How to Change the Root Password in Linux
Sponsor message — This article is made possible by Dargslan.com, a publisher of practical, no-fluff IT & developer workbooks.
Why Dargslan.com?
If you prefer doing over endless theory, Dargslan’s titles are built for you. Every workbook focuses on skills you can apply the same day—server hardening, Linux one-liners, PowerShell for admins, Python automation, cloud basics, and more.
How to Change the Root Password in Linux
System security stands as the cornerstone of any well-maintained Linux environment, and the root password serves as the primary guardian of your entire operating system. When this credential becomes compromised, outdated, or simply forgotten, the ability to modify it quickly and correctly becomes not just a convenience but a critical necessity. Whether you're a system administrator managing multiple servers or a home user taking control of your personal machine, understanding the mechanics of root password modification empowers you to maintain security standards and recover from potentially catastrophic access issues.
The root account represents the superuser with unlimited privileges across the entire Linux system, capable of executing any command, modifying any file, and controlling every aspect of system operation. Changing this password involves several distinct approaches depending on your current access level, the specific Linux distribution you're running, and whether you're working with physical hardware or remote systems. Each method carries its own security implications, technical requirements, and appropriate use cases that demand careful consideration.
Throughout this comprehensive resource, you'll discover multiple proven techniques for modifying root credentials, from straightforward command-line procedures when you have existing access to recovery methods when you're locked out completely. You'll learn about the underlying security mechanisms that protect these changes, understand the differences between various Linux distributions, explore troubleshooting strategies for common complications, and gain practical knowledge about maintaining password security in professional environments.
Understanding Root Access and Password Security
The root user account exists as a fundamental component of Unix-like operating systems, including all Linux distributions. This account operates without the restrictions applied to regular users, making it simultaneously the most powerful and most dangerous account on any system. When you execute commands as root, the system performs them without question, which means a single mistyped command could potentially destroy data, corrupt system files, or render the entire operating system inoperable.
Modern Linux distributions have evolved their approach to root access, with many now favoring the sudo mechanism over direct root login. Ubuntu, for instance, disables the root account by default and requires users to prefix administrative commands with sudo. Other distributions like Red Hat Enterprise Linux, CentOS, and traditional Debian installations maintain active root accounts with passwords set during installation. Understanding which model your system uses determines the appropriate method for password modification.
"The root password represents the ultimate key to your system's kingdom. Treating it with anything less than maximum security consideration invites disaster."
Password strength matters exponentially more for root accounts than for regular users. A compromised root password grants an attacker complete control over your system, allowing them to install malware, steal data, create backdoors, or use your machine as a launching point for attacks on other systems. Security professionals recommend root passwords contain at least 16 characters combining uppercase and lowercase letters, numbers, and special symbols, avoiding dictionary words, personal information, or predictable patterns.
Prerequisites and Preparation
Before attempting to modify the root password, you need to assess your current access situation and gather necessary information. The requirements differ significantly depending on whether you currently have root access, sudo privileges, or no administrative access at all. Taking time to verify these conditions prevents wasted effort on methods that won't work in your specific situation.
Current access verification should be your first step. Open a terminal and try executing sudo -v to check if you have sudo privileges. If this succeeds, you can proceed with sudo-based methods. Alternatively, try su - and enter the current root password if you know it. Successfully switching to root means you can use direct root methods. If both fail, you'll need to use recovery procedures that require physical access to the machine or console access in virtual environments.
| Access Level | Available Methods | Requirements | Difficulty |
|---|---|---|---|
| Root access available | Direct passwd command, root shell modification | Current root password or logged in as root | Easy |
| Sudo privileges | sudo passwd root, sudo -i then passwd | User account with sudo rights, user password | Easy |
| No administrative access | Single-user mode, rescue mode, live USB/CD | Physical access or console access, bootloader access | Moderate to Advanced |
| Remote system without access | Out-of-band management (IPMI, iLO, iDRAC) | Management interface credentials, network access | Advanced |
Backup considerations become critical before making changes to system authentication. While changing a password seems straightforward, complications can arise that leave you locked out entirely. For systems running critical services, document your current configuration, ensure you have alternative access methods available, and consider maintaining a live USB or recovery disk specifically for emergency access situations.
Changing Root Password with Existing Root Access
When you already possess root access, either through direct login or by switching users with su, the password change process becomes remarkably straightforward. This scenario represents the ideal situation, offering the simplest path to updating credentials while maintaining full control over the process.
The passwd command serves as the standard utility for password modification across all Linux distributions. After logging in as root or switching to the root account, simply execute passwd without any arguments. The system will prompt you to enter the new password twice for confirmation. Unlike when changing passwords for regular users, root can modify its own password without providing the current password first, which proves useful when the existing password is unknown or forgotten.
Step-by-step process:
- 🔐 Access the root account using
su -and entering the current root password - Execute the
passwdcommand without additional parameters - Enter your new password when prompted (note that characters won't display as you type)
- Re-enter the identical password for verification
- Observe the confirmation message indicating successful password update
Password complexity requirements may prevent you from setting weak passwords on modern Linux systems. If the system rejects your chosen password, it typically indicates the password fails to meet minimum security standards. These standards often include minimum length requirements, character diversity mandates, and checks against common password dictionaries. While root can technically override these restrictions using the --force flag, doing so dramatically compromises system security and should be avoided except in testing environments.
"Never underestimate the importance of password complexity. What seems like paranoia today becomes vindication when you successfully repel an attack tomorrow."
Alternative Direct Methods
Beyond the standard passwd utility, several alternative approaches exist for direct root password modification. The chpasswd command allows batch password updates, useful for scripting scenarios where you need to update multiple accounts simultaneously. You can pipe a username:password combination directly into chpasswd, though this method requires extreme caution regarding command history and script security since passwords appear in plain text.
Some administrators prefer using openssl to generate encrypted password strings that can be inserted directly into /etc/shadow, bypassing interactive password entry entirely. This advanced technique requires understanding shadow file format and proper encryption methods, but it enables password changes in automated deployment scenarios where interactive prompts aren't feasible.
Using Sudo to Change Root Password
Systems configured with sudo access provide an alternative pathway to root password modification that doesn't require knowing the current root password. This approach has become increasingly common, particularly in Ubuntu-based distributions and cloud environments where direct root login is intentionally disabled for security reasons.
When your user account belongs to the sudo group or wheel group (depending on distribution), you can execute administrative commands by prefixing them with sudo and entering your own user password rather than the root password. To change the root password using this method, execute sudo passwd root. The system will first authenticate you by requesting your user password, then prompt you to enter the new root password twice.
Important distinctions exist between this method and direct root access. When using sudo, the system logs your actions, creating an audit trail of who changed the root password and when. This accountability mechanism serves as a critical security feature in multi-administrator environments. Additionally, sudo access can be configured with fine-grained controls, potentially allowing password changes while restricting other root-level operations.
Security considerations when using sudo:
- Verify you're the only person with sudo access before changing the root password
- Understand that sudo access essentially equals root access in most configurations
- Check
/etc/sudoersto understand your exact privilege level - Consider whether changing the root password might lock out other administrators
- Remember that sudo sessions typically remain active for several minutes after authentication
Sudo Configuration and Password Policies
The sudo mechanism operates according to rules defined in /etc/sudoers and files within /etc/sudoers.d/. These configuration files determine which users can execute which commands, whether password authentication is required, and how long sudo sessions remain active. Understanding your sudo configuration helps you recognize whether you can actually change the root password and what restrictions might apply.
Some organizations implement sudo configurations that allow specific administrative tasks while explicitly forbidding root password changes. The sudoers file might contain entries like User ALL=(ALL) ALL, !/usr/bin/passwd root which grants broad sudo access while specifically excluding the ability to modify root's password. If your sudo passwd root attempt fails with a permission denied error despite having general sudo access, such a restriction likely exists.
Recovery Methods When Locked Out
Losing root access creates a serious situation, but Linux provides several recovery mechanisms that allow regaining control without reinstalling the operating system. These methods require physical access to the machine or console access in virtualized environments, emphasizing why physical security matters as much as digital security.
"Physical access to a machine essentially means game over for security. Recovery methods prove this principle while simultaneously providing legitimate administrators with necessary escape hatches."
Single-user mode represents the traditional recovery method for Unix-like systems. This special boot mode starts the system with minimal services, typically dropping you directly into a root shell without requiring password authentication. The exact procedure for entering single-user mode varies by distribution and bootloader configuration, but generally involves interrupting the boot process and modifying kernel parameters.
GRUB Bootloader Method
Most modern Linux systems use GRUB2 as their bootloader, which provides straightforward access to boot parameters. During system startup, when the GRUB menu appears, press 'e' to edit boot parameters. Locate the line beginning with 'linux' or 'linux16' that loads the kernel. At the end of this line, add either init=/bin/bash or single depending on your distribution.
After modifying the boot parameters, press Ctrl+X or F10 to boot with these temporary changes. The system will start in single-user mode or drop you into a bash shell with root privileges. Before you can modify passwords, you must remount the root filesystem as read-write using mount -o remount,rw /. Then execute passwd root to set a new password, followed by sync to ensure changes are written to disk, and finally reboot -f to restart normally.
| Distribution Family | Boot Parameter | Alternative Parameter | Special Notes |
|---|---|---|---|
| Debian/Ubuntu | init=/bin/bash | single | May need to disable recovery mode password on some versions |
| Red Hat/CentOS 7 | rd.break | init=/bin/bash | System mounted at /sysroot in rd.break mode |
| Red Hat/CentOS 8+ | rd.break enforcing=0 | init=/bin/bash | SELinux requires additional relabeling or temporary disable |
| Arch Linux | init=/bin/bash | single | Standard procedure, no special considerations |
Live USB Recovery Method
When bootloader access is restricted or single-user mode fails, booting from external media provides an alternative recovery path. Create a bootable USB drive with any Linux distribution (many administrators keep a SystemRescue or Ubuntu live USB for such purposes). Boot from this external media, then mount your system's root partition to access and modify its files.
After booting the live environment, identify your system's root partition using lsblk or fdisk -l. Mount this partition to a directory like /mnt using mount /dev/sdXY /mnt where sdXY represents your root partition. To change the root password, you need to use chroot to change into your system's environment: chroot /mnt. Once inside the chroot environment, execute passwd to set a new root password, then exit the chroot and reboot.
SELinux and Security Context Considerations
Systems running SELinux (Security-Enhanced Linux) require additional steps during recovery procedures. When you modify files while booted into single-user mode or from live media, the security contexts of modified files may become incorrect. After changing the root password through recovery methods on SELinux systems, you must either relabel the entire filesystem or at minimum relabel the shadow file.
For CentOS, RHEL, and Fedora systems, create a file named /.autorelabel before rebooting: touch /.autorelabel. This triggers an automatic filesystem relabeling on the next boot. Alternatively, temporarily disable SELinux enforcement by adding enforcing=0 to the kernel boot parameters, allowing you to boot normally after the password change, then manually relabel using restorecon /etc/shadow before re-enabling enforcement.
"SELinux often frustrates administrators during recovery procedures, but these same security mechanisms that complicate recovery also prevent attackers from easily compromising your system."
Distribution-Specific Procedures
While the fundamental concepts of root password modification remain consistent across Linux distributions, specific implementations vary enough to warrant detailed attention. Understanding these distribution-specific nuances prevents frustration and failed attempts when working across different systems.
Ubuntu and Debian-Based Systems
Ubuntu takes a distinctive approach to root access by disabling the root account entirely in default installations. Instead of setting a root password during installation, Ubuntu grants the first user account full sudo privileges. This design philosophy emphasizes the sudo model over direct root login, providing better accountability and reducing the risk of accidentally executing dangerous commands as root.
To enable the root account on Ubuntu or set its password for the first time, use sudo passwd root. After setting a password, the root account becomes active and can be used with su - or for direct login if you modify the SSH configuration. However, Ubuntu's design intentionally discourages this practice. Most Ubuntu administrators work exclusively through sudo, never actually enabling direct root login.
Debian offers both options during installation: you can set a root password (enabling traditional root access) or leave it blank (activating the Ubuntu-style sudo model). If you set a root password during Debian installation, the system behaves like traditional Unix with an active root account. If you leave it blank, the installer automatically configures sudo for the first user account.
Red Hat, CentOS, and Fedora
Red Hat Enterprise Linux and its derivatives maintain the traditional Unix model with an active root account configured during installation. These distributions use the wheel group to control sudo access, requiring explicit addition of users to this group before they can execute administrative commands.
Password changes on RHEL-based systems follow standard procedures, but recovery methods differ slightly. Red Hat 7 and newer versions use rd.break as the preferred boot parameter for recovery mode rather than single or init=/bin/bash. When using rd.break, the system mounts your root filesystem at /sysroot rather than at root, requiring you to execute chroot /sysroot before changing the password.
SELinux integration is deeper in RHEL systems than in most other distributions, making the relabeling step critical after password recovery. Failing to relabel or disable SELinux temporarily will result in authentication failures even with the correct new password, as SELinux blocks access to files with incorrect security contexts.
Arch Linux and Derivatives
Arch Linux maintains a minimalist philosophy that extends to system administration. The installation process requires manual root password configuration, and the system provides no hand-holding for password management. This distribution assumes administrator competence and provides direct access to underlying mechanisms without safety abstractions.
Standard password change procedures work identically on Arch as on other distributions, but the lack of distribution-specific tools means you work directly with core utilities. Recovery procedures follow the straightforward init=/bin/bash method without additional complexity from security frameworks or distribution-specific modifications.
Remote System Password Changes
Changing root passwords on remote systems introduces additional complexity and risk. Without physical access, a mistake during the password change process could lock you out permanently, requiring expensive datacenter visits or complete system reinstallation. These scenarios demand extra caution and preparation.
"Changing a root password remotely without a backup access method is like cutting the branch you're sitting on. Always ensure you have a safety net before proceeding."
Before attempting remote password changes, verify you have alternative access methods available. Cloud providers typically offer console access through their web interfaces. Physical servers should have out-of-band management configured (IPMI, HP iLO, Dell iDRAC, or similar) providing independent access to the system regardless of the operating system state. Virtual machines can be accessed through the hypervisor's console interface. Never change a remote root password without confirming at least one backup access method works.
Safe Remote Password Change Procedure
The safest approach to remote password changes involves maintaining your current SSH session active while testing the new password in a separate session. After connecting via SSH and gaining root access, change the password using passwd but do not close your existing session. Open a new terminal and attempt to SSH to the system using the new password. Only after successfully authenticating with the new password should you close the original session.
This procedure protects against several common problems: typos when entering the new password, SSH configuration issues that prevent root login, and PAM (Pluggable Authentication Modules) misconfigurations that might reject the new password. If the test connection fails, you still have your original session active to investigate and correct the problem.
SSH Configuration Considerations
SSH server configuration significantly impacts remote root access. The /etc/ssh/sshd_config file contains a PermitRootLogin directive that controls whether root can authenticate via SSH. Common values include yes (allow root login with password), prohibit-password (allow root login only with SSH keys), forced-commands-only (allow root login only for specific commands), and no (completely disable root SSH access).
Many security-conscious organizations set PermitRootLogin prohibit-password, allowing root access only through SSH key authentication. In these environments, changing the root password doesn't affect SSH access since password authentication is disabled for root. Understanding your SSH configuration prevents confusion when password changes don't produce expected results for remote access.
Troubleshooting Common Issues
Despite following procedures correctly, various complications can arise during root password modification. Understanding common failure modes and their solutions helps you recover from problems quickly without resorting to drastic measures like system reinstallation.
Password Rejected Despite Correct Entry
When the system rejects a password you're certain is correct, several underlying causes might be responsible. The most common culprit involves keyboard layout mismatches, particularly when using recovery mode or live media that defaults to a different keyboard layout than you expect. Special characters and symbols appear in different positions on various keyboard layouts, causing what you type to differ from what the system receives.
PAM configuration issues can also cause authentication failures with correct passwords. Examine /etc/pam.d/common-auth or /etc/pam.d/system-auth for misconfigurations. Corrupted PAM modules or incorrect module parameters can prevent authentication even when passwords are correct. The pam_faillock module, which locks accounts after repeated failed login attempts, sometimes triggers unexpectedly, requiring manual reset.
Permission Denied When Attempting Password Change
Receiving permission denied errors when executing passwd as root seems contradictory since root should have unlimited permissions. This situation typically indicates filesystem problems, specifically when the root filesystem is mounted read-only. Verify filesystem mount status with mount | grep " / " and remount as read-write if necessary using mount -o remount,rw /.
SELinux or AppArmor security policies can also prevent password changes even when executed as root. Check getenforce to verify SELinux status, and examine dmesg or /var/log/audit/audit.log for denial messages. Temporarily setting SELinux to permissive mode (setenforce 0) helps identify whether security policies cause the problem.
System Boots to Emergency Mode After Password Change
If your system enters emergency mode after changing the root password through recovery procedures, filesystem or SELinux issues are likely responsible. When modifying system files from single-user mode or live media, filesystem journals might not be properly updated, or security contexts might become incorrect.
Boot into recovery mode again and run fsck on your root filesystem to check and repair filesystem errors. For SELinux systems, ensure you created the /.autorelabel file before rebooting. If you forgot this step, boot into recovery mode again, create the file, and reboot. The relabeling process can take several minutes on systems with many files, but it's essential for proper SELinux operation.
Security Best Practices
Changing the root password represents just one component of comprehensive system security. The password itself matters, but equally important are the policies and practices surrounding password management, access control, and security monitoring.
Password complexity requirements should be enforced through PAM configuration rather than relying on administrator discipline. The pam_pwquality module provides extensive password strength checking, including minimum length, character class requirements, and dictionary checks. Configure this module in /etc/security/pwquality.conf to establish organization-wide password standards that apply automatically to all password changes.
Essential security practices for root password management:
- ⚡ Change root passwords immediately after system installation or when taking over administration of existing systems
- 🔒 Use password managers to generate and store complex passwords securely rather than relying on memory
- 📝 Maintain encrypted documentation of root passwords for critical systems with access controls limiting who can decrypt them
- 🔄 Rotate root passwords on a regular schedule, with frequency determined by system criticality and exposure
- 👥 Implement sudo for day-to-day administration, reserving direct root access for exceptional circumstances
Audit Logging and Monitoring
Every root password change should be logged and monitored. The auditd daemon provides comprehensive system auditing capabilities, including tracking password changes. Configure audit rules to specifically monitor /etc/shadow modifications: auditctl -w /etc/shadow -p wa -k password_changes. These logs create accountability trails showing who changed passwords and when.
Integrate these logs with centralized logging systems and SIEM (Security Information and Event Management) platforms when available. Automated alerts for unexpected password changes provide early warning of potential security incidents. In environments with multiple administrators, unexpected root password changes might indicate a compromised account or insider threat.
Multi-Factor Authentication for Root Access
Modern security practices increasingly require multi-factor authentication even for root access. While traditional password-only authentication remains common, implementing additional authentication factors significantly improves security. Google Authenticator PAM module, YubiKey integration, or hardware token requirements can be added to root authentication, making unauthorized access substantially more difficult.
For SSH access, certificate-based authentication provides stronger security than passwords alone. Configure SSH to require both a valid certificate and a password, or implement certificate-based authentication with hardware tokens. These approaches ensure that even if the root password becomes compromised, attackers cannot access the system without also possessing the additional authentication factor.
Automation and Configuration Management
In environments managing multiple systems, manually changing root passwords on each machine becomes impractical. Configuration management tools and automation frameworks provide scalable approaches to password management across infrastructure.
Tools like Ansible, Puppet, Chef, and SaltStack can automate password changes across entire server fleets. These tools typically use encrypted password hashes rather than plain text passwords in their configurations, maintaining security while enabling automation. Ansible's user module, for example, can update root passwords across hundreds of systems with a single playbook execution.
When implementing automated password management, several security considerations become critical. Password hashes in configuration management repositories should be encrypted using tools like Ansible Vault, ensuring that even if the repository is compromised, passwords remain protected. Rotation schedules should be automated but include verification steps ensuring systems remain accessible after password changes.
Secrets Management Solutions
Enterprise environments increasingly use dedicated secrets management platforms like HashiCorp Vault, AWS Secrets Manager, or Azure Key Vault to handle sensitive credentials including root passwords. These systems provide centralized password storage, automated rotation, detailed access auditing, and integration with configuration management tools.
Secrets management platforms typically support dynamic password generation, creating unique passwords for each system and automatically rotating them on defined schedules. This approach eliminates password reuse across systems while maintaining administrative access through the secrets management interface. When an administrator needs root access, they request credentials from the secrets manager, which provides temporary passwords that expire after use.
Legal and Compliance Considerations
Root password management intersects with various legal and regulatory requirements that organizations must consider. Compliance frameworks like PCI DSS, HIPAA, SOX, and GDPR include specific requirements regarding privileged access management, password policies, and audit logging.
PCI DSS, for example, requires that passwords for privileged accounts be changed at least every 90 days and that password parameters meet minimum complexity standards. HIPAA mandates audit logging of all access to systems containing protected health information, including tracking privileged account usage. Organizations subject to these regulations must implement technical controls ensuring root password management meets compliance requirements.
Documentation requirements extend beyond technical implementation. Compliance audits typically require written policies describing password management procedures, evidence that these policies are followed, and records of password changes. Maintain documentation showing when passwords were changed, who authorized the changes, and what verification procedures were followed to ensure continued system access.
Advanced Topics and Edge Cases
Encrypted Home Directories and Password Changes
Systems using encrypted home directories introduce complications when changing root passwords through recovery methods. If the root home directory is encrypted using the root password as a key component, changing the password without properly updating the encryption keys will render the encrypted data inaccessible.
Ubuntu's eCryptfs-based home directory encryption requires running ecryptfs-rewrap-passphrase after changing passwords to update the encryption wrapper. Failing to perform this step means the encrypted home directory cannot be decrypted with the new password. Similar considerations apply to systems using LUKS full-disk encryption where the root password serves as one of the unlock keys.
Cloud and Container Environments
Cloud virtual machines and containerized environments present unique password management challenges. Many cloud providers inject SSH keys during instance creation and disable password authentication entirely. In these environments, "changing the root password" often means managing SSH keys rather than traditional passwords.
Container environments like Docker typically discourage root passwords altogether. Containers are designed to be immutable and ephemeral, with access controlled through the container runtime rather than traditional authentication. When root access to containers is necessary, it's typically achieved through docker exec or kubectl exec commands that bypass traditional authentication entirely.
LDAP and Centralized Authentication
Systems integrated with LDAP, Active Directory, or other centralized authentication systems require special consideration. In these environments, the local root password might be disabled or unused, with all authentication flowing through the central directory. Changing the local root password doesn't affect actual access if the system is configured for centralized authentication.
Understanding the authentication stack becomes critical. Examine /etc/nsswitch.conf and PAM configuration to determine whether the system uses local authentication, centralized authentication, or a combination. Some systems maintain local root passwords as a fallback when the central authentication system is unavailable, while others completely disable local authentication for all accounts including root.
Frequently Asked Questions
Can I change the root password without knowing the current password?
Yes, you can change the root password without knowing the current one using several methods. If you have sudo access with another account, use sudo passwd root to set a new password. Without any administrative access, boot into single-user mode or use a live USB to gain root access and change the password. However, these methods require physical access to the machine or console access in virtual environments, which is intentional from a security perspective.
What's the difference between changing the root password and changing my password while logged in as root?
When logged in as root, running passwd without arguments changes the root account's password. To change another user's password while logged in as root, specify the username: passwd username. Root can change any user's password without knowing their current password, which is one reason root access requires such careful protection. The command syntax determines which account's password gets modified.
Why does my system say the root account is locked or disabled?
Many modern Linux distributions, particularly Ubuntu and its derivatives, disable direct root login by default as a security measure. The root account exists but has no password set, preventing direct login. Administrative tasks are performed through sudo instead. You can enable root login by setting a password with sudo passwd root, but most administrators recommend continuing to use sudo rather than enabling direct root access.
Will changing the root password affect running services or logged-in users?
No, changing the root password does not affect currently running services or existing logged-in sessions. Services running as root continue operating normally, and users already logged in (including root sessions) remain active. The new password only applies to future authentication attempts. This means you can safely change the root password without causing service disruptions or disconnecting active users.
How do I recover if I changed the root password but can't log in with it?
If you cannot authenticate with the new password, boot into single-user mode or use a live USB to access the system without authentication. Once you have root access through recovery mode, change the password again, being extremely careful about typing and confirming the new password. Consider using a simple temporary password initially to eliminate typos, then changing it to a complex password after verifying you can log in successfully. Also verify that your keyboard layout matches what you expect, as this is a common source of authentication failures.
Should I ever share the root password with other administrators?
Sharing root passwords is generally discouraged in professional environments. Instead, grant other administrators sudo access or create separate privileged accounts for each person. This approach maintains accountability through individual accounts while providing necessary administrative capabilities. If you must share root access in smaller environments, use a password manager to securely distribute the credentials and ensure everyone understands the responsibility that comes with root access. Change the root password whenever someone with knowledge of it leaves the organization.