3 .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author]
4 .\" Generator: DocBook XSL Stylesheets v1.75.1 <http://docbook.sf.net/>
6 .\" Manual: Polecenia użytkownik\('ow
7 .\" Source: Polecenia użytkownik\('ow
10 .TH "GPASSWD" "1" "07/24/2009" "Polecenia użytkownik\('ow" "Polecenia użytkownik\('ow"
11 .\" -----------------------------------------------------------------
12 .\" * set default formatting
13 .\" -----------------------------------------------------------------
14 .\" disable hyphenation
16 .\" disable justification (adjust text to left margin only)
18 .\" -----------------------------------------------------------------
19 .\" * MAIN CONTENT STARTS HERE *
20 .\" -----------------------------------------------------------------
22 gpasswd \- administer /etc/group and /etc/gshadow
24 .HP \w'\fBgpasswd\fR\ 'u
25 \fBgpasswd\fR [\fIoption\fR] \fIgroup\fR
30 command is used to administer
31 /etc/group, and /etc/gshadow\&. Every group can have
33 members and a password\&.
35 System administrators can use the
37 option to define group administrator(s) and the
39 option to define members\&. They have all rights of group administrators and members\&.
45 with a group name only prompts for the new password of the
48 If a password is set the members can still use
50 without a password, and non\-members must supply the password\&.
51 .SS "Notes about group passwords"
53 Group passwords are an inherent security problem since more than one person is permitted to know the password\&. However, groups are a useful tool for permitting co\-operation between different users\&.
60 options, the options cannot be combined\&.
62 The options which apply to the
66 \fB\-a\fR, \fB\-\-add\fR \fIuser\fR
74 \fB\-d\fR, \fB\-\-delete\fR \fIuser\fR
82 \fB\-r\fR, \fB\-\-remove\-password\fR
84 Remove the password from the named
85 \fIgroup\fR\&. Only group members will be allowed to use
91 \fB\-R\fR, \fB\-\-restrict\fR
93 Restrict the access to the named
94 \fIgroup\fR\&. Only group members will be allowed to use
100 \fB\-A\fR, \fB\-\-administrators\fR \fIuser\fR,\&.\&.\&.
102 Set the list of administrative users\&.
105 \fB\-M\fR, \fB\-\-members\fR \fIuser\fR,\&.\&.\&.
107 Set the list of group members\&.
111 This tool only operates on the
113 and /etc/gshadow files\&.
114 Thus you cannot change any NIS or LDAP group\&. This must be performed on the corresponding server\&.
117 The following configuration variables in
119 change the behavior of this tool:
121 \fBENCRYPT_METHOD\fR (string)
123 This defines the system default encryption algorithm for encrypting passwords (if no algorithm are specified on the command line)\&.
125 It can take one of these values:
173 Note: this parameter overrides the
178 \fBMAX_MEMBERS_PER_GROUP\fR (number)
180 Maximum members per group entry\&. When the maximum is reached, a new group entry (line) is started in
182 (with the same name, same password, and same GID)\&.
184 The default value is 0, meaning that there are no limits in the number of members in a group\&.
186 This feature (split group) permits to limit the length of lines in the group file\&. This is useful to make sure that lines for NIS groups are not larger than 1024 characters\&.
188 If you need to enforce such limit, you can use 25\&.
190 Note: split groups may not be supported by all tools (even in the Shadow toolsuite)\&. You should not use this variable unless you really need it\&.
193 \fBMD5_CRYPT_ENAB\fR (boolean)
195 Indicate if passwords must be encrypted using the MD5\-based algorithm\&. If set to
196 \fIyes\fR, new passwords will be encrypted using the MD5\-based algorithm compatible with the one used by recent releases of FreeBSD\&. It supports passwords of unlimited length and longer salt strings\&. Set to
198 if you need to copy encrypted passwords to other systems which don\'t understand the new algorithm\&. Default is
201 This variable is superceded by the
203 variable or by any command line option used to configure the encryption algorithm\&.
205 This variable is deprecated\&. You should use
206 \fBENCRYPT_METHOD\fR\&.
209 \fBSHA_CRYPT_MIN_ROUNDS\fR (number), \fBSHA_CRYPT_MAX_ROUNDS\fR (number)
216 \fISHA512\fR, this defines the number of SHA rounds used by the encryption algorithm by default (when the number of rounds is not specified on the command line)\&.
218 With a lot of rounds, it is more difficult to brute forcing the password\&. But note also that more CPU resources will be needed to authenticate users\&.
220 If not specified, the libc will choose the default number of rounds (5000)\&.
222 The values must be inside the 1000\-999999999 range\&.
225 \fBSHA_CRYPT_MIN_ROUNDS\fR
227 \fBSHA_CRYPT_MAX_ROUNDS\fR
228 values is set, then this value will be used\&.
231 \fBSHA_CRYPT_MIN_ROUNDS\fR
233 \fBSHA_CRYPT_MAX_ROUNDS\fR, the highest value will be used\&.
239 Informacje o grupach użytkownik\('ow\&.
244 Informacje chronione o grupach użytkownik\('ow\&.
254 \fBgroup\fR(5), \fBgshadow\fR(5)\&.