Official Red Hat Linux Administrators Guide

If you are in a multi-user environment and not using a networked authentication scheme such as Kerberos, consider using Shadow Utilities (also known as shadow passwords) for the enhanced protection offered for your system’s authentication files. During the installation of Red Hat Linux, shadow password protection for your system is enabled by default, as are MD5 passwords (an alternative and arguably more secure method of encrypting passwords for storage on your system).

The use of shadow passwords offers a few distinct advantages over the previous standard of storing passwords on UNIX and Linux systems, including:

The shadow-utils package contains a number of utilities that support:

There are some additional points of interest concerning these utilities:

Категории