[ Previous | Next | Contents | Glossary | Home | Search ]
AIX Version 4.3 Commands Reference, Volume 3

lsuser Command

Purpose

Displays user account attributes.

Syntax

lsuser [ -c | -f ] [ -a List ] { ALL | Name [ ,Name ] ... }

Description

The lsuser command displays the user account attributes. You can use this command to list all attributes of all the system users or all the attributes of specific users. Since there is no default parameter, you must enter the ALL keyword to see the attributes of all the users. By default, the lsuser command displays all user attributes. To view selected attributes, use the -a List flag. If one or more attributes cannot be read, the lsuser command lists as much information as possible.

Note: If you have a Network Information Service (NIS) database installed on your system, some user information may not appear when you use the lsuser command.

By default, the lsuser command lists each user's attributes on one line. It displays attribute information as Attribute=Value definitions, each separated by a blank space. To list the user attributes in stanza format, use the -f flag. To list the information as colon-separated records, use the -c flag.

You can use the Web-based System Manager Users application (wsm users fast path) to run this command. You could also use the System Management Interface Tool (SMIT) smit lsusers fast path to run this command.

Flags

-a List Lists the attributes to display. The List variable can include any attribute defined in the chuser command and requires a blank space between attributes. If you specify an empty list, only the user names are displayed.
-c Displays the user attributes in colon-separated records, as follows:
# name:  attribute1:  attribute2:  ... 
  User:  value1:      value2:      ...
-f Displays the output in stanzas, with each stanza identified by a user name. Each Attribute=Value pair is listed on a separate line:
user:
       attribute1=value
       attribute2=value
       attribute3=value

Security

Access Control: This command should be a general user program with execute (x) access for all users. Since the attributes are read with the access rights of the user who invokes the command, some users may not be able to access all the information. This command should have the trusted computing base attribute.

Files Accessed:

Mode File
r /etc/passwd
r /etc/security/user
r /etc/security/user.roles
r /etc/security/limits
r /etc/security/environ
r /etc/group
r /etc/security/audit/config

Examples

  1. To display the user id and group-related information about the smith account in stanza form, enter:
    lsuser -f -a id pgrp groups admgroups smith
    Information similar to the following appears:
    smith:
       ID=2457
       pgrp=system
       groups=system,finance,staff,accounting
       admgroups=finance,accounting
  2. To display the user id, groups, and home directory of smith in colon format, enter:
    lsuser -c -a id home groups smith
    Information like the following appears:
    # name: ID:home:groups
    smith:  2457:/home/smith:system,finance,staff,accounting
  3. To display all the attributes of user smith in the default format, enter:
    lsuser smith
    All the attribute information appears, with each attribute separated by a blank space.
  4. To display all the attributes of all the users, enter:
    lsuser ALL
    All the attribute information appears, with each attribute separated by a blank space.

Files

/usr/sbin/lsuser Contains the lsuser command.
/etc/passwd Contains basic user information.
/etc/security/limits Defines resource quotas and limits for each user.
/etc/security/user Contains the extended attributes of users.
/etc/security/user.roles Contains the administrative role attributes of users.
/etc/security/environ Contains the environment attributes of users.
/etc/group Contains basic group attributes.
/etc/security/audit/config Contains the audit configuration files.

Related Information

The chfn command, chgroup command, chgrpmem command, chsh command, chuser command, lsgroup command, mkgroup command, mkuser command, passwd command, pwdadm command, rmgroup command, rmuser command, setgroups command, setsenv command.

For more information about the identification and authentication of users, discretionary access control, the trusted computing base, and auditing, refer to Security Administration in AIX Version 4.3 System Management Guide: Operating System and Devices.

Setting up and running Web-based System Management in AIX Version 4.3 System Management Guide: Operating System and Devices.

For more information about administrative roles, refer to Administrative Roles Overview in AIX Version 4.3 System Management Guide: Operating System and Devices.


[ Previous | Next | Contents | Glossary | Home | Search ]