Finishing the Installation

After completing the basic system setup and the installation of all selected software packages, provide a password for the account of the system administrator (the root user). Then configure your Internet access and network connection, if available. With a working Internet connection, it is possible to update the system with security patches and software updates during installation. If desired, configure a name server for centralized user administration in a local network. Also configure any hardware devices, such as printers and scanners.

root Password

root is the name of the superuser, the administrator of the system. Unlike regular users, which may or may not have permission to do certain things on the system, root has unlimited power to do anything: changing the system configuration, installing programs, and setting up new hardware. If users forget their passwords or have other problems with the system, root can help. The root account should only be used for system administration, maintenance, and repair. Logging in as root for daily work is rather risky: a single mistake could lead to many system files being irretrievably lost.

Figure 2.13: “Setting the root Password” shows the relevant dialog. For verification purposes, the password for root must be entered twice. Do not forget the root password. It cannot be retrieved later.


The user root has all the permissions needed to make changes to the system. To carry out such tasks, the root password is required. You cannot carry out any administrative tasks without this password.

Figure 2.13. Setting the root Password

Setting the root Password

Network Configuration

In this step, configure network devices for a connection to the outside world. If you have these devices, such as network cards, modems, and ISDN or DSL hardware, it is a good idea to configure them now. An Internet connection allows YaST to retrieve any available SuSE Linux updates.

Figure 2.14. Configuring the Network Devices

Configuring the Network Devices

Directions for configuring network hardware are available in Section “Network Devices”, where the necessary steps are described. If preferred, configure your network devices later from the installed system. To do so, select Skip Network Configuration then Accept.

Testing the Internet Connection

If you configured an Internet connection, you can test it right now. For this purpose, YaST establishes a connection to the SuSE server and checks if any product updates are available for your version of SuSE Linux. Also, the latest release notes are downloaded. Any available updates can be installed in the next step.

Figure 2.15. Testing the Internet Connection

Testing the Internet Connection

If you do not want to test the connection at this point, select Skip Test then Next. This also skips downloading product updates and release notes.

Loading Software Updates

If YaST was able to connect to the SuSE servers, select whether to perform a YaST online update. If there are any patched packages available on the servers, you can download and install them now to fix known bugs or security issues.


The download of updates might take quite some time, depending on the bandwidth of the Internet connection and on the size of the update files.

To perform a software update immediately, select Perform Update Now and click OK. This opens YaST's online update dialog with a list of the available patches (if any), which can be selected and loaded. To learn about the process, read Section “YaST Online Update”. This kind of update can be performed at any time after the installation. If you prefer not to update now, select Skip Update then click OK.

User Authentication

If the network access been configured successfully during the previous steps of the installation, you now have two different possibilities for managing user accounts on your system.

Local User Administration

Using this method, users are managed locally — on the installed machine. This is the typical solution for stand-alone workstations.

User Administration with NIS or LDAP

This method is mostly used in organizations to manage workstations on a department-wide basis. The user administration for the entire department is carried out on a central host or name server, making the creation of local accounts unnecessary. In fact, the method could be chosen because local accounts are undesirable.

If all requirements are met, YaST opens a dialog in which to select the user administration method. It is shown in Figure 2.16: “User Authentication”. If you do not have the necessary network connection local user accounts can still be created.

Figure 2.16. User Authentication

User Authentication

Configuring the Host as a NIS Client

If you have decided to manage user accounts through NIS, configure the host as a NIS client. A NIS-enabled network requires some expert knowledge. The details of NIS are explained in the Administrationshandbuch. The following only explains the basic setup of the client side.

Figure 2.17. NIS Client Configuration

NIS Client Configuration

In the following dialog, shown in Figure 2.17: “NIS Client Configuration”, first select whether the host has a fixed IP address or gets one via DHCP. DHCP also provides the NIS domain and the NIS server. For information about DHCP, see DHCP in the Administration Guide. If a static IP address is used, specify the NIS domain and the NIS server manually.

To search for NIS servers broadcasting in the network, check the relevant option. You can also specify several NIS domains and set a default domain. For each domain, you can select Edit to specify several server addresses or enable the broadcast function on a per-domain basis.

In the expert settings, use Answer to the Local Host Only to prevent other network hosts from being able query which server your client is using. If you activate Broken Server, responses from servers on unprivileged ports are also accepted.For more information, refer to the man page of ypbind.

Creating Local User Accounts

When user accounts are created locally, any data related to user accounts (name, login, password, and so on) are stored and managed on this host.

Linux is an operating system that allows several users to work on the same system at the same time. Each user needs a user account to log in to the system. By having user accounts, the system gains a lot in terms of security. Regular users cannot change or delete files needed for the system to work properly. Similarly, the personal data of a given user cannot be modified, viewed, or tampered with by other users. Each user can set up his own working environment and always find it unchanged when logging back in.

Figure 2.18. Entering the User Name and Password

Entering the User Name and Password

A user account can be created using the dialog shown in Figure 2.18: “Entering the User Name and Password”. After entering the first name and last name, specify the user name (login). If you cannot think of a suitable user name, click Suggestion for the system to generate one automatically.

Finally, enter a password for the user. Reenter it for confirmation (to ensure that you did not type something else by mistake). The user name tells the system who a user is and the password is used to verify this identity.


Remember both your user name and the password because they are needed each time you log in to the system.

To provide effective security, a password should be between five and eight characters long. The maximum length for a password is 128 characters, but if no special security modules are loaded, only the first eight characters are used to identify the password.

Linux distinguishes between lowercase and uppercase letters in the password. Accented characters and umlauts are not allowed. Special characters and the digits 0–9 may be used.

Reading the Release Notes

After completing the user authentication setup, YaST displays the release notes. They contain important up-to-date information not available when the manuals were printed. If you have installed update packages, the most recent version of the release notes is available.