Gaming industry under DDoS attack. Get DDoS protection now. Start onboarding
  1. Home
  2. Developers
  3. How to List Users on Ubuntu

How to List Users on Ubuntu

  • By Gcore
  • September 15, 2023
  • 2 min read
How to List Users on Ubuntu

Managing user accounts is a foundational aspect of Ubuntu system administration. Whether you’re setting up a shared workstation, configuring a server, or simply trying to understand who else has access to your system, knowing how to view users is crucial. In this guide, we’ll walk you through various methods to list and understand user accounts on Ubuntu, ensuring you have full visibility and control over your system’s access points.

Advantages of Viewing Users on Ubuntu

Knowing how to view users on Ubuntu brings several advantages, especially in terms of system administration, security, and user management. Here are some key benefits:

  1. Security and Monitoring. Identifying all users on the system helps in detecting unauthorized accounts that might pose security threats. By regularly checking active users can help you spot any unexpected or unauthorized access.
  2. System Administration. By viewing users, administrators can manage permissions, allocate resources, and set quotas more efficiently. This helps in diagnosing issues related to user-specific configurations and applications.
  3. Resource Management. Administrators can identify which users consume the most resources, potentially optimizing system performance.
  4. Troubleshooting. Knowing which users are currently logged in or were recently active can be valuable when diagnosing system issues or user-specific problems.
  5. Documentation and Reporting. For IT teams, having a clear view of all system users aids in documenting system setups and configurations

How to List All Users on Ubuntu

To begin learning how to view users on Ubuntu, follow this step-by-step guide.

#1 Open the Terminal

Your first step is to open the terminal. You can do this by searching for “Terminal” in the application menu or by using the keyboard shortcut Ctrl + Alt + T.

#2 List Users from /etc/passwd File

All users on a Linux system, including system users, are stored in the /etc/passwd file. To see a list of all users run this command.

cat /etc/passwd

Sample Output:

#3 Interpreting the Output

The /etc/passwd file’s output consists of multiple colon-separated fields. Here’s a quick breakdown of these fields:

UsernameThe user’s login name.
PasswordAn x here indicates that the password is stored in the /etc/shadow file.
User ID (UID)A unique user identification number.
Group ID (GID)The primary group ID, which references a group in /etc/group.
User InfoThis field can be used for extra user description, but it’s often left empty or just contains the user’s full name.
Home DirectoryThe path to the user’s home directory.
Command/ShellThe command/shell that’s executed upon user login. Typically, this will be /bin/bash for users, but it can be another shell or command, especially for system users.

#4 Filtering for Human Users

Not all users listed in /etc/passwd are human users. Many are system users created for specific services. If you want to see a more concise list of human users, typically those with a user ID (UID) greater than 1000, you can use:

getent passwd {1000..60000} | cut -d: -f1

#5 Using the id Command

To get detailed information about a specific user, including their groups, you can use the id command followed by the username:

id username

Replace username with the name of the user you want to inspect.

Keep in mind, Ubuntu offers a variety of tools and commands to manage and access user information. The methods highlighted in this context are among the most frequently used. With this knowledge, you can now list all users on your Ubuntu system.

Conclusion

Want to run Ubuntu in a virtual environment? With Gcore Cloud, you can choose from Basic VM, Virtual Instances, or VPS/VDS suitable for Ubuntu:

Choose an instance

Related articles

What is Account Takeover: Types, Prevention & Protection

Your CFO's email account gets compromised overnight. By morning, cybercriminals have downloaded client banking information, stolen sensitive financial data, and grabbed credentials to your company's bank accounts. This isn't hypothetical, i

Web Scraping Protection: Complete Guide to Detection, Prevention & Best Practices

Your server load suddenly spikes by 400%. Legitimate customers can't access your site. Competitors are methodically copying your product descriptions, pricing data, and proprietary content. Modern scraping bots are draining your resources a

What is WAF: Complete Guide to Web Application Firewall Security

Your web application just processed what looked like a normal login request, but it was actually an SQL injection attack that exposed your entire customer database. Cross-site scripting (XSS), SQL injection, and other application-layer atta

Application Layer DDoS Attacks: Detection, Prevention & Mitigation

Your network dashboards show green. Bandwidth utilization is at 5%. Yet your application is dying, response times spike to 30 seconds, users get timeout errors, and your on-call engineer can't figure out why. Welcome to application layer DD

What is an IXP?

When you send an email or stream a video, your data doesn't just magically hop from your computer to its destination. It travels through multiple networks, and somewhere along that path, it might passes through an Internet Exchange Point (I

What is global server load balancing (GSLB)?

Global server load balancing is a traffic management system that distributes user requests across servers in multiple geographic locations to improve performance and reliability. This approach can reduce latency by 40-60% compared to single

Subscribe to our newsletter

Get the latest industry trends, exclusive insights, and Gcore updates delivered straight to your inbox.