A user account is required for a user to log into any Linux system. An account typically includes identity information such as username, password, user id (UID), and group identifier (GIDs) so that the system can identify the user. An account will also include a set of resources such as accessible disk space that the user can work in, typically called a home directory and information about the default shell preference.

Username

Every account in a Linux system is associated with a unique username, which is typically a sequence of alphanumeric characters at least three characters in length. It is case sensitive; for example, Apple01 is a different username than apple01. A unique integer, the user id (UID), is assigned to each username. Linux uses the UID rather than the username to manage user accounts since it is more efficient to process numbers than strings. However, you don't necessarily need to know your UID.

Group

Linux also has the notion of a group of users who need to share files and processes. Each account is assigned a primary group with a numerical group id (GID) that corresponds to the particular group. A single account can belong to many groups, but you may have only one primary group. Groups can also be used to assign certain permissions to users on the system.

Password

Each username requires a password. The username is the account identifier, and the password is the authenticator. A password is required for operations such as logging into the system and accessing files. Password requirements differ between systems; a sample requirement is that the password must be a minimum of 8 characters with at least 3 of the following character classes:

  • lower-case letters
  • upper-case letters
  • numerical digits
  • punctuation

When you enter your password, the system encrypts it and compares it to a stored string. This ensures that even the Operating System does not know your plain text password. This method is frequently used on websites and servers, especially those that run Linux. Once you have the system username and password, you are ready to log into the remote system using a secure shell (ssh). See the remote connections page for details about SSH.

 
©  |   Cornell University    |   Center for Advanced Computing    |   Copyright Statement    |   Inclusivity Statement