1GSHADOW(5) File Formats and Conversions GSHADOW(5)
2
3
4
6 gshadow - shadowed group file
7
9 /etc/gshadow contains the shadowed information for group accounts.
10
11 This file must not be readable by regular users if password security is
12 to be maintained.
13
14 Each line of this file contains the following colon-separated fields:
15
16 group name
17 It must be a valid group name, which exist on the system.
18
19 encrypted password
20 Refer to crypt(3) for details on how this string is interpreted.
21
22 If the password field contains some string that is not a valid
23 result of crypt(3), for instance ! or *, users will not be able to
24 use a unix password to access the group (but group members do not
25 need the password).
26
27 The password is used when a user who is not a member of the group
28 wants to gain the permissions of this group (see newgrp(1)).
29
30 This field may be empty, in which case only the group members can
31 gain the group permissions.
32
33 A password field which starts with an exclamation mark means that
34 the password is locked. The remaining characters on the line
35 represent the password field before the password was locked.
36
37 This password supersedes any password specified in /etc/group.
38
39 administrators
40 It must be a comma-separated list of user names.
41
42 Administrators can change the password or the members of the group.
43
44 Administrators also have the same permissions as the members (see
45 below).
46
47 members
48 It must be a comma-separated list of user names.
49
50 Members can access the group without being prompted for a password.
51
52 You should use the same list of users as in /etc/group.
53
55 /etc/group
56 Group account information.
57
58 /etc/gshadow
59 Secure group account information.
60
62 gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1).
63
64
65
66shadow-utils 4.6 11/08/2018 GSHADOW(5)