Chapter 5. Users, Groups, and the Superuser

In Chapter 4, we explained that every Unix user has a username to define an account. In this chapter, we’ll describe how the operating system views users and how accounts and groups are used to define access privileges for users. We’ll also discuss how one can assume the identity of another user to temporarily use his access rights.

Get Practical UNIX and Internet Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.