JIYIK CN >

Current Location:Home > Learning > OPERATING SYSTEM >

How to Delete a User Account in Linux

Author:JIYIK Last Updated:2025/04/05 Views:

In Linux, we can have multiple user accounts. Sometimes, we may need to remove some users to deny their access to the system. In such cases, we have to delete the user account. We can use userdelcommand line utilities to delete user accounts in Linux.

Syntax: userdelCommand

userdel [options] user

It userremoves the user with username from the system. There are various options associated optionswith the command to customize the removal process. To delete a user account, we must make sure that we are logged in as a superuser.userdel

Example: userdelCommand

userdel DelftStack

It will delete the account with username DelftStack. The command also reads /etc/login.defsthe contents of the file. If a group with username DelftStackalso exists, and user DelftStackexists only DelftStackin the group , then the group will also be deleted if /etc/login.defsin the file USERGROUPS_ENABis set to yes.DelftStack

This command will also clear all user information present in the /etc/passwdand files./etc/shadow

However, even if userdelthe account is deleted using the command, some directories, such as mail spooland user home pages, are not deleted.

To remove these directories, we use the or option userdelwith the command .-r--remove

userdel -r DelftStack

It removes the mail spooler and user home directories. However, files in other file systems must be removed manually.

We cannot delete the user account if the user is logged in or any process associated with that user is running in the system. To log out the user from the system and stop all the processes associated with the user, we use the following command.

sudo killall -u DelftStack

It will log the user off the system DelftStackand stop all DelftStackprocesses associated with the user.

Now, we can use this command to delete the user account.

userdel DelftStack

Alternatively, to delete the logged in user account or the running processes associated with it, we can use the or option userdelwith the command .-f--force

userdel -f DelftStack

It forcefully removes the account from the system DelftStackeven if the user is logged in or the user has any running processes associated with it.

For reprinting, please send an email to 1244347461@qq.com for approval. After obtaining the author's consent, kindly include the source as a link.

Article URL:

Related Articles

How to decompress x.tar.xz format files under Linux

Publish Date:2025/04/08 Views:186 Category:OPERATING SYSTEM

A lot of software found today is in the tar.xz format, which is a lossless data compression file format that uses the LZMA compression algorithm. Like gzip and bzip2, it supports multiple file compression, but the convention is not to compr

Summary of vim common commands

Publish Date:2025/04/08 Views:115 Category:OPERATING SYSTEM

In Linux, the best editor should be vim. However, the complex commands behind vim's powerful functions also make us daunted. Of course, these commands do not need to be memorized by rote. As long as you practice using vim more, you can reme

Detailed explanation of command return value $? in Linux

Publish Date:2025/04/08 Views:58 Category:OPERATING SYSTEM

? is a special variable. This variable represents the return value of the previous command. That is to say, when we run certain commands, these commands will return a code after running. Generally, if the command is successfully run, the re

Common judgment formulas for Linux script shell

Publish Date:2025/04/08 Views:159 Category:OPERATING SYSTEM

In shell script programming, predicates are often used. There are two ways to use predicates, one is to use test, and the other is to use []. Let's take a look at how to use these two methods through two simple examples. Example 1 # test –

How to use the Linux file remote copy command scp

Publish Date:2025/04/08 Views:151 Category:OPERATING SYSTEM

Scp copies files between two hosts over the network, and the data is encrypted during transmission. Its underlying layer uses ssh for data transmission. And it has the same authentication mechanism and the same security level as ssh. When u

Scan to Read All Tech Tutorials

Social Media
  • https://www.github.com/onmpw
  • qq:1244347461

Recommended

Tags

Scan the Code
Easier Access Tutorial