NOM
usermod - Modifier un compte utilisateurSYNOPSIS
usermod
[ options] LOGIN
DESCRIPTION
The usermod command modifies the system account files.OPTIONS
The options which apply to the usermod command are: -a, --appendAdd the user to the supplementary group(s).
Use only with the -G option.
-b, --badname
Allow names that do not conform to
standards.
-c, --comment COMMENT
update the comment field of the user in
/etc/passwd, which is normally modified using the chfn(1)
utility.
-d, --home HOME_DIR
Le nouveau répertoire personnel de
l'utilisateur.
If the -m option is given, the contents of the current home directory
will be moved to the new home directory, which is created if it does not
already exist. If the current home directory does not exist the new home
directory will not be created.
-e, --expiredate EXPIRE_DATE
The date on which the user account will be
disabled. The date is specified in the format YYYY-MM-DD. Integers as
input are interpreted as days after 1970-01-01.
An input of -1 or an empty string will blank the account expiration field in the
shadow password file. The account will remain available with no date limit.
This option requires a /etc/shadow file. A /etc/shadow entry will be created if
there were none.
-f, --inactive INACTIVE
defines the number of days after the password
exceeded its maximum age during which the user may still login by immediately
replacing the password. This grace period before the account becomes inactive
is stored in the shadow password file. An input of 0 will disable an expired
password with no delay. An input of -1 will blank the respective field in the
shadow password file. See shadow(5) for more information.
This option requires a /etc/shadow file. A /etc/shadow entry will be created if
there were none.
-g, --gid GROUP
The name or numerical ID of the user's new
primary group. The group must exist.
Tout fichier du répertoire personnel de l'utilisateur appartenant au
groupe primaire précédent de l'utilisateur appartiendra à
ce nouveau groupe.
Le groupe propriétaire des fichiers en dehors du répertoire
personnel de l'utilisateur doit être modifié manuellement.
The change of the group ownership of files inside of the user's home directory
is also not done if the home dir owner uid is different from the current or
new user id. This is a safety measure for special home directories such as
/.
-G,
--groups GROUP1[,GROUP2,...[,GROUPN]]]
A list of supplementary groups which the user
is also a member of. Each group is separated from the next by a comma, with no
intervening whitespace. The groups must exist.
If the user is currently a member of a group which is not listed, the user will
be removed from the group. This behaviour can be changed via the -a
option, which appends the user to the current supplementary group list.
-l, --login NEW_LOGIN
The name of the user will be changed from
LOGIN to NEW_LOGIN. Nothing else is changed. In particular, the
user's home directory or mail spool should probably be renamed manually to
reflect the new login name.
-L, --lock
Lock a user's password. This puts a '!' in
front of the encrypted password, effectively disabling the password. You can't
use this option with -p or -U.
Note: if you wish to lock the account (not only access with a password), you
should also set the EXPIRE_DATE to 1.
-m, --move-home
moves the content of the user's home directory
to the new location. If the current home directory does not exist the new home
directory will not be created.
This option is only valid in combination with the -d (or --home)
option.
usermod will try to adapt the ownership of the files and to copy the
modes, ACL and extended attributes, but manual changes might be needed
afterwards.
-o, --non-unique
allows to change the user ID to a non-unique
value.
This option is only valid in combination with the -u option. As a user
identity serves as key to map between users on one hand and permissions, file
ownerships and other aspects that determine the system's behavior on the other
hand, more than one login name will access the account of the given UID.
-p, --password PASSWORD
defines a new password for the user. PASSWORD
is expected to be encrypted, as returned by crypt (3).
Note: Avoid this option on the command line because the password (or
encrypted password) will be visible by users listing the processes.
The password will be written in the local /etc/passwd or /etc/shadow file. This
might differ from the password database configured in your PAM configuration.
Il est nécessaire de vérifier si le mot de passe respecte la
politique de mots de passe du système.
-r, --remove
Remove the user from named supplementary
group(s). Use only with the -G option.
-R, --root CHROOT_DIR
Apply changes in the CHROOT_DIR
directory and use the configuration files from the CHROOT_DIR
directory. Only absolute paths are supported.
-P, --prefix PREFIX_DIR
Apply changes within the directory tree
starting with PREFIX_DIR and use as well the configuration files
located there. This option does not chroot and is intended for preparing a
cross-compilation target. Some limitations: NIS and LDAP users/groups are not
verified. PAM authentication is using the host files. No SELINUX
support.
-s, --shell SHELL
changes the user's login shell. An empty
string for SHELL blanks the field in /etc/passwd and logs the user into the
system's default shell.
-u, --uid UID
The new value of the user's ID.
This value must be unique, unless the -o option is used. The value must
be non-negative.
La boîte aux lettres et tous les fichiers possédés par
l'utilisateur et qui sont situés dans son répertoire personnel
verront leur identifiant d'utilisateur automatiquement modifié.
Le propriétaire des fichiers en dehors du répertoire personnel de
l'utilisateur doit être modifié manuellement.
The change of the user ownership of files inside of the user's home directory is
also not done if the home dir owner uid is different from the current or new
user id. This is a safety measure for special home directories such as /.
No checks will be performed with regard to the UID_MIN, UID_MAX,
SYS_UID_MIN, or SYS_UID_MAX from /etc/login.defs.
-U, --unlock
Unlock a user's password. This removes the '!'
in front of the encrypted password. You can't use this option with -p
or -L.
Note: if you wish to unlock the account (not only access with a password), you
should also set the EXPIRE_DATE (for example to 99999, or to the
EXPIRE value from /etc/default/useradd).
-v, --add-subuids FIRST-LAST
Ajoute une plage d'UIDs subalternes au compte
de l'utilisateur.
This option may be specified multiple times to add multiple ranges to a user's
account.
No checks will be performed with regard to SUB_UID_MIN,
SUB_UID_MAX, or SUB_UID_COUNT from /etc/login.defs.
-V, --del-subuids FIRST-LAST
Supprime une plage d'Uids subalternes du
compte de l'utilisateur.
This option may be specified multiple times to remove multiple ranges to a
user's account. When both --del-subuids and --add-subuids are
specified, the removal of all subordinate uid ranges happens before any
subordinate uid range is added.
No checks will be performed with regard to SUB_UID_MIN,
SUB_UID_MAX, or SUB_UID_COUNT from /etc/login.defs.
-w, --add-subgids FIRST-LAST
Ajoute une plage de gids subalternes au compte
d'un utilisateur.
This option may be specified multiple times to add multiple ranges to a user's
account.
No checks will be performed with regard to SUB_GID_MIN,
SUB_GID_MAX, or SUB_GID_COUNT from /etc/login.defs.
-W, --del-subgids FIRST-LAST
Supprime une plage de gids subalternes du
compte de l'utilisateur.
This option may be specified multiple times to remove multiple ranges to a
user's account. When both --del-subgids and --add-subgids are
specified, the removal of all subordinate gid ranges happens before any
subordinate gid range is added.
No checks will be performed with regard to SUB_GID_MIN,
SUB_GID_MAX, or SUB_GID_COUNT from /etc/login.defs.
-Z, --selinux-user SEUSER
defines the SELinux user to be mapped with
LOGIN. An empty string ("") will remove the respective entry
(if any). Note that the shadow system doesn't store the selinux-user, it uses
semanage(8) for that.
AVERTISSEMENTS
You must make certain that the named user is not executing any processes when this command is being executed if the user's numerical user ID, the user's name, or the user's home directory is being changed. usermod checks this on Linux. On other operating systems it only uses utmp to check if the user is logged in. You must change the owner of any crontab files or at jobs manually. Les modifications qui concernent NIS doivent être effectuées sur le serveur NIS.CONFIGURATION
The following configuration variables in /etc/login.defs change the behavior of this tool:FICHIERS
/etc/groupGroup account information
/etc/gshadow
Secure group account informatio.
/etc/login.defs
Shadow password suite configuration
/etc/passwd
User account information
/etc/shadow
Secure user account information
/etc/subgid
Per user subordinate group IDs
/etc/subuid
Per user subordinate user IDs
VOIR AUSSI
chfn(1), chsh(1), passwd(1), crypt(3), gpasswd(8), groupadd(8), groupdel(8), groupmod(8), login.defs(5), subgid(5), subuid(5), useradd(8), userdel(8).23/03/2023 | shadow-utils 4.13 |