Section 6.1. Introduction
Section 6.2. Password File
Section 6.3. Shadow Passwords
Section 6.4. Group File
Section 6.5. Supplementary Group IDs
Section 6.6. Implementation Differences
Section 6.7. Other Data Files
Section 6.8. Login Accounting
Section 6.9. System Identification
Section 6.10. Time and Date Routines
Section 6.11. Summary
Exercises