Show Table of Contents
4.4. Additional Resources
For more information on how to manage users and groups on Red Hat Enterprise Linux, see the resources listed below.
Installed Documentation
For information about various utilities for managing users and groups, see the following manual pages:
useradd(8) — The manual page for theuseraddcommand documents how to use it to create new users.userdel(8) — The manual page for theuserdelcommand documents how to use it to delete users.usermod(8) — The manual page for theusermodcommand documents how to use it to modify users.groupadd(8) — The manual page for thegroupaddcommand documents how to use it to create new groups.groupdel(8) — The manual page for thegroupdelcommand documents how to use it to delete groups.groupmod(8) — The manual page for thegroupmodcommand documents how to use it to modify group membership.gpasswd(1) — The manual page for thegpasswdcommand documents how to manage the/etc/groupfile.grpck(8) — The manual page for thegrpckcommand documents how to use it to verify the integrity of the/etc/groupfile.pwck(8) — The manual page for thepwckcommand documents how to use it to verify the integrity of the/etc/passwdand/etc/shadowfiles.pwconv(8) — The manual page for thepwconv,pwunconv,grpconv, andgrpunconvcommands documents how to convert shadowed information for passwords and groups.id(1) — The manual page for theidcommand documents how to display user and group IDs.umask(2) — The manual page for theumaskcommand documents how to work with the file mode creation mask.
For information about related configuration files, see:
group(5) — The manual page for the/etc/groupfile documents how to use this file to define system groups.passwd(5) — The manual page for the/etc/passwdfile documents how to use this file to define user information.shadow(5) — The manual page for the/etc/shadowfile documents how to use this file to set passwords and account expiration information for the system.
Online Documentation
- Red Hat Enterprise Linux 7 Security Guide — The Security Guide for Red Hat Enterprise Linux 7 provides additional information how to ensure password security and secure the workstation by enabling password aging and user account locking.
See Also
- Chapter 6, Gaining Privileges documents how to gain administrative privileges by using the
suandsudocommands.

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.