When you first start using a fresh Linux server, adding and removing users is often one of the first things you’ll need to do. In this guide, you will learn how to create user accounts, assign sudo
privileges, and delete users on a CentOS 7 server.
To complete this tutorial, you will need:
sudo
-enabled user. If you are logged in as root instead, you can drop the sudo portion of all the following commands. For guidance, please see our tutorial Initial Server Setup with CentOS 7.Throughout this tutorial we will be working with the user sammy. Please substitute with the username of your choice.
You can add a new user by typing:
sudo adduser sammy
Next, you’ll need to give your user a password so that they can log in. To do so, use the passwd
command:
sudo passwd sammy
You will be prompted to type in the password twice to confirm it. Now your new user is set up and ready for use! You can now log in as that user, using the password that you set up.
Note: if your SSH server disallows password-based authentication, you will not yet be able to connect with your new username. Details on setting up key-based SSH authentication for the new user can be found in step 4 of Initial Server Setup with CentOS 7.
If your new user should have the ability to execute commands with root (administrative) privileges, you will need to give the new user access to sudo
.
We can do this by adding the user to the wheel group (which gives sudo
access to all of its members by default).
To do this, use the usermod
command:
sudo usermod -aG wheel sammy
Now your new user is able to execute commands with administrative privileges. To do so, simply type sudo
ahead of the command that you want to execute as an administrator:
sudo some_command
You will be prompted to enter the password of your user account (not the root password). Once the correct password has been submitted, the command you entered will be executed with root privileges.
To see which users are part of the wheel group (and thus have sudo
), you can use the lid
function. lid
is normally used to show which groups a user belongs to, but with the -g
flag, you can reverse it and show which users belong in a group:
sudo lid -g wheel
Output sammy(uid=1001)
The output will show you the usernames and UIDs that are associated with the group. This is a good way of confirming that your previous commands were successful, and that the user has the privileges that they need.
If you have a user account that you no longer need, it’s best to delete the old account.
If you want to delete the user without deleting any of their files, type:
sudo userdel sammy
If you want to delete the user’s home directory along with the user account itself, type:
sudo userdel -r sammy
With either command, the user will automatically be removed from any groups that they were added to, including the wheel group if they were given sudo
privileges. If you later add another user with the same name, they will have to be added to the wheel group again to gain sudo
access.
You should now have a good grasp on how to add and remove users from your CentOS 7 server. Effective user management will allow you to separate users and give them only the access that is needed for them to do their job. You can now move on to configuring your CentOS 7 server for whatever software you need, such as a LAMP or LEMP web stack.
For more information about how to configure sudo
, check out our guide on how to edit the sudoers file.
Thanks for learning with the DigitalOcean Community. Check out our offerings for compute, storage, networking, and managed databases.
This textbox defaults to using Markdown to format your answer.
You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!
Here is some info on sudoers and how to use it, why to use it and so on.
The
sudoers
file in Linux defines which users and groups have sudo privileges, specifying who can execute commands as the root user or another specified user. This file allows system administrators to control permissions and can be configured to include specific settings like passwordlesssudo
access and custom rules for commands.Here’s a breakdown of the
sudoers
file, its usage, and customization options:1. The Basics of
sudoers
AccessThe main
sudoers
file is located at/etc/sudoers
, and it’s edited using thevisudo
command:Using
visudo
is recommended because it locks the file during editing and performs a syntax check, preventing configuration errors that could blocksudo
access.In
sudoers
, each line defines rules with this structure:<user_or_group>
: Specifies the user (likeusername
) or group (%groupname
) to givesudo
access.<host>
: Defines the host on which this rule applies (usuallyALL
).<run_as_user>
: Specifies the user as whom commands will run (oftenALL
to allow any user).<command>
: Defines allowed commands. Setting this toALL
allows any command.Example
To grant
sudo
access to a useradmin
, the rule would look like:This allows
admin
to run any command as any user on any host.2. Using
sudoers.d
for Modular ConfigurationRather than editing the main
/etc/sudoers
file directly, you can place configuration files in the/etc/sudoers.d
directory. Files in this directory are loaded along with/etc/sudoers
, which makes managing permissions easier and safer./etc/sudoers.d
:Each file in
/etc/sudoers.d
should have only the specific rules you want to add or override. This approach is useful in multi-user or automated environments where different teams may need distinct permissions.3. Granting Passwordless
sudo
AccessBy default, users are prompted for a password when running a command with
sudo
. To allow passwordlesssudo
, add theNOPASSWD
directive:This allows
username
to execute any command without entering a password.Limiting Passwordless Commands
You can restrict passwordless access to specific commands. For example, if you want
username
to restart the web server without a password:This rule only applies to
/usr/sbin/service apache2 restart
and still requires a password for other commands.4. Common
sudoers
ExamplesHere are a few configurations you might find useful:
%groupname
to apply rules to all users in a group. For example, to allow users in thedevelopers
group to run any command:Limiting Commands for Security: Restrict access to specific administrative commands without allowing unrestricted
sudo
access:Combining
NOPASSWD
with Limited Commands: For a safer setup, allow passwordless access only to a few commands:5. Testing and Verifying
sudoers
ConfigurationAfter adding or modifying
sudoers
rules, it’s a good idea to test them by switching to the user and running a test command:The
sudo -l
command lists availablesudo
privileges for the current user, helping verify that the configuration works as expected.By using
sudoers.d
for modular rule management,NOPASSWD
for controlled passwordless access, and group-based permissions, you can securely configuresudo
privileges tailored to each user or team’s needs.Tiny nit-pick, but on CentOS systems adduser is just a symlink to useradd:
And various Debian-based distros have a custom script for adduser which behaves entirely differently to useradd:
So I always try and use useradd to keep things as consistent as possible, does anybody else find the same thing?
This guide got me 90% of the way to adding a user with sudo privileges on the default centOS 6.6 install. I know the article is for centOS 7, but all I had to do to get my created user sudo access was:
Thank you ! this was very helpful to resolve the issue that I had
I get this when I try to use sudo with the created user :(
sudo: effective uid is not 0, is sudo installed setuid root?
I can see the user when I run sudo lid -g wheel and it has UID=1000