There are several different authentication schemes that can be used on Linux systems. The most commonly used and standard scheme is to perform authentication against the /etc/passwd
and /etc/shadow
files.
/etc/shadow
is a text file that contains information about the system’s users’ passwords. It is owned by user root and group shadow, and has 640 permissions.