06-06-2006
Quote:
Originally Posted by vilves
Hi, how to create account with the following
be cron enabled
For this you should add the username into cron.allow whichever it is (depending on your OS)
Quote:
Originally Posted by vilves
only accessible via sudo
Mmmm... assuming that this user is locked (you cannot login with him/her, just like a system user), you should add sth like this to your /etc/sudoers
your_user ALL=NOPASSWD:su - the_user
Regards.
9 More Discussions You Might Find Interesting
1. Forum Support Area for Unregistered Users & Account Problems
I created an account a while back, but never received any confirmation, so I could never get the full access... :( I logged back in today, but I'd forgotten what I'd used for username... anyway, I entered my email address and it said that I would receive my login information, which I... (2 Replies)
Discussion started by: seaghan
2 Replies
2. UNIX for Dummies Questions & Answers
Hi All,
Is there a simple and obvious way to see when an account was created.An account has come to my attention in /etc/passwd and a last on it shows having never logged in and the home directory looks to be a couple of years old.
Just wondering if I'm over looking anything obvious.
... (2 Replies)
Discussion started by: Hayez
2 Replies
3. UNIX for Dummies Questions & Answers
hi, i tried searching the forum for a thread about this, but came up empty handed. is there a way to pull a list of all user accounts, with the associated creation date? thanks in advance! (2 Replies)
Discussion started by: lilweezy
2 Replies
4. UNIX for Advanced & Expert Users
Hi all,
I want to know the time when a perticular user is created, atleat in which year it is created. Could any one help me in this issue.
Thanks in advance.
Regards,
M.Sukumar (1 Reply)
Discussion started by: sukumar
1 Replies
5. Shell Programming and Scripting
Hi,
I have to write a shell script to sudo other account. Foreg,
i am working in account ramdev1, i have a sudo access where through shell script i need to sudo another account
ramdev2 and read a file "ram.inc" get those data and save it in a .txt file and return it?
Since i am new to... (21 Replies)
Discussion started by: sachin.tendulka
21 Replies
6. Shell Programming and Scripting
Hi Gurus,
I have small issue...
I used to pass the passwd for sudo commands like below,
gzcat ~/passwd.gz | sudo su - <villin> >> eof
------
-----
------
eof
And it was able to login into "villin" sudo account successfully. But now, I'm using the same in another script for the... (2 Replies)
Discussion started by: raghu.iv85
2 Replies
7. Shell Programming and Scripting
I am writing a BASH script to update a webserver and then restart Apache. It looks basically like this:
#!/bin/bash
rsync /path/on/local/machine/ foo.com:path/on/remote/machine/
ssh foo.com sudo /etc/init.d/apache2 reloadrsync and ssh don't prompt for a password, because I have DSA encryption... (9 Replies)
Discussion started by: fluoborate
9 Replies
8. Cybersecurity
By the company winning business from another outsource provider, I've suddenly inherited towards 300 servers and all accounts are local.
One of the immediate tasks is to set up all the OS, DB, and app support staff on all of the servers operating systems. I've slapped together a crude script... (10 Replies)
Discussion started by: rbatte1
10 Replies
9. Shell Programming and Scripting
Hi Folks,
I had a request to create the user request. Between, I just write a script a create, Update Geos, and update the password. My script as below:
The error message, what I am getting is all the users are updated with the same Goes value..
#!/bin/bash
for i in `cat users.txt`;do... (2 Replies)
Discussion started by: gsiva
2 Replies
LEARN ABOUT ULTRIX
authenticate_user
authenticate_user(3x) authenticate_user(3x)
Name
authenticate_user - authenticate user
Syntax
#include <pwd.h>
#include <auth.h> /* For error codes */
int authenticate_user(user, password, line)
struct passwd *user;
char *password;
char *line;
Arguments
user
A pointer to the passwd entry.
password
A pointer to the password.
line
The name of the terminal line as it is listed in the file.
Description
The routine authenticates a user name or UID against a supplied password and returns a nonnegative integer on success. The value returned
is the number of failed login authentication attempts since the last successful login authentication (or zero if this feature is not
enabled). This routine is found in the library and loaded with the -lauth option.
At all security levels higher than BSD, the login fail count in the auth database is incremented if authentication fails, and cleared if it
succeeds. In addition, the account must be marked enabled for logins as defined by the Account Mask value for A_LOGIN. See for informa-
tion about the Account Mask values.
If a non-NULL value is supplied for the argument and the argument is not the empty string, the function also verifies that the specified
user is allowed access through that line. In particular, accounts with a UID equal to zero will return success only if the specified line
is marked secure in the file.
Restrictions
The process must have read access to the auth database to authenticate users in a secure environment.
The process must have read/write access to the auth database to update the authentication fail count.
If auth information is being served through BIND, the process is required to obtain a Kerberos ticket for that service before invoking this
function.
Example
extern int errno;
struct passwd *pwd;
int status;
pwd = getpwnam("root");
status = authenticate_user(pwd, "rootpass", "/dev/console");
if(status < 0)
if(errno == EPERM)
puts("Login failed");
else
perror("authenticate_user");
else
if(status > 0)
printf("%d failed attempts
", status);
Return Values
When successful, the routine returns the number of failed login authentication attempts since last successful login authentication.
When an error occurs, errno is set and a negative error code is returned. The error code returned may be the same as errno or it may be an
extended error code defined in
Diagnostics
On error return errno may be set to one of the following values:
[EPERM] Either the password is incorrect, the password is expired, the specified line needs to be secure and is not, or the
account is disabled and a login authentication is required.
[EINVAL] No authentication information for user.
[ENOSYS] Security subsystem not configured correctly.
[EACCES] Process does not have read access to the necessary information.
On error return the return value may be the same as errno or, if errno is [EPERM], it may be one of the following additional values defined
in
[A_EBADPASS] The supplied password was incorrect.
[A_ESOFTEXP] The account's password expired recently.
[A_EHARDEXP] The account's password expired quite some time ago.
[A_ENOLOGIN] The account is not enabled.
[A_EOPENLINE] The account requires a secure line and the specified line was not marked that way in the file.
Files
Environment
If the system is operating in the BSD security level, the password expiration, login fail count, and account disabling features are not
available (and therefore are not used in authentication computations).
See Also
getauthent(3x), getpwent(3), auth(5), passwd(5yp), ttys(5)
authenticate_user(3x)