<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Want to master Kubernetes access control? 🚀 Join our upcoming webinar!

Search
Close icon
Search bar icon

How to Change User or Root Password in Linux (Command Guide)

StrongDM manages and audits access to infrastructure.
  • Role-based, attribute-based, & just-in-time access to infrastructure
  • Connect any person or service to any infrastructure, anywhere
  • Logging like you've never seen

Like all operating systems, Linux is highly vulnerable to compromised passwords. Recently, one download site served Linux users malware that stole their log-in credentials for more than three years.

That's why regularly changing your passwords in Linux is so important.

This guide will tell you how to do so using simple commands and tools. You'll benefit from the tips below if you're:

  • A regular user wanting to update their password
  • An administrator managing multiple users in a Linux environment
  • Someone trying to reset a forgotten root password

You'll also learn some best practices for securing your Linux system.

Password management is similar across Linux distributions, so system administrators, developers, and regular users can all benefit from this guide.

Tools and Commands for Changing Passwords

You can change passwords with Linux's command-line interface, also known as the terminal.

The most common command is:

passwd

You can use this command to change your own password as well as other users' passwords for both standard and root accounts.

To change your password, simply run "passwd" with Linux's command-line interface.

To change other users' passwords, run the command with superuser privileges by adding "sudo" before "passwd" and then input the username of the person whose password you want to change. Your command should look like this:

sudo passwd <username>

Other commands you might want to use include:

  • chpasswd: great for changing multiple passwords at the same time
  • usermod: helps you lock or unlock user accounts
  • chage: used for managing password expiration policies

How to Change Your Own Password

Changing your password on Linux involves using the "passwd" command and setting your password policies. This process is as follows.

1. Using the 'Passwd' Command

Here's how to change your password in Linux with the "passwd" command:

  • Open the command-line interface.
  • Type "passwd" and press "Enter."
  • Enter your current password when prompted.
  • Enter your new password and confirm it.

Here's an example of the command:

$ passwd

Changing password for user.

Current password: [Enter current password]

New password: [Enter new password]

Retype new password: [Confirm new password]

If your password doesn't meet your security policies, you'll receive an error and will have to try again. 

2. Setting Password Policies

Eighty-four percent of internet users have unsafe passwords for credentials that include their date of birth and other personal information. Learn how to improve your password policies below:

  • To strengthen passwords, administrators can enforce password complexity rules using the "pam_pwquality" module, which is a pluggable authentication module.
  • To change your password expiration policy, use the "chage" command. For example, you can require users to change their passwords every six months.

How to Change Another User's Password

Changing another person's password depends on whether you're a root user or a system administrator.

1. As a Root User

You can change other users' passwords with the "passwd" command if you're a root user. Follow these steps:

  • Open the terminal.
  • Use this command: sudo passwd <username>.
  • Enter your own password to confirm root access.
  • Enter and confirm the new password for the user.

For example:

$ sudo passwd john

Enter new UNIX password: [Enter new password for user]

Retype new UNIX password: [Confirm password]

2. As a System Administrator

The "chpasswd" command lets you batch-change other users' passwords or automate user management as a system administrator.

Here's an example of scripting "chpasswd" for multiple users:

$chpasswd

user1:user1_password

user2:user2_password

user3:user3_password

If you want to improve your Linux security further, StrongDM can help. Our platform simplifies authentication, access management, and activity monitoring, helping you create a safer Linux environment for everyone.

Resetting Forgotten Passwords in Linux

Thankfully, you can quickly reset forgotten passwords in Linux, no matter whether you're a standard or root user.

1. For Standard Users

If you've forgotten your password but have root access, simply use the "passwd" command to reset it:

sudo passwd <your_username>

Then, follow the prompts to set a new password.

2. For Root Users

If you don't know the root password, follow these steps:

  • Restart your system and boot into recovery mode (GRUB menu).
  • Drop to the root shell prompt.
  • Use the passwd command to set a new password for root.
  • Reboot the system after resetting.

This method helps you regain access without having to reinstall Linux.

Advanced Password Management

Here are some tips for more advanced password management in Linux.

1. Password Expiration and History Policies

Linux lets administrators enforce password expiration policies with the "chage" command. To check a user's expiration status, use this command:

sudo chage -l <username>

To force a user to change their password at the next log-in, use this command:

sudo chage -d 0 <username>

This command ensures users regularly update their passwords, which can improve your system's security.

2. Locking and Unlocking User Accounts

The "usermod" command temporarily prevents a user from logging in.

  • To lock an account, run the following: sudo usermod -L <username>.
  • To unlock an account, run the following: sudo usermod -U <username>.

These commands are useful if you suspect someone has compromised an account or you need to revoke a user's access to your system.

Conclusion

Linux lets you improve your password management by running different commands and tools. That way, you can update your credentials, reset forgotten details, and control system access. By requiring complex passwords and keeping your system up to date, you can make your Linux environment more secure.

Now, you can take your security to the next level with StrongDM. Our Zero Trust Privileged Access Management platform helps you improve your authentication process, monitor activity, streamline access management, and ensure the secure management of root credentials. As a result, you can rest easy that only authorized persons have access to your Linux system.

Book a StrongDM demo today.


About the Author

, Zero Trust Privileged Access Management (PAM), the StrongDM team is building and delivering a Zero Trust Privileged Access Management (PAM), which delivers unparalleled precision in dynamic privileged action control for any type of infrastructure. The frustration-free access stops unsanctioned actions while ensuring continuous compliance.

StrongDM logo
đź’™ this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

What Are Microservices in Kubernetes? Architecture, Example & More
What Are Microservices in Kubernetes? Architecture, Example & More
Microservices make applications more scalable and resilient, and Kubernetes is the backbone that keeps them running smoothly. By orchestrating containers, handling service discovery, and automating scaling, Kubernetes simplifies microservices management—but it also introduces complexity. This guide covers key principles, deployment strategies, and security best practices to help you navigate microservices in Kubernetes. Plus, see a modern way of simplifying access and security, so your teams can build faster—without compromising control. Let’s dive in.
How to Create a Cron Job in Linux: Set Up, Examples & More
How to Create a Cron Job in Linux: Set Up, Examples & More
Managing routine Linux tasks like backups and service restarts can be overwhelming. Cron jobs automate these processes, keeping your system running smoothly with minimal effort. This guide covers how to set up, use, and secure cron jobs for seamless automation.
Linux Privilege Escalation: Techniques, Prevention & More
Linux Privilege Escalation: Techniques, Prevention & More
Curious about how Linux privilege escalation attacks occur? Our in-depth article explores the top techniques and methods that attackers use and how you can prevent them.
What Is Kubernetes Observability? Best Practices, Tools & More
Kubernetes observability is the practice of monitoring and analyzing a Kubernetes environment through metrics, logs, and traces to gain visibility into system performance and health. It enables teams to detect and resolve issues proactively, optimize resource utilization, and maintain cluster reliability through real-time insights and automated monitoring tools.
What Is Kubernetes Ingress? Guide to K8s Traffic Management
What Is Kubernetes Ingress? Guide to K8s Traffic Management
This article breaks down Kubernetes Ingress, explaining how it manages external access to services, routing configurations, and best practices. You’ll learn how Ingress differs from Load Balancers, how controllers enforce routing rules, and how to choose the right setup for your needs.