nixpkgs/nixos/doc/manual/configuration/user-mgmt.chapter.md
2024-08-26 13:53:45 +02:00

4.6 KiB

User Management

NixOS supports both declarative and imperative styles of user management. In the declarative style, users are specified in configuration.nix. For instance, the following states that a user account named alice shall exist:

{
  users.users.alice = {
    isNormalUser = true;
    home = "/home/alice";
    description = "Alice Foobar";
    extraGroups = [ "wheel" "networkmanager" ];
    openssh.authorizedKeys.keys = [ "ssh-dss AAAAB3Nza... alice@foobar" ];
  };
}

Note that alice is a member of the wheel and networkmanager groups, which allows her to use sudo to execute commands as root and to configure the network, respectively. Also note the SSH public key that allows remote logins with the corresponding private key. Users created in this way do not have a password by default, so they cannot log in via mechanisms that require a password. However, you can use the passwd program to set a password, which is retained across invocations of nixos-rebuild.

If you set to false, then the contents of /etc/passwd and /etc/group will be congruent to your NixOS configuration. For instance, if you remove a user from and run nixos-rebuild, the user account will cease to exist. Also, imperative commands for managing users and groups, such as useradd, are no longer available. Passwords may still be assigned by setting the user's hashedPassword option. A hashed password can be generated using mkpasswd.

A user ID (uid) is assigned automatically. You can also specify a uid manually by adding

{
  uid = 1000;
}

to the user specification.

Groups can be specified similarly. The following states that a group named students shall exist:

{
  users.groups.students.gid = 1000;
}

As with users, the group ID (gid) is optional and will be assigned automatically if it's missing.

In the imperative style, users and groups are managed by commands such as useradd, groupmod and so on. For instance, to create a user account named alice:

# useradd -m alice

To make all nix tools available to this new user use `su - USER` which opens a login shell (==shell that loads the profile) for given user. This will create the ~/.nix-defexpr symlink. So run:

# su - alice -c "true"

The flag -m causes the creation of a home directory for the new user, which is generally what you want. The user does not have an initial password and therefore cannot log in. A password can be set using the passwd utility:

# passwd alice
Enter new UNIX password: ***
Retype new UNIX password: ***

A user can be deleted using userdel:

# userdel -r alice

The flag -r deletes the user's home directory. Accounts can be modified using usermod. Unix groups can be managed using groupadd, groupmod and groupdel.

Create users and groups with systemd-sysusers

::: {.note} This is experimental.

Please consider using Userborn over systemd-sysusers as it's more feature complete. :::

Instead of using a custom perl script to create users and groups, you can use systemd-sysusers:

{
  systemd.sysusers.enable = true;
}

The primary benefit of this is to remove a dependency on perl.

Manage users and groups with userborn

::: {.note} This is experimental. :::

Like systemd-sysusers, Userborn adoesn't depend on Perl but offers some more advantages over systemd-sysusers:

  1. It can create "normal" users (with a GID >= 1000).
  2. It can update some information about users. Most notably it can update their passwords.
  3. It will warn when users use an insecure or unsupported password hashing scheme.

Userborn is the recommended way to manage users if you don't want to rely on the Perl script. It aims to eventually replace the Perl script by default.

You can enable Userborn via:

services.userborn.enable = true;

You can configure Userborn to store the password files (/etc/{group,passwd,shadow}) outside of /etc and symlink them from this location to /etc:

services.userborn.passwordFilesLocation = "/persistent/etc";

This is useful when you store /etc on a tmpfs or if /etc is immutable (e.g. when using system.etc.overlay.mutable = false;). In the latter case the original files are by default stored in /var/lib/nixos.

Userborn implements immutable users by re-mounting the password files read-only. This means that unlike when using the Perl script, trying to add a new user (e.g. via useradd) will fail right away.