Shadow Utilities

If you are in a multiuser environment and not using a networked authentication scheme such as Kerberos, you should consider using Shadow Utilities (also known as shadow passwords) for the enhanced protection offered for your system's authentication files. During the installation of Red Hat Linux, shadow password protection for your system is enabled by default, as are MD5 passwords (an alternative and arguably more secure method of encrypting passwords for storage on your system).

Shadow passwords offer a few distinct advantages over the previous standard of storing passwords on UNIX and Linux systems, including:

The shadow-utils package contains a number of utilities that support:

NoteNote
 

There are some additional points of interest concerning these utilities:

  • The utilities will work properly whether shadowing is enabled or not.

  • The utilities have been slightly modified to support Red Hat's user private group scheme. For a description of the modifications, see the useradd man page. For more information on user private groups, turn to the section called User Private Groups.

  • The adduser script has been replaced with a symbolic link to /usr/sbin/useradd.

  • The tools in the shadow-utils package are not Kerberos, NIS, hesiod, or LDAP enabled. New users will be local only. For more information on Kerberos and LDAP, see Chapter 8 and Chapter 15.