Sponsored Content
Full Discussion: user access limits?
Top Forums UNIX for Advanced & Expert Users user access limits? Post 17561 by Luftwaffe on Sunday 17th of March 2002 11:21:59 PM
Old 03-18-2002
Create a user and group name for tha user, and change the permissions of the directory to the user's user and group name.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

FTP user access

I created a user which I would like to have access only to FTP. I am able to get FTP to the machine with that user, but I only want him to have access to two directories, and no shell access. How can I accomplish this? Thanx, Aaron (1 Reply)
Discussion started by: Spetnik
1 Replies

2. UNIX for Dummies Questions & Answers

User Access Rights

Hi Folks, My problem is an easy one for the experts here. All my applications run using a user id that creates files with only the following default rights: -rw-r----- I want to modify this user's account such that it creates files that assign read access to the everyone group by default:... (7 Replies)
Discussion started by: umairrahman
7 Replies

3. UNIX for Dummies Questions & Answers

Tracking user access

Hi, An important file in my solaris server has been deleted. Is there any way that i can find out when was that file deleted and what user account was used to delete the file.. (1 Reply)
Discussion started by: saharookiedba
1 Replies

4. AIX

User access

Is there any way I can restrict a user to 1 directory when logging in but give the access to another directory? For example restrict the user to /home/user at login but also allow then to access /opt/data/user. (1 Reply)
Discussion started by: daveisme
1 Replies

5. Shell Programming and Scripting

Removing user access using user id

I have multiple .prm files that contain user ID's. The .prm files reside in multiple directories that allow users access to different areas of the system. (see below) current directory /apps/fourgen/accounting/menu drwxrwxrwx 16 phil infotech 512 Sep 7 2002 apmenu... (8 Replies)
Discussion started by: jamba1
8 Replies

6. UNIX for Advanced & Expert Users

access to the bin of another user

Hello All, I am using AIX 6.1 I created two users (user_1 and user_2) with same primary group goup_1. in user_1 I am accessing an application command line which is found under user_1home_dir/application/bin I need to access the same application command line from user_2. What I did that in... (4 Replies)
Discussion started by: beayni33
4 Replies

7. UNIX for Advanced & Expert Users

Need help about user access

Hi frds, I have got a script restart.sh that kills and restarts a process. This scripts runs under a user called USER1 who is a normal user. Now my requirement is that i got other user named USER2 who should be able to run that script as USER1 as we dont want to share the password of user1 we... (2 Replies)
Discussion started by: phanidhar6039
2 Replies

8. UNIX for Dummies Questions & Answers

Soft and hard limits for nproc value in /etc/security/limits.conf file (Linux )

OS version : RHEL 6.5 Below is an excerpt from /etc/security/limits.conf file for OS User named appusr in our server appusr soft nproc 2047 appusr hard nproc 16384 What will happen if appusr has already spawned 2047 processes and wants to spawn 2048th process ? I just want to know... (3 Replies)
Discussion started by: kraljic
3 Replies

9. UNIX for Beginners Questions & Answers

selection particular number of line from a bunch by user defined limits.

hello i am having a file having a matrix as the following 4.1 5.5 6.55 7.2 8.2 1.002 i am having around 1 lakh rows, now i need a program in which i show give min x and min y and min z values and as well as max x max y max z, the values between these minimun and maximum values should be... (1 Reply)
Discussion started by: charan pattabhi
1 Replies

10. Red Hat

Cannot set 'soft limits' for 'maximum stack size' for a standard user

Hi Guys, I'm trying to install Oracle Database on to Oracle Linux 7.6 but when the database install package checks the OS set-up, it keeps on failing on the soft limits for the stack. It's default value is 8192 but I'm trying to set it to 10240. This is what I added to... (2 Replies)
Discussion started by: ASGR
2 Replies
GSHADOW(5)						   File Formats and Conversions 						GSHADOW(5)

NAME
gshadow - shadowed group file DESCRIPTION
/etc/gshadow contains the shadowed information for group accounts. This file must not be readable by regular users if password security is to be maintained. Each line of this file contains the following colon-separated fields: group name It must be a valid group name, which exist on the system. encrypted password Refer to crypt(3) for details on how this string is interpreted. If the password field contains some string that is not a valid result of crypt(3), for instance ! or *, users will not be able to use a unix password to access the group (but group members do not need the password). The password is used when an user who is not a member of the group wants to gain the permissions of this group (see newgrp(1)). This field may be empty, in which case only the group members can gain the group permissions. A password field which starts with a exclamation mark means that the password is locked. The remaining characters on the line represent the password field before the password was locked. This password supersedes any password specified in /etc/group. administrators It must be a comma-separated list of user names. Administrators can change the password or the members of the group. Administrators also have the same permissions as the members (see below). members It must be a comma-separated list of user names. Members can access the group without being prompted for a password. You should use the same list of users as in /etc/group. FILES
/etc/group Group account information. /etc/gshadow Secure group account information. SEE ALSO
gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1). shadow-utils 4.1.5.1 05/25/2012 GSHADOW(5)
All times are GMT -4. The time now is 05:50 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy