Unix script, Operating System

Assignment Help:

As a group, you may need to make some enhancements to your development server (NOT your stable server!)  It needs to be able to run the makepasswd program, which may require installing a package with aptitude.  Other modifications may be necessary as well, depending on your solution to this part of the assignment.  If you do any of the work in making sure that this stuff is working for your group, be sure to log it with plod (the logging happens on your stable server, even though the work is being done on your development server).

Automating account creation -- Write a script called "create_user" which will will create a user account that will work with a group of other accounts. The user ID, unencrypted password, and a group name must be provided on the command line.  Your script should:

1.Create the user account, with the primary group being named the same as the user (as usual). It should have a standard home directory.
2.Change the user's .profile so that it sets their umask to make all created files and directories readable by everyone and writable by group (as well as by owner).
3.Create a group from the group name, and add the user to it as a secondary group for that user
4.Create a directory in /home for the group, named with the group name.  Make it owned by the root user and the group.  Make it so that any file created in this directory will be owned by the group as well.
5.It should do all these things without any interactive input.  All input should be provided by the values on the command line when the script is run.


Related Discussions:- Unix script

Explain the alphabet and string, Explain the Alphabet and String A fini...

Explain the Alphabet and String A finite set of symbols is known as alphabet. An alphabet is frequently denoted by sigma, yet can be given any name. B = {0, 1} says B is an

Mention the various features that characteristics deadlock, Mention the var...

Mention the various features that characteristics the deadlock condition .  The four circumstances that give rise to deadlock condition are: 1) Mutual exclusion : As a minim

Hj, scheduling

scheduling

How are file sharing and protection implemented?, How are file sharing and ...

How are file sharing and protection implemented? To implement file protection and sharing, the system ought to maintain more file and directory attributes than are needed on a

Explain the various file types, Explain the various file types A common...

Explain the various file types A common technique for executing file types is to contain the type as part of the file name. The name is split into two parts - a name and an ext

Split the hexadecimal format, The following is a dump of a TCP header in h...

The following is a dump of a TCP header in hexadecimal format: 00CD0018 00000EF1 00000D5D 502200D1 01BF0010 We need to first split the above hex as such 00 CD 00 18 00 00

Deadlock, what are the overall concepts of deadlock

what are the overall concepts of deadlock

What is a latency time, What is a Latency Time Latency Time is the time...

What is a Latency Time Latency Time is the time required through a sector to reach below read/write head.

WINDOWS XP, DESIGN GOALS OF WINDOWS XP.DESCRIBE IN DETAIL.

DESIGN GOALS OF WINDOWS XP.DESCRIBE IN DETAIL.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd