Sponsored Content
Full Discussion: Guide for Unix admin
Top Forums UNIX for Advanced & Expert Users Guide for Unix admin Post 302293796 by pupp on Tuesday 3rd of March 2009 10:41:05 PM
Old 03-03-2009
virtualize if you need more then one server and don't feel like spending the number. use vmware of instance. also, solaris 10 (and 9) have zones or containers. sol10 zones are pretty big these days and putting them on a zfs filesystem will definitely get you into the realm of sys admin. i'm a solaris admin so much of my resources come from docs.sun.com. if you take a look at the basic and advanced sys admin collections, you will definitely start learning.

all the applications you are speaking about can all be done without any cost to you. btw, man pages are your collective bible.
 

10 More Discussions You Might Find Interesting

1. Tips and Tutorials

Read this if you are serious about being a Unix Admin...

Okay someone posted this as a response to a newbie question about books and resources and the ever popular "What should I read to be a good unix admin " newbie question... I feel this should be a sticky, because after having read a good portion of it since yesterday, I noticed the... (0 Replies)
Discussion started by: Kelam_Magnus
0 Replies

2. HP-UX

Lost both Unix Admin's ....need help

Hi all, I know nothing about unix. Both of our unix guys left for greener pastures. I have been given the task of tring to get 10,000 accounts on a hp ux system into active directory. The accounts don't need to be moved, but they need to be in active directory for a couple of applications. Even if... (0 Replies)
Discussion started by: Bob D
0 Replies

3. UNIX for Dummies Questions & Answers

UNIX Admin Careers

I wish to transition from Mainframe to Open Systems Storage Administration. How much training would I need in order to meet requirements for an AIX Administrator position? (3 Replies)
Discussion started by: ednan171
3 Replies

4. Advertise with Us

Where are the UNIX Admin Jobs?

Greetings.... I have asked this question before, and gotten the "go to school response" and the "help desk job" response, the problem is, these positions require experience, and I have not found a company willing to hire me. I have complete a Unix Fundamentals course, and I plan to continue my... (24 Replies)
Discussion started by: chlordane
24 Replies

5. Advertise with Us

Windows to Unix Admin

Hi, I'm looking a bit of advice on a job offer I've been made. I'm currently a Microsoft Windows Administrator, with good experience in this and also in Novell. I've just been offered a job to re-train as a UNIX Administrator. I'm not sure whether to take it or not. It's more... (4 Replies)
Discussion started by: horhif
4 Replies

6. UNIX for Dummies Questions & Answers

New to UNIX and Linux... need a guide

I want to know about UNIX and Linux. I have Windows7 installed and I would like to know how to start ie 1 softwares needed 2 hardware changes if any 3 any emulator or virtual machine if needed 4 useful links for installation 5 links for study material. Please provide a step by step... (1 Reply)
Discussion started by: ArpitRaj
1 Replies

7. AIX

AIX 101 : Sys Admin Pocket Survival Guide

HOW-TO AIX Admin 101 Sys Admin Pocket Survival Guide - AIX Worth checking it out and printing it. (1 Reply)
Discussion started by: filosophizer
1 Replies

8. UNIX for Dummies Questions & Answers

Guide me in the right direction to develop application for UNIX/Linux

Hi all, Am good in C & C++, i just joined as a fresher in a French IT company. In my own interest and love towards Linux and open source. i want to develop as much as applications for linux. i got the basic training on linux commands, and currently am working really hard to gain more... (11 Replies)
Discussion started by: mr_ganapathy
11 Replies

9. What is on Your Mind?

Jr UNIX Admin Position

Hello. I have worked in a desktop support role for the past 2 years. I was approached at my place of work and offered a job as a junior Unix administrator. All training would be provided. The only experience I have is what I have read about Unix in my free time. Nothing more. I had a... (1 Reply)
Discussion started by: tentex87
1 Replies

10. What is on Your Mind?

Regarding Admin life either as DBA or UNIX Linux admin

I am planning to choose my career as Unix/Linux Admin or a DBA. But I have come to know from forums and few admins like the job will be 24/7. I have few questions on that. Can we get "DAY" shifts in any one of the admin Job ? Can't we have shift timings in any company ? Eventhough the... (7 Replies)
Discussion started by: Jacktts
7 Replies
auth_attr(4)                                                       File Formats                                                       auth_attr(4)

NAME
auth_attr - authorization description database SYNOPSIS
/etc/security/auth_attr DESCRIPTION
/etc/security/auth_attr is a local source for authorization names and descriptions. The auth_attr file can be used with other authorization sources, including the auth_attr NIS map and NIS+ table. Programs use the getauthattr(3SECDB) routines to access this information. The search order for multiple authorization sources is specified in the /etc/nsswitch.conf file, as described in the nsswitch.conf(4) man page. An authorization is a right assigned to users that is checked by certain privileged programs to determine whether users can execute restricted functionality. Each entry in the auth_attr database consists of one line of text containing six fields separated by colons (:). Line continuations using the backslash () character are permitted. The format of each entry is: name:res1:res2:short_desc:long_desc:attr name The name of the authorization. Authorization names are unique strings. Construct authorization names using the following convention: prefix. or prefix.suffix prefix Everything in the name field up to the final dot (.). Authorizations from Sun Microsystems, Inc. use solaris as a prefix. To avoid name conflicts, all other authorizations should use a prefix that begins with the reverse-order Internet domain name of the organization that creates the authorization (for example, com.xyzcompany). Prefixes can have additional arbitrary components chosen by the authorization's developer, with components separated by dots. suffix The final component in the name field. Specifies what is being authorized. When there is no suffix, the name is defined as a heading. Headings are not assigned to users but are constructed for use by applications in their GUIs. When a name ends with the word grant, the entry defines a grant authorization. Grant authorizations are used to support fine-grained delegation. Users with appropriate grant authorizations can delegate some of their authorizations to others. To assign an authorization, the user needs to have both the authorization itself and the appropriate grant authorization. res1 Reserved for future use. res2 Reserved for future use. short_desc A short description or terse name for the authorization. This name should be suitable for displaying in user interfaces, such as in a scrolling list in a GUI. long_desc A long description. This field can explain the precise purpose of the authorization, the applications in which it is used, and the type of user that would be interested in using it. The long description can be displayed in the help text of an application. attr An optional list of semicolon-separated (;) key-value pairs that describe the attributes of an authorization. Zero or more keys may be specified. The keyword help identifies a help file in HTML. EXAMPLES
Example 1: Constructing a Name In the following example, the name has a prefix (solaris.admin.usermgr) followed by a suffix (read): solaris.admin.usermgr.read Example 2: Defining a Heading Because the name field ends with a dot, the following entry defines a heading: solaris.admin.usermgr.:::User Accounts::help=AuthUsermgrHeader.html Example 3: Assigning Separate Authorizations to Set User Attributes In this example, a heading entry is followed by other associated authorization entries. The entries below the heading provide separate authorizations for setting user attributes. The attr field for each entry, including the heading entry, assigns a help file. The applica- tion that uses the help key requires the value to equal the name of a file ending in .htm or .html: solaris.admin.usermgr.:::User Accounts::help=AuthUsermgrHeader.html solaris.admin.usermgr.pswd:::Change Password::help=AuthUserMgrPswd.html solaris.admin.usermgr.write:::Manage Users::help=AuthUsermgrWrite.html Example 4: Assigning a Grant Authorization This example assigns to an administrator the following authorizations: solaris.admin.printer.grant solaris.admin.printer.delete solaris.admin.printer.modify solaris.admin.printer.read solaris.login.enable With the above authorizations, the administrator can assign to others the solaris.admin.printer.delete, solaris.admin.printer.modify, and solaris.admin.printer.read authorizations, but not the solaris.login.enable authorization. If the administrator has both the grant autho- rization, solaris.admin.printmgr.grant, and the wildcard authorization, solaris.admin.printmgr.*, the administrator can grant to others any of the printer authorizations. See user_attr(4) for more information about how wildcards can be used to assign multiple authorizations whose names begin with the same components. Example 5: Authorizing the Ability to Assign Other Authorizations The following entry defines an authorization that grants the ability to assign any authorization created with a solaris prefix, when the administrator also has either the specific authorization being granted or a matching wildcard entry: solaris.grant:::Grant All Solaris Authorizations::help=PriAdmin.html Example 6: Consulting the Local Authorization File Ahead of the NIS Table With the following entry from /etc/nsswitch.conf, the local auth_attr file is consulted before the NIS table: auth_attr:files nisplus FILES
/etc/nsswitch.conf /etc/user_attr /etc/security/auth_attr SEE ALSO
getauthattr(3SECDB), getexecattr(3SECDB), getprofattr(3SECDB), getuserattr(3SECDB), exec_attr(4), nsswitch.conf(4), user_attr(4) NOTES
When deciding which authorization source to use, keep in mind that NIS+ provides stronger authentication than NIS. Because the list of legal keys is likely to expand, any code that parses this database must be written to ignore unknown key-value pairs without error. When any new keywords are created, the names should be prefixed with a unique string, such as the company's stock symbol, to avoid potential naming conflicts. Each application has its own requirements for whether the help value must be a relative pathname ending with a filename or the name of a file. The only known requirement is for the name of a file. The following characters are used in describing the database format and must be escaped with a backslash if used as data: colon (:), semi- colon (;), equals (=), and backslash (). SunOS 5.10 9 Jan 2002 auth_attr(4)
All times are GMT -4. The time now is 03:09 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy