pw_name:pw_passwd:pw_uid:pw_gid:pw_gecos:pw_dir:pw_shell
pw_name
It can be the name of a new user or the name of an existing user (or an user created before by newusers). In case of an existing user, the user's information will be changed, otherwise a new user will be created.
pw_passwd
pw_uid
If the field is empty, an new (unused) UID will be defined automatically by newusers.
If this field contains a number, this number will be used as the UID.
If this field contains the name of an existing user (or the name of an user created before by newusers), the UID of the specified user will be used.
If the UID of an existing user is changed, the files ownership of the user's file should be fixed manually.
pw_gid
If this field contains the name of an existing group (or a group created before by newusers), the GID of this group will be used as the primary group ID for the user.
If this field is a number, this number will be used as the primary group ID of the user. If no groups exist with this GID, a new group will be created with this GID, and the name of the user.
If this field is empty, a new group will be created with the name of the user and a GID will be automatically defined by newusers to be used as the primary group ID for the user and as the GID for the new group.
If this field contains the name of a group which does not exist (and was not created earlier wbefore by newusers), a new group will be created with the specified name and a GID will be automatically defined by newusers to be used as the primary group ID for the user and Gs the ID for the new group.
pw_gecos
pw_dir
If this field does not specify an existing directory, the specified directory is created, with ownership set to the user being created or updated and its primary group.
If the home directory of an existing user is changed, newusers does not move or copy the content of the old directory to the new location. This should be done manually.
pw_shell
newusers first tries to create or change all the specified users, and then write these changes to the user or group databases. If an error occurs (except in the final writes to the databases), no changes are committed to the databases.
This command is intended to be used in a large system environment where many accounts are updated at a single time.
The options which apply to the newusers command are:
-c, --crypt-method
The available methods are DES, MD5, NONE, and SHA256 or SHA512 if your libc support these methods.
-h, --help
-r, --system
System users will be created with no aging information in /etc/shadow, and their numeric identifiers are choosen in the SYS_UID_MIN-SYS_UID_MAX range, defined in login.defs, instead of UID_MIN-UID_MAX (and their GID counterparts for the creation of groups).
-s, --sha-rounds
The value 0 means that the system will choose the default number of rounds for the crypt method (5000).
A minimal value of 1000 and a maximal value of 999,999,999 will be enforced.
You can only use this option with the SHA256 or SHA512 crypt method.
By default, the number of rounds is defined by the SHA_CRYPT_MIN_ROUNDS and SHA_CRYPT_MAX_ROUNDS variables in /etc/login.defs.
The input file must be protected since it contains unencrypted passwords.
You should make sure the passwords and the encryption method respect the system's password policy.
The following configuration variables in /etc/login.defs change the behavior of this tool:
ENCRYPT_METHOD (string)
It can take one of these values:
Note: this parameter overrides the MD5_CRYPT_ENAB variable.
GID_MAX (number), GID_MIN (number)
MAX_MEMBERS_PER_GROUP (number)
The default value is 0, meaning that there are no limits in the number of members in a group.
This feature (split group) permits to limit the length of lines in the group file. This is useful to make sure that lines for NIS groups are not larger than 1024 characters.
If you need to enforce such limit, you can use 25.
Note: split groups may not be supported by all tools (even in the Shadow toolsuite). You should not use this variable unless you really need it.
MD5_CRYPT_ENAB (boolean)
This variable is superceded by the ENCRYPT_METHOD variable or by any command line option used to configure the encryption algorithm.
This variable is deprecated. You should use ENCRYPT_METHOD.
PASS_MAX_DAYS (number)
PASS_MIN_DAYS (number)
PASS_WARN_AGE (number)
SHA_CRYPT_MIN_ROUNDS (number), SHA_CRYPT_MAX_ROUNDS (number)
With a lot of rounds, it is more difficult to brute forcing the password. But note also that more CPU resources will be needed to authenticate users.
If not specified, the libc will choose the default number of rounds (5000).
The values must be inside the 1000-999999999 range.
If only one of the SHA_CRYPT_MIN_ROUNDS or SHA_CRYPT_MAX_ROUNDS values is set, then this value will be used.
If SHA_CRYPT_MIN_ROUNDS > SHA_CRYPT_MAX_ROUNDS, the highest value will be used.
SYS_GID_MAX (number), SYS_GID_MIN (number)
SYS_UID_MAX (number), SYS_UID_MIN (number)
UID_MAX (number), UID_MIN (number)
UMASK (number)
useradd and newusers use this mask to set the mode of the home directory they create
It is also used by login to define users' initial umask. Note that this mask can be overriden by the user's GECOS line (if QUOTAS_ENAB is set) or by the specification of a limit with the K identifier in limits(5).
/etc/passwd
/etc/shadow
/etc/group
/etc/gshadow
/etc/login.defs
login.defs(5), passwd(1), useradd(8).