KB labels


Ticket Product Version

Ticket Category

Ticket Assignee


Hot Fixes
Your Arcserve Support User Profile
First Name:
Last Name:
email:
Phone:
Company:*
Customer Type:
Language:

Country:
Region:

Time zone:
Follow

arcserve-KB : ARCserve RHA Replication Changing Permissions of UID and GID on the target (replica)

Last Update: 2015-12-31 14:07:22 UTC
Problem: During the replication the OWNER : GROUP on the target (Replica) server are changed.

Solution: The UID and GID should be identical on the both the Master and the Replica server. If not the UID and GID will be lost on the replica server.

More Information:

Traditionally, the /etc/passwd file is used to keep track of every registered user that has access to a system.

The /etc/passwd file is a colon-separated file that contains the following information:
  • User name
  • Encrypted password
  • User ID number (UID)
  • User's group ID number (GID)
  • Full name of the user (GECOS)
  • User home directory
  • Login shell 
What is /etc/passwd

/etc/passwd file stores essential information, which is required during login i.e. user account information. /etc/passwd is a text file, that contains a list of the system's accounts, giving for each account some useful information like user ID, group ID, home directory, shell, etc. It should have general read permission as many utilities, like ls use it to map user IDs to user names, but write access only for the superuser/root account.


You should access the /etc/group file through the system commands and subroutines defined for this purpose. You can use the following commands to manage groups:

  • chgroup
  • chgrpmem
  • chuser
  • lsgroup
  • mkgroup
  • mkuser
  • rmgroup 

What is /etc/group

/etc/group is a text file which defines the groups to which users belong under Linux and UNIX operating system. Under Unix / Linux multiple users can be categorized into groups. Unix file system permissions are organized into three classes, user, group, and others. The use of groups allows additional abilities to be delegated in an organized fashion, such as access to disks, printers, and other peripherals. This method, amongst others, also enables the Superuser to delegate some administrative tasks to normal users.
 
Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

Comments