Sponsored Content
Full Discussion: Access Control List
Top Forums Shell Programming and Scripting Access Control List Post 302104245 by sb008 on Wednesday 24th of January 2007 08:31:30 AM
Old 01-24-2007
Avoid ACL's whenever possible.

They only cause confusion
 

9 More Discussions You Might Find Interesting

1. Filesystems, Disks and Memory

Access Control

In Windows XP, there are 3 default access control groups namely: Administrators, Users and Power Users. Is there default access control groups in Unix system? If there is, what are they? newbie. (1 Reply)
Discussion started by: zertoir
1 Replies

2. UNIX for Dummies Questions & Answers

Access control Lists

Hi, I was wondering if someone could help me with ACL's. I have a file, say output, created by the root user, member of group other. Its permissions are rwxr--r--. I want only people in group other to have rwx access, but I also want one other user, stephen, member of some_other_group to have rwx... (1 Reply)
Discussion started by: sroberts82
1 Replies

3. Solaris

Command for access control list

Hi, I want to set access control list on folders but it should be recursively, any Idea? command (1 Reply)
Discussion started by: manoj.solaris
1 Replies

4. UNIX for Dummies Questions & Answers

Does U*X have Access Control Lists?

In OS like windows, I can define an Access Control List (ACL) and specify which accounts and groups have what access to a specific file. I assume U*X, Linux and cygwin on windows have this ACL feature too. I'm using cygwin on windows. What do I type at a bash prompt to allow a specific user... (1 Reply)
Discussion started by: siegfried
1 Replies

5. UNIX for Dummies Questions & Answers

Internet Access Control

I need to control intenet access @ work. xample. I need PC 1 to only be able to access these five sites and add to the list as needed. Can anyone pint me a direction. (1 Reply)
Discussion started by: fruiz
1 Replies

6. AIX

Access control using LDAP

Hello, I've configurated a LDAP user authentication on AIX V6 against Active Directory (Windows Server 2008). The Tree is built as follows: test (DC) |--- testgroup (group with members: user1, user2) | |--- sys1 (OU) | |--- sys1group (group with member: user1) | |--- sys2 (OU)... (0 Replies)
Discussion started by: xia777
0 Replies

7. UNIX for Dummies Questions & Answers

eTrust Access Control

Hi, I am using eTrust Access Control at work. I have got no output after type checklogin. I wonder what is the reason. Does anyone know? Thanks eTrustAC selang v8.00a-1555.13 - eTrustAC command line interpreter Copyright (c) 2006 CA. All rights reserved. eTrustAC> checklogin user1... (0 Replies)
Discussion started by: uuontario
0 Replies

8. Proxy Server

How to use Squid on Linux to control certain IP to access Web Server and certain IP cannot access?

Dear all experts here, :) I would like to install a proxy server on Linux server to perform solely to control the access of Web server. In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server. I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies

9. UNIX for Advanced & Expert Users

Question for expert only in Access control list

If I'm the admin for the financial system and I want to configure authorization pf file system permission.Also, The first rule is that Managers and clerks can read and write billings for all cases. The second rules is that Paralegals and administrative assits can read and write billings only on... (2 Replies)
Discussion started by: mecnio
2 Replies
lusermod(8)						      System Manager's Manual						       lusermod(8)

NAME
lusermod - Modify an user SYNOPSIS
lusermod [OPTION]... user DESCRIPTION
Modifies the user with name user. OPTIONS
-c, --gecos=gecos Set user's GECOS field to gecos. The GECOS field is traditionally used to store user's real name and other information. -d, --directory=directory Set user's home directory to directory. -g, --gid=gid Change user's primary group ID to gid. If group with ID gid does not exist, a warning is printed, but the operation is performed anyway. -i, --interactive Ask all questions when connecting to the user database, even if default answers are set up in libuser configuration. -L, --lock Lock user's account. This prevents logging in using user's password. -l, --login=name Rename user to name. -m, --movedirectory After changing user's home directory (using the -d option), move the old home directory to the new location. -P, --plainpassword=password Set user's password to password. Note that the password can be viewed while running lusermod using tools such as ps(1). -p, --password=encrypted Set user's password to the password represented by the hash encrypted. Note that the hash can be viewed while running lusermod using tools such as ps(1). -s, --shell=shell Set user's login shell to shell. -U, --unlock Unlock user's account. -u, --uid=uid Change user's user ID to uid. EXIT STATUS
The exit status is 0 on success, nonzero on error. libuser Feb 27 2008 lusermod(8)
All times are GMT -4. The time now is 06:10 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy