Sponsored Content
Operating Systems AIX Multiple pconsole processes spawning indefinetly Post 302784493 by MichaelFelt on Friday 22nd of March 2013 11:08:02 AM
Old 03-22-2013
Curiosity killed the cat - so I am asking what did you change, what did you set back.

If you want to use RBAC and pconsole you might be able to setup some RBAC for a user.

In any case, you need to let pconsole (if you were planning on using that) create the role for a user (normally pcon_username) for roles needed while using pconsole (or pcons_username - I forget).

The SYSTEM parameter in /etc/security/user should make sure that LDAP is used for login, so username/password is stored in LDAP - while having an additional definition of the USER (will need to run mkuser -R files id=NNN pgid=GGG) to create the user in the local registery.

lsuser username will tell you how AIX sees the user after login.
lsuser -R files username (AIX view local files only)
lsuser -R LDAP username (AIX view using LDAP information only - I think. If it is giving information that is not in AD then it is still going to the files are to fill in blanks (in particular the default: stanzas in /etc/security/*).
 

10 More Discussions You Might Find Interesting

1. Programming

spawning multiple processes spread across two files

I want to spawn n child processes but have two different classes..with the foremost one forking/spawning the child process and the latter performing a function w/ the spawned processes. I can do this in one class with an if statement and the simple if((pid=fork())==0) //child process { ... (1 Reply)
Discussion started by: StrengthThaDon
1 Replies

2. Shell Programming and Scripting

Spawning multiple threads in Unix

Hi, I need to spawn mutilpe threads , each invoking a different set of shell scripts, in parallel. What would be the best way to do that. Any sample script would greatly help. I am a novice at Unix so any help is much appreciated. Thanks (5 Replies)
Discussion started by: neeto
5 Replies

3. UNIX for Advanced & Expert Users

Crontab spawning multiple at processes

Hi - I need help. My user crontab is spawning multiple at processes (and multiple mencoder program starts, that exit, then restart, repeatedly), locking up my system. For example I have this entry in my crontab: $ sudo crontab -u victoria -e * * * * * ~/recordings/pvr1 * * * * *... (10 Replies)
Discussion started by: gstuart
10 Replies

4. Shell Programming and Scripting

multiple processes overlap

Hello I've got a script that creates multiple processes, in ksh, to bcp out 6 tables at a time. In the script, we write messages to the log to show our progress; most of the time, the log messages are nice and neat with one per line, like they should be. But every once in awhile, at random, the... (2 Replies)
Discussion started by: stonemonolith
2 Replies

5. UNIX for Advanced & Expert Users

Help! imapd is spawning multiple processes, all of a sudden, for no reason!

Hi All, I need some assistance, if possible... Our IMAP server has recently (as of 10:30 GMT today) started spawning multiple processes for no reason! This is causing the mail server's load average to increase continually until the whole machine grinds to a halt. Here is a typical... (0 Replies)
Discussion started by: fishsponge
0 Replies

6. AIX

pconsole process hogging

AIX6.1 in topas 'pconsole" processing utilization showing high (48.1 %) in pgsp column what is pconsole process, can kill it Thanks in Advance (0 Replies)
Discussion started by: sunnybee
0 Replies

7. Shell Programming and Scripting

kill multiple processes by name

Want to kill multiple processes by name. for the example below, I want to kill all 'proxy-stagerd_copy' processes. I tried this but didn't work: >> ps -ef|grep proxy_copy root 991 986 0 14:45:34 ? 0:04 proxy-stagerd root 1003 991 0 14:45:49 ? 0:01... (2 Replies)
Discussion started by: catalinawinemxr
2 Replies

8. Shell Programming and Scripting

need help ps -e on multiple processes

:)Hi there, I am new to scripting and wanted to see if someone can show me how to grep on multiple processes and send the output to a file in /home/mydir/output. I am aware of ps -ef | grep on 1 process but need help looking up multiple processes, can you use this command ps -elf | grep |pid1... (4 Replies)
Discussion started by: abbya
4 Replies

9. Shell Programming and Scripting

Shell script executed from Informatica ETL tool is spawning 2 processes for one script

Hi, I am having a shell script which has a while loop as shown below. while do sleep 60 done I am executing this script from Informatica ETL tool command task from where we can execute UNIX commands/scripts. When i do that, i am seeing 2 processes getting started for one script... (2 Replies)
Discussion started by: chekusi
2 Replies

10. Solaris

Script on Solaris spawning 2 processes for one shell script execution

Hi, I am having a shell script on Solaris 10 which has a while loop as shown below. #!/usr/bin/ksh # while do sleep 60 done Name of the shell script is coldcentric.sh. I executed script /DATAWAREHOUSE/LOAD/Scripts/coldcentric.sh from a command task in Informatica worklow as... (3 Replies)
Discussion started by: chekusi
3 Replies
authadm(1M)															       authadm(1M)

NAME
authadm - non-interactive command for administrating the authorization information in the RBAC databases SYNOPSIS
[object [comments]] [object] operation [object] subrole DESCRIPTION
is a non-interactive command that allows users with the appropriate privileges to modify and list authorization information in the and RBAC databases files. HP recommends using only the and commands to edit and view the RBAC databases -- do not edit the RBAC files without these commands. See rbac(5) for more information on these RBAC databases. Options With the exception of the option, all options recognize a default object. If the parameter is specified with a non-empty value in the security default file, then the value of this parameter will be the default object. However, if the parameter does not exist or is set to an empty value, then the default object will be set to a wild card (*). Here is how to specify a value to the parameter in For example: In sets the default object to If line is not present or is commented out, then the default object will be set to "*". recognizes the following options: Adds an authorization pair (operation, object) to the system list of valid authorizations by appending a line to the file. If object is not specified, then a default object will be assigned. The default object will either be a wild card (*) or the object specified in the security default configuration file, A comment may not be specified when adding an entry that refers to the default object in The only way to add a comment to an entry with the option is to specify the object explicitly. Deletes an authorization from the system list of valid authorizations. If object is not specified, then a default object will be assumed. The default object will either be a wild card (*) or the object specified in the security default configuration file, If the authorization exists in deletes the entry. If the specified authorization is assigned to any roles in will remove the autho- rization from the role. If the specified authorization exists in an entry in will remove the entire entry. If the authorization does not exist in returns an error message. See the section below for more information. Assigns an authorization pair to a role. verifies the role exists in before verifying the authorization pair exists in appends the authorization to the role to authorization mapping in if the role and authorization pair exists. If object is not specified, then a default object will be assigned. The default object will either be a wild card (*) or the object specified in the security default configuration file, Assigns a role to another different role. The role being assigned to the other different role is referred to as a A subrole is any valid role defined in the database. The option allows hierarchical role definition (one role can inherit other subrole). After assigning a subrole to another role, that role will also have all the authorizations of the subrole, and any of its subroles. More than one subrole can be assigned to other different role. verifies the role and subrole exist in It also verifies that there is no recursive definitions of the role and subrole. (If "role1" has a subrole of "role2", and if you try to "role1" to "role2", this will cause a recursive definition of both "role1" and "role2"). appends the subrole to the role to authorization mapping in Revokes an authorization from the specified role in If no authorization is specified, revokes all the authorizations for the given role. If object is not specified, then a default object will be assumed. The default object will either be a wild card (*) or the object specified in the security default configuration file, The file will be modified by the command. Revokes a subrole from the specified role in Note that the role specified as the subrole is not revoked from the database, just the subrole assignment is revoked. For instance, if these entries are in the database: will modify the line to: revokes specified the authorizations and/or subrole for the given role. Note: The file will be modified by the command. Invoking the list command without any parameters lists every entry in Specifying a role name lists all the authorizations and sub- roles assigned to that role name. Specifying an operation name lists all the roles witch have that operation name. Specifying a subrole name lists all the roles which have that subrole name. Specifying lists all the authorizations in the database. Authorizations In order to invoke the user must either be root, (running with effective uid of 0), or have the appropriate authorization(s). The follow- ing is a list of the required authorizations for running with particular options: Allows user to run with option. Allows user to run option. Allows user to run with or option. Allows user to run with or option. Allows user to run with option. EXTERNAL INFLUENCES
Environment Variables determines the language in which messages are displayed. International Code Set Support Single-byte character code set is supported. RETURN VALUE
Success. If is successful, it returns Failure. returns and prints an appropriate error message to stderr. EXAMPLES
The following commands each add an authorization (operation, object) entry in the database file: The following commands each delete an authorization (operation, object) entry from the database file: The following commands each assign an authorization (operation, object) pair to a role in database file: The following commands each assign a subrole to a role in database file: The following commands each revokes an operation for the specified operation from a role in the file: The following commands each revokes a subrole from the specified role in the database file: The following command lists all the authorizations for the role: The following command lists all the entries with operation The following command lists all the entries with object The following command lists all the roles with their authorizations in database: FILES
Database containing valid definitions of all roles. Database containing definitions of all valid authorizations. Database specifying the roles allowed for each specified user. Database defining the authorizations for each specified role. SEE ALSO
cmdprivadm(1M), privrun(1M), rbacdbchk(1M), roleadm(1M), rbac(5). authadm(1M)
All times are GMT -4. The time now is 01:02 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy