Unix script, Operating System

Assignment Help:

As a group, you may need to make some enhancements to your development server (NOT your stable server!)  It needs to be able to run the makepasswd program, which may require installing a package with aptitude.  Other modifications may be necessary as well, depending on your solution to this part of the assignment.  If you do any of the work in making sure that this stuff is working for your group, be sure to log it with plod (the logging happens on your stable server, even though the work is being done on your development server).

Automating account creation -- Write a script called "create_user" which will will create a user account that will work with a group of other accounts. The user ID, unencrypted password, and a group name must be provided on the command line.  Your script should:

1.Create the user account, with the primary group being named the same as the user (as usual). It should have a standard home directory.
2.Change the user's .profile so that it sets their umask to make all created files and directories readable by everyone and writable by group (as well as by owner).
3.Create a group from the group name, and add the user to it as a secondary group for that user
4.Create a directory in /home for the group, named with the group name.  Make it owned by the root user and the group.  Make it so that any file created in this directory will be owned by the group as well.
5.It should do all these things without any interactive input.  All input should be provided by the values on the command line when the script is run.


Related Discussions:- Unix script

Explain about functions of operating system, Q. Explain about Functions of ...

Q. Explain about Functions of Operating System? Functions of Operating System Operating system performs 3 functions as follows: 1.  Convenience:   Operating System mak

Relationship among the capabilities of domain level j and i, Q. In a ring-...

Q. In a ring-protection system the level 0 has the greatest access to objects and level n (greater than zero) has fewer access rights. The access rights of a program at a partic

Roles of operating systems, Describe Three major roles of operating systems...

Describe Three major roles of operating systems in business computer systems

Os installation, Question: OS Installation / File system a) Why is NTFS...

Question: OS Installation / File system a) Why is NTFS portioning preferred over FAT16 or FAT32 when security is of primary concern? b) State a situation or an application w

How is the NTFS namespace planned, Q. How is the NTFS namespace planned? Ex...

Q. How is the NTFS namespace planned? Explain. Answer: The NTFS namespace is prearranged as a hierarchy of directories where every directory uses a B+ tree data structure to

What are the common strategies to select a free hole, What are the common s...

What are the common strategies to select a free hole from a set of available holes? The most common methods are a. First fit b. Best fit c. Worst fit

Define a layer that is not of an io management module, Define a layer that ...

Define a layer that is not of an IO management module  MCS that is Management Control System is not of an IO management module

Cosled loop, What are the two principles in Hungarian method?

What are the two principles in Hungarian method?

How many disks can be used effectively by one fast wide bus, Q. More than ...

Q. More than one disk drive is able to be attached to a SCSI bus. Especially a fast wide SCSI-II bus can be connected to at most 15 disk drives. Remember that this bus has a bandw

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd