Sponsored Content
Full Discussion: unix scripts
Top Forums UNIX for Dummies Questions & Answers unix scripts Post 10494 by burts on Thursday 15th of November 2001 09:45:08 AM
Old 11-15-2001
Switching to Root in a script

Hi there

I had a call the other day where a User wanted to do the same thing..

We and a couple of others came to the decision that Under TRU64 , you cannot do that.

How ever try looking at sudo

Here is a brief description

Sudo (superuser do) allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root or another user while logging the commands and arguments.

or have a look at the man page on DOP

dop - Allows a user to execute a privileged program without knowing the root password. The dop command also modifies the action database.

Hope this Helps
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

UNIX Scripts

I need to find a place or places on the Internet where I can find UNIX scripts to view and to modify to make life easy on the UNIX environment. Shell scripts to be used, ksh, sh, csh. Can someone help me on this. Thanks ;) (2 Replies)
Discussion started by: wolf
2 Replies

2. UNIX for Advanced & Expert Users

vi scripts on UNIX

Hi there I'm hoping one of the expert unix guys or gals can assist me in understanding the language within scripts e.g clear while true do tput cup 0 0 LIST=`grep cisco /etc/hosts|grep -v _int | awk '{print $2}'` for SITE in $LIST do IP=`grep "$SITE"... (4 Replies)
Discussion started by: nemex
4 Replies

3. UNIX for Advanced & Expert Users

Porting of Windows written unix scripts to unix platform

Can anybody help me in finding out a solution for the problem below? When we write .unix or .sh files in windows OS and port them to Unix platforms there is a character ^M inserted at the end of each line of the script file. During ftp porting I set the transfer mode as ASCII for the script... (7 Replies)
Discussion started by: tamilselvi
7 Replies

4. Shell Programming and Scripting

UNIX scripts for router

Hi, I want to write a script in unix for my routers which will collect the output to a file.. how do i do that? thanks in advance (3 Replies)
Discussion started by: pasandhu
3 Replies

5. UNIX for Advanced & Expert Users

Unix Scripts

Hi, I have to write 2 unix scripts: 1. Check whether the databases are up or down which are on different servers. 2. Check the file system space on different Unix servers. Please share your model scripts here. I have to submit this ASAP. Appreciate your reply...... Thanks (1 Reply)
Discussion started by: dreams5617
1 Replies

6. Shell Programming and Scripting

Unix Scripts

Hi, I have to write 2 unix scripts: 1. Check whether the databases are up or down which are on different servers. 2. Check the file system space on different Unix servers. Please share your model scripts here. I have to submit this ASAP. Appreciate your reply...... Thanks (4 Replies)
Discussion started by: dreams5617
4 Replies

7. Shell Programming and Scripting

Unix programming scripts.

How can I replace "?" with the appropriate information. (7 Replies)
Discussion started by: ejuste
7 Replies

8. UNIX for Advanced & Expert Users

Unix/ Shell scripts

Hi, I need to develop a function incrementor that increments a given number that is passed as an argument (this should use eval). so, am not able to get much info on eval by googling (perticularly on incrementing). please if any one can help me out. thanks in advance (4 Replies)
Discussion started by: geervani
4 Replies

9. Shell Programming and Scripting

Unix scripts

hi everyone.Can anyone tell what books to study for unix shell scripting.ive planned to learn unix scripting but i dont kno what kind of books to refer so do help me..Thanks in advance. (1 Reply)
Discussion started by: madanmeer
1 Replies

10. UNIX for Beginners Questions & Answers

UNIX commands and scripts

Hi guys, Hoping someone can help with the below - involves basic commands and some scripting. Thanks so much in advance for your amazing time and help. 3. The file /etc/profile contains the default initialization options for your shell. Produce a unique list of all variables with uppercase... (1 Reply)
Discussion started by: edujs7
1 Replies
userdbset(1M)															     userdbset(1M)

NAME
userdbset - modify information in the user database, /var/adm/userdb SYNOPSIS
name attr [attr]... attr [attr]... name] DESCRIPTION
modifies the per-user information residing in the user database, A per-user value in the user database overrides any system-wide default configured in See userdb(4) and security(4) for more details about the user database and system-wide defaults, respectively. If one or more arguments are specified on the command line, initializes or modifies each attribute specified by attr to the specified value for the specified user name. Options The following options are recognized: Modify specified attributes for all users. Delete attributes; the (see security(4)) system-wide default will then apply. If one or more attr arguments are specified, only those attributes are deleted. Otherwise, if no attr arguments are specified, all configurable attributes are deleted for the specified user name. Import the contents of filename into the user database. Each line in the data file, filename, must be in the following format: The output of is in this format and can be used as the input file. See the example in the section. Remove internal attributes in addition to the configurable ones. Internal attributes are not user configurable and are normally modified only by programs that enforce system security. The file indicates which attributes are configurable and which are internal. Initialize, modify or delete specified attributes for the specified user name. Authorizations In order to invoke the user must either be root (running with effective uid of 0) or, if the Role-Based Access Control Extensions product (RBACExt) is installed, have the appropriate authorization(s). Users with the appropriate authorizations can use to add, modify or delete security attributes for other users, but are prohibited from changing the security attributes for local root users. Only root users can add, modify or delete the security attributes of local root users. Refer to rbac(5) for more information on the Role-Based Access Control product. The following is a list of the required authorizations for running with particular options: Allows the user to invoke The user will also need specific authorizations to modify or delete the various attributes in the user database. Allows the user to delete the per-user attribute (attr) named in the object of the authorization pair. An object of will allow the user to delete any attribute. Allows the user to initialize or modify the per-user attribute (attr) named in the object of the authorization pair. An object of will allow the user to initialize or modify any attribute. Allows the user to import user attributes into the user database using the option. Users with this authorization are allowed to import attributes for all users, including local root users. Notes Only users who have read and write access to can run validates attributes and attribute values based on information in The validation of an attribute fails if: o Any specified attr is not listed in o does not allow a per-user value for the attr. o name is not a valid user. o allows the attr only for local users, and name is not in o The value of an attr is not within the range specified in RETURN VALUE
exits with one of the following values: success invalid user invalid usage insufficient permission to access the user database file system error invalid attribute; does not allow a per-user value an attribute value is not within the range specified in block overflow entry overflow database lock failure database is disabled; see userdb(4) invalid user name not a local user EXAMPLES
In the following example, the first command deletes all of the configurable attributes for user while retaining the internal attributes. At this point, the system-wide defaults in apply. The second command sets minimum password length to 7 and to 0022 (the leading zero denotes an octal value). The next command deletes the minimum password length, which causes the system-wide default to be used. The following example deletes the user-specific audit flag for all users. The system-wide default will then apply for all users. The following example saves the configurable attributes for all users option) into a file, using the command. If needed, the attributes can then be restored at a later point by importing the file with The second command imports the configurable attributes into the user data- base. FILES
user database security defaults configuration file security attributes description file SEE ALSO
userdbck(1M), userdbget(1M), userdb_read(3), security(4), userdb(4), rbac(5). userdbset(1M)
All times are GMT -4. The time now is 08:42 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy