The point is, nobody should not be given root privileges. Especially not to every user. And none other user can be made exactly as root is. But you can give root permissions for some task
(command), for example, for a user. A very common and should-be-known method for this is using sudo
: with sudo you can configure which users can use root privileges
and for which commands -- with their own passwords or without a password (don't do that). You'll need to add those users into the group sudoers
first, usually, and then configure /etc/sudoers
to give the appropriate permissoins on commands. Or do the trick for a given group and then add those users to that group.
A shorter method is to use su
to become root, but it needs the root password -- and that password should not be known to anybody else than root. Simply
fill in root password and tadaa, you're logged in as root. But like I said, don't give root password to other people, because after that they can do whatever they will -- even wreck havoc the system and start doing bad things for others. Better use sudo
and grant limited root privileges to the commands they need to use; for file permissions it's usually wiser to let a certain created group own the files/have access to them and then add the preferred users to that group. Only grant root permissions if it's absolutely necessary, if even then, and only as little as possible. Too much privileges = too much damage.