02-14-2006
check under which category is the user=admin is falling
user
group
others
and accordingly set the read | write | execute permission of the file
permission bits you can get from chmod
10 More Discussions You Might Find Interesting
1. Solaris
dear all
does any one give any user write permission using access control list or another way to solve this problem (1 Reply)
Discussion started by: murad.jaber
1 Replies
2. UNIX for Advanced & Expert Users
Hi,
In a Unix Server when i 'su' to my name and type in crontab it says " You are not authorised......".
Pls suggest what to do? How do i give myself permission so that I can schedule a cron. (2 Replies)
Discussion started by: debu
2 Replies
3. AIX
I'm trying to give a non-root user the right to start IBM HTTP Server, the web server is listening on port 80, but for AIX, ports under 1024 are privilege ports which can be used only by root.
/usr/IBMIHS/bin# ./apachectl start
(13)Permission denied: make_sock: could not bind to address :::80... (1 Reply)
Discussion started by: ibmer414
1 Replies
4. UNIX for Advanced & Expert Users
Hi all,
How can i give ftp access to single user on solaris9 system? others should not have the ftp access. i know about ftpusers file in /etc/ftpd but still what about if so many new users are created daily?
And now for that single user how can we restict him to ftp the files only from... (2 Replies)
Discussion started by: santhoshkumar_d
2 Replies
5. UNIX for Dummies Questions & Answers
How to give an ordinary user the superuser (root) ID which is 0 (9 Replies)
Discussion started by: sharaola
9 Replies
6. Shell Programming and Scripting
I want to give tester only the account tester to view the file /var/mail/root nobody else but him and of course the owner root w/o changing the permisions of /var/mail/root -rw-------.
$ cat /var/mail/root
cat: /var/mail/root: Permission denied (3 Replies)
Discussion started by: kenshinhimura
3 Replies
7. UNIX for Advanced & Expert Users
Hi,
on solaris I need the full ps output, and process this. With /usr/ucb/ps auxwww I get the output as wanted, but the user is cut off to 8 long.
With ps -o ruser I can get the full username, but I do not have the full output.
Is it possible to get long output, with the full username?
... (1 Reply)
Discussion started by: dimpie
1 Replies
8. Solaris
Hi,
I have enabled the Apache webserver on my machime.
Apache root directory is /etc/apache2 and the user in which the web server is configured is webservd,I guess.
I have another user called perf.
Under perf user there is /export/home/perf/v9 directory.
I want to give the OS user of... (3 Replies)
Discussion started by: bikas89
3 Replies
9. Shell Programming and Scripting
Can some one please let me know a script which gives the user sudo permissions?
Thanks in advance.... (6 Replies)
Discussion started by: Revanth547
6 Replies
10. UNIX for Beginners Questions & Answers
<?php
$comando = "kill -9 3104";
$output = shell_exec($comando);
?>
I am running this web page, but it does not execute the command, in the log file it looks like this:
sh: 1: kill: Operation not permitted
How do I give permission to execute the command? (1 Reply)
Discussion started by: Rodrigo_Bueno
1 Replies
LEARN ABOUT NETBSD
access
ACCESS(2) BSD System Calls Manual ACCESS(2)
NAME
access -- check access permissions of a file or pathname
LIBRARY
Standard C Library (libc, -lc)
SYNOPSIS
#include <unistd.h>
int
access(const char *path, int mode);
DESCRIPTION
The access() function checks the accessibility of the file named by path for the access permissions indicated by mode. The value of mode is
the bitwise inclusive OR of the access permissions to be checked (R_OK for read permission, W_OK for write permission and X_OK for exe-
cute/search permission) or the existence test, F_OK. All components of the pathname path are checked for access permissions (including
F_OK).
The real user ID is used in place of the effective user ID and the real group access list (including the real group ID) are used in place of
the effective ID for verifying permission.
If a process has super-user privileges and indicates success for R_OK or W_OK, the file may not actually have read or write permission bits
set. If a process has super-user privileges and indicates success for X_OK, at least one of the user, group, or other execute bits is set.
(However, the file may still not be executable. See execve(2).)
RETURN VALUES
If path cannot be found or if any of the desired access modes would not be granted, then a -1 value is returned; otherwise a 0 value is
returned.
ERRORS
Access to the file is denied if:
[EACCES] Permission bits of the file mode do not permit the requested access, or search permission is denied on a component of the
path prefix. The owner of a file has permission checked with respect to the ``owner'' read, write, and execute mode bits,
members of the file's group other than the owner have permission checked with respect to the ``group'' mode bits, and all
others have permissions checked with respect to the ``other'' mode bits.
[EFAULT] path points outside the process's allocated address space.
[EIO] An I/O error occurred while reading from or writing to the file system.
[ELOOP] Too many symbolic links were encountered in translating the pathname.
[ENAMETOOLONG] A component of a pathname exceeded {NAME_MAX} characters, or an entire path name exceeded {PATH_MAX} characters.
[ENOENT] The named file does not exist.
[ENOTDIR] A component of the path prefix is not a directory.
[EROFS] Write access is requested for a file on a read-only file system.
[ETXTBSY] Write access is requested for a pure procedure (shared text) file presently being executed.
SEE ALSO
chmod(2), execve(2), stat(2), secure_path(3)
STANDARDS
The access() function conforms to ISO/IEC 9945-1:1990 (``POSIX.1'').
SECURITY CONSIDERATIONS
The access() system call is a potential security hole due to race conditions. It should never be used. Set-user-ID and set-group-ID appli-
cations should restore the effective user or group ID, and perform actions directly rather than use access() to simulate access checks for
the real user or group ID.
The access() system call may however have some value in providing clues to users as to whether certain operations make sense for a particular
filesystem object. Arguably it also allows a cheaper file existence test than stat(2).
BSD
May 3, 2010 BSD