Assigning Shells to Users

A shell is assigned to a user when the user is first created by the system administrator (see Chapter 3, “User Administration”) and the full path of the user's shell is stored in the rightmost field of the password file.

When users log in to the system, the program defined in the shell field of their password file entry is executed. If the field contained /bin/ksh then that is the command that would run. Likewise, if the field contained /bin/who then that would run instead. In this case, it would display a list of who is currently logged in (which would include the users in question) and then exit back to the login prompt. This kind of entry is often used to enable specific functions to be performed by users who do not ...

Get Solaris™ Operating Environment Boot Camp now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.