \fISHA512\fR, this defines the number of SHA rounds used by the encryption algorithm by default (when the number of rounds is not specified on the command line)\&.
226 With a lot of rounds, it is more difficult to brute forcing the password\&. But note also that more CPU resources will be needed to authenticate users\&.
228 If not specified, the libc will choose the default number of rounds (5000)\&.
230 The values must be inside the 1000\-999999999 range\&.
233 \fBSHA_CRYPT_MIN_ROUNDS\fR
235 \fBSHA_CRYPT_MAX_ROUNDS\fR
236 values is set, then this value will be used\&.
239 \fBSHA_CRYPT_MIN_ROUNDS\fR
241 \fBSHA_CRYPT_MAX_ROUNDS\fR, the highest value will be used\&.
247 Informacje o grupach użytkownik\('ow\&.
252 Informacje chronione o grupach użytkownik\('ow\&.
262 \fBgroup\fR(5), \fBgshadow\fR(5)\&.