05-24-2001
I'm not an expert UNIX user, but I'd say use ftp or (more securely) rcp instead of telnet.
-kristy
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I would like automate the process of copying some logs files from a server to my local hard drive at a set time each week/day.
I don't really know anything about creating and scheduling jobs. Is this something I could setup relatively easily?
I would like to automatically copy all the logs... (1 Reply)
Discussion started by: Sepia
1 Replies
2. UNIX for Dummies Questions & Answers
I am logged into a server via SSH.
There is a file on my desktop of my Windows PC I would like to put on that server.
How do I do it?
SCP looks the likely method but how does the server know where the file is on the local machine?
Thanks. (2 Replies)
Discussion started by: Sepia
2 Replies
3. Shell Programming and Scripting
Hello,
I've been searching your forum for an answer to the following question and whilst I've seen several which may help I'm afraid my inexperience with UNIX systems has got the better of me and I'm incapable of piecing your considerable expertise together.
Problem:
I have a linux box which... (5 Replies)
Discussion started by: julezsht
5 Replies
4. UNIX for Dummies Questions & Answers
Hello,
This is my first post :)
I wondered if it would be possible to connect a unix machine via USB as a disk drive in the same way as Android devices connects to the computers.
The idea is to connect my debian machine to the television, that is compatible with USB pendrives. Then, the... (3 Replies)
Discussion started by: Strife
3 Replies
5. Shell Programming and Scripting
I need a shell script to copy files frm a linux machine to a windows machine using SCP. The files keeps changing day-to-day. I have to copy the latest file to the windows machine frm the linux machine.
for example :In Linux, On July 20, the file name will be 20.txt and it should be copied to... (3 Replies)
Discussion started by: nithin6034
3 Replies
6. Shell Programming and Scripting
Hi All..
Am new to Unix!!
Am creating a shell script in which a scenario is like i have transfer the output file from unix machine (Server) to local directory (Windows xp).
And also i have to transfer the input file from the local directory to Unix machine (Server)
Any help from you... (1 Reply)
Discussion started by: vidhyaS
1 Replies
7. Shell Programming and Scripting
Hi,
I have an external hard drive connected to my iMac.
I am logged into a Linux_x86_64 server. Now, if I want to download files directly to the hard drive, is there a way to do it.
Currently, I am chasing cyberduck to download content to the hard drive. (3 Replies)
Discussion started by: jacobs.smith
3 Replies
8. UNIX for Advanced & Expert Users
Hi Am using unix Ksh
Am getting the problem while transferring zero size files through the script .
When i transfer zero size files from local machine to remote machine manually i can able to do it .
My question its beause of zero size files am not able to transfer through script ? or its... (2 Replies)
Discussion started by: Venkatesh1
2 Replies
9. UNIX for Dummies Questions & Answers
Hello,
I need to create a shell script which will copy files - which are created on particular date and starting with particular name - to local windows XP machine.
Is this possible.?
Currently it is being done manually using winscp (1 Reply)
Discussion started by: NarayanaPrakash
1 Replies
10. Shell Programming and Scripting
Hello everyone,
So, here is my requirement.
I want to run an SQL query and export the result in an excel file and send that as an attachement in an email to the intended receipients.
Please help me understand how to do that.
How to connect to database, how to export the output in an excel... (3 Replies)
Discussion started by: Mohdrafi12
3 Replies
LEARN ABOUT V7
krb5_auth_rules
krb5_auth_rules(5) Standards, Environments, and Macros krb5_auth_rules(5)
NAME
krb5_auth_rules - Overview of Kerberos V5 authorization
DESCRIPTION
When a user uses kerberized versions of the ftp, rdist, rcp, rlogin, rsh, or telnet clients to connect to a server, even if the user's
claimed Kerberos V5 identity is authenticated, the user is not necessarily authorized. Authentication merely proves that the user is "who
he says he is" to the Kerberos V5 authentication system. Authorization also needs to be done, since it determines if that Kerberos identity
is permitted to access the Solaris user account that the client wants to access.
Each user may have a private authorization list in a file ~/.k5login in his login directory (on the server). Each line in this file should
contain a Kerberos principal name of the form principal/instance@realm. If the server finds a ~/.k5login file, then access is granted to
the account if and only if the originating user is authenticated to one of the principals named in the ~/.k5login file.
If there is no ~/.k5login file, the originating user will then be checked against the gsscred table (see gsscred(1M)). If the originating
user's Kerberos V5 identity is in the gsscred table, and if the UNIX user id in the gsscred table corresponds to the user account the
client is trying access, then the originating user is granted access to the account on the server. If the UNIX user id does not match, then
the originating user is denied access.
For example, suppose the originating user has a principal name of jdb@ENG.ACME.COM and the target account is jdb-user. If jdb@ENG.ACME.COM
appears in the gsscred table with uid 23154 and if jdb-user appears in the user account database (see passwd(4)) with uid 23154, then
access to account jdb-user is granted. Of course, normally, the target account name in this example would be jdb and not jdb-user.
Finally, if there is no ~/.k5login file and if the originating user's Kerberos V5 identity is not in the gsscred table, then the user will
be granted access to the account if and only if all of the following are true:
o The user part of the authenticated principal name is the same as the target account name specified by the client.
o The realm part of the client and server are the same.
o The target account name exists on the server.
For example, if the originating user has a principal name of jdb@ENG.ACME.COM and if the server is in realm SALES.ACME.COM, then even if
jdb is a valid account name on the server, the client would be denied access. This is because the realms SALES.ACME.COM and ENG.ACME.COM
differ.
FILES
~/.k5login Per user-account authorization file.
/etc/passwd System account file. This information may also be in a directory service. See passwd(4).
ATTRIBUTES
See attributes(5) for a description of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Interface Stability |Evolving |
+-----------------------------+-----------------------------+
SEE ALSO
ftp(1), rcp(1), rdist(1), rlogin(1), rsh(1), telnet(1), gsscred(1M), passwd(4), attributes(5), gss_auth_rules(5)
NOTES
To avoid security problems, the ~/.k5login file must be owned by the remote user.
SunOS 5.10 13 Apr 2004 krb5_auth_rules(5)