02-26-2007
Unix access rights
Hi,
Is it true that if I am not the root I can not select access permissions to a file that I own so that my friend (who also isn't the root) can access that file?
And is it true that the only way to accomplish it is to ask the root to "put" my friend into "my" group? Then I could simply set the access rights to the file for members of my group, I think... That is why I am asking you...
10 More Discussions You Might Find Interesting
1. SuSE
Hello, I am running a Suse Linux server and I want to set up a NFS Server for a few Unix machines. For the root account at the unix client it works fine but it doesn't work for other users who have no root rights.
I've used the no_root_squash and the rw option in the etc/export file. My folder... (7 Replies)
Discussion started by: Ald-Edv
7 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I want to execute a customised process like rating engine using a shell script from a directory other than the directory where the customizes process is placed.
I have tried it in the following way...and faced a issue
when shell script is available in directory /dir1/ and customized... (1 Reply)
Discussion started by: vkishore.btw
1 Replies
3. UNIX for Dummies Questions & Answers
Hi Folks,
My problem is an easy one for the experts here. All my applications run using a user id that creates files with only the following default rights:
-rw-r-----
I want to modify this user's account such that it creates files that assign read access to the everyone group by default:... (7 Replies)
Discussion started by: umairrahman
7 Replies
4. UNIX for Advanced & Expert Users
Hello all,
I am currently writing an application that besides other thing ,ftps files from remote machines (running linux and solaris). My problem is this: i am connecting to remote machines as a user other than root and i have found that there is a possibility that i will encounter folders with... (3 Replies)
Discussion started by: noam128
3 Replies
5. UNIX for Dummies Questions & Answers
Hello Guru,
I have very unique requirement , need some help.
I have one folder created in one the server A. In this folder , the file getting uploaded from some java based page.
then i am calling scp through key file, which works fine in another folder of server B.
Currently , what i am... (2 Replies)
Discussion started by: u263066
2 Replies
6. Red Hat
well hi to all
The thing is I need to allow particular site to just one or 2 user
not to everybody. Can anybody tell me how do i do it. If i put there
ip in exception then whole Restriction would be bypassed which i dont
want. Your Responses would be highly appreciated
THANKS in ADVANCE (0 Replies)
Discussion started by: achtani_jeetu
0 Replies
7. Shell Programming and Scripting
Hi,
I would like to retrieve a list of user ids on an AIX server along with the access rights that each id has? Can someone please help me on how this can be achieved?
Gayathri (3 Replies)
Discussion started by: ggayathri
3 Replies
8. Red Hat
Hi,
I have three servers,For 3 servers how i can take output,all the local accounts and details of whether the access is Root or User access.
cheers (1 Reply)
Discussion started by: ranjithm
1 Replies
9. UNIX for Dummies Questions & Answers
Hello experts,
i am a Unix beginner and to test the rules of file rights (rwx)
i created the file
/root/testdir/subdir/test.sh
and set the rights of testdir,subdir, test.sh (using chmod) to various configurations in order to get an idea
in which case you need which rights. Test commands... (5 Replies)
Discussion started by: mike_bn
5 Replies
10. Shell Programming and Scripting
Hello,
i'm trying to write a script sh to convert the rights of a folder or file in a number.
Explain:
ls -l = rwxrwxrwx
so i must display 777.
Do you known where i can find so convert script
Thanks
Use code tags, thanks. (11 Replies)
Discussion started by: steiner
11 Replies
LEARN ABOUT OPENDARWIN
gshadow
GSHADOW(5) File Formats and Conversions GSHADOW(5)
NAME
gshadow - shadowed group file
DESCRIPTION
/etc/gshadow contains the shadowed information for group accounts.
This file must not be readable by regular users if password security is to be maintained.
Each line of this file contains the following colon-separated fields:
group name
It must be a valid group name, which exist on the system.
encrypted password
Refer to crypt(3) for details on how this string is interpreted.
If the password field contains some string that is not a valid result of crypt(3), for instance ! or *, users will not be able to use a
unix password to access the group (but group members do not need the password).
The password is used when a user who is not a member of the group wants to gain the permissions of this group (see newgrp(1)).
This field may be empty, in which case only the group members can gain the group permissions.
A password field which starts with an exclamation mark means that the password is locked. The remaining characters on the line
represent the password field before the password was locked.
This password supersedes any password specified in /etc/group.
administrators
It must be a comma-separated list of user names.
Administrators can change the password or the members of the group.
Administrators also have the same permissions as the members (see below).
members
It must be a comma-separated list of user names.
Members can access the group without being prompted for a password.
You should use the same list of users as in /etc/group.
FILES
/etc/group
Group account information.
/etc/gshadow
Secure group account information.
SEE ALSO
gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1).
shadow-utils 4.5 01/25/2018 GSHADOW(5)