Sponsored Content
Full Discussion: RSC question?
Top Forums UNIX for Advanced & Expert Users RSC question? Post 302089572 by mr-synapse on Tuesday 19th of September 2006 05:42:58 PM
Old 09-19-2006
Error RSC question?

Has anyone had a message after attempting a telnet to an RSC server of:
"Console session already in use." I'm attempting to access this server to setup a user account, and I'm having some problems. Does anyone have an
idea or suggestion on how to proceed?
 

10 More Discussions You Might Find Interesting

1. Solaris

RSC on SunFire 480R

When I try to connect to a RSC console using the serial port by modem, I can connect but I can't type username neither password because the screen scrolls up. At the loghistory shows the message: RSC Login failure. Using serial without modem, it works well. (2 Replies)
Discussion started by: Livio
2 Replies

2. UNIX for Dummies Questions & Answers

RSC card specification

Hi I have a SUN box that i am supporting Model 480r . The RS card that is attached to it is giving some problems . It is pinging but i am unable to telnet into it therefore having no remote TC console access ( the system is currently up ) Is there a way by which i can remotely check the... (1 Reply)
Discussion started by: Sam4u
1 Replies

3. Solaris

RSC configuration

Hi All, Please send the configuration for RSC in solaris. Thanks and Regards, (3 Replies)
Discussion started by: lbreddy
3 Replies

4. Solaris

RSC Configuaration

Dear All, Can any body help me how to configure the RSC in solaris9. Thanks and Regards, (1 Reply)
Discussion started by: lbreddy
1 Replies

5. Solaris

Sun 8 +RSC

Hi All I have done a reboot for SUN Solaris 8 ( model SUNFIRE 280R) but i havent got the OK prompt i only got the following: RSC2 POST - Version 10-18-2000 0.7 Dual Port Memory Test, PASSED. TTY External - Internal Loopback Test TTY External - Internal Loopback Test, PASSED. ... (3 Replies)
Discussion started by: alaa75
3 Replies

6. Solaris

Solaris RSC configuration

Hi everyone, I've been reading across to configure the RSC that came with my SunFire v890 (along time ago) but I think there are several points I don't completely understand. First, I think I need a new IP address for the RSC, right? where should I attach the RSC? to my network (the same as the... (2 Replies)
Discussion started by: gcrespo
2 Replies

7. Solaris

Old RSC card problem

All, I have a unique situation concerning RSC cards and would like to see if anyone has a solution. Here is the situation: We are migrating older versions of Solaris using ufsdump images to like older hardware. We basically installed a temporary Solaris O/S then copied the dumps over and... (5 Replies)
Discussion started by: sljack
5 Replies

8. Solaris

Unable to RSC

Hi All, ;) I have configured rsc hosted on Sun-Fire-V490. But I am not able to telnet this machine Packages installed : #pkginfo -l | grep SUNWrsc PKGINST: SUNWrsc PKGINST: SUNWrscd PKGINST: SUNWrscj I rebooted system but still I' not able to take rsc. I am not... (3 Replies)
Discussion started by: tuxian
3 Replies

9. Solaris

RSC packages?

Does anyone know where to get these on Oracle's support site or elsewhere? (7 Replies)
Discussion started by: LittleLebowski
7 Replies

10. Solaris

RSC vulneabilities

I have a disk failure in a V280, the support tech asked for explorer output and rsc information sc>showsc rsc>environment rsc>loghistory rsc>consolehistory rsc>version -v since RSC is not a secure connection, I am not comfortable with providing this information for a disk... (2 Replies)
Discussion started by: baumer11
2 Replies
krb5_auth_rules(5)					Standards, Environments, and Macros					krb5_auth_rules(5)

NAME
krb5_auth_rules - overview of Kerberos V5 authorization DESCRIPTION
When kerberized versions of the ftp, rdist, rcp, rlogin, rsh, telnet, or ssh clients are used to connect to a server, the identity of the originating user must be authenticated to the Kerberos V5 authentication system. Account access can then be authorized if appropriate entries exist in the ~/.k5login file, the gsscred table, or if the default GSS/Kerberos authentication rules successfully map the Kerberos principal name to Unix login name. To avoid security problems, the ~/.k5login file must be owned by the remote user on the server the client is attempting to access. The file should contain a private authorization list comprised of Kerberos principal names of the form principal/instance@realm. The /instance vari- able is optional in Kerberos principal names. For example, different principal names such as jdb@ENG.ACME.COM and jdb/happy.eng.acme.com@ENG.ACME.COM would each be legal, though not equivalent, Kerberos principals. The client is granted access if the ~/.k5login file is located in the login directory of the remote user account and if the originating user can be authenticated to one of the principals named in the file. See gkadmin(1M) and kadm5.acl(4) for more information on Kerberos principal names. When no ~/.k5login file is found in the remote user's login account, the Kerberos V5 principal name associated with the originating user is checked against the gsscred table. If a gsscred table exists and the principal name is matched in the table, access is granted if the Unix user ID listed in the table corresponds to the user account the client is attempting to access. If the Unix user ID does not match, access is denied. See gsscred(1M). For example, an originating user listed in the gsscred table with the principal name jdb@ENG.ACME.COM and the uid 23154 is granted access to the jdb-user account if 23154 is also the uid of jdb-user listed in the user account database. See passwd(4). Finally, if there is no ~/.k5login file and the Kerberos V5 identity of the originating user is not in the gsscred table, or if the gsscred table does not exist, the client is granted access to the account under the following conditions (default GSS/Kerberos auth rules): o The user part of the authenticated principal name is the same as the Unix account name specified by the client. o The realm part of the client and server are the same, unless the krb5.conf(4) auth_to_local_realm parameter is used to create equivalence. o The Unix account name exists on the server. For example, if the originating user has the principal name jdb@ENG.ACME.COM and if the server is in realm SALES.ACME.COM, the client would be denied access even if jdb is a valid account name on the server. This is because the realms SALES.ACME.COM and ENG.ACME.COM differ. The krb5.conf(4) auth_to_local_realm parameter also affects authorization. Non-default realms can be equated with the default realm for authenticated name-to-local name mapping. FILES
~/.k5login Per user-account authorization file. /etc/passwd System account file. This information may also be in a directory service. See passwd(4). ATTRIBUTES
See attributes(5) for a description of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Interface Stability |Evolving | +-----------------------------+-----------------------------+ SEE ALSO
ftp(1), rcp(1), rdist(1), rlogin(1), rsh(1), telnet(1), gkadmin(1M), gsscred(1M), kadm5.acl(4), krb5.conf(4), passwd(4), attributes(5), gss_auth_rules(5) SunOS 5.11 07 Apr 2006 krb5_auth_rules(5)
All times are GMT -4. The time now is 03:11 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy