Sponsored Content
Full Discussion: Security of root access
Operating Systems Solaris Security of root access Post 302174514 by reborg on Tuesday 11th of March 2008 10:15:22 AM
Old 03-11-2008
Usually, the basic way to do this is to set the console line in /etc/default/login, and to set the ssh PermitRootLogin variable to "no"
 

10 More Discussions You Might Find Interesting

1. Linux

how to access root priveliges if root password is lost

wish to know how to access root password it root password is forgotten in linux (1 Reply)
Discussion started by: wojtyla
1 Replies

2. SCO

root access

We have SCO 5.0.5 and can't log into system as "root". The system indicates the password is incorrect. No one knows what happened. How can we resolve this issue.. Are there files we can restore from backup...? Any suggestions would be appreciated. Thank you.. (2 Replies)
Discussion started by: RBurer
2 Replies

3. UNIX for Dummies Questions & Answers

log root access

Solaris 8 OS I believe root access is being logged by my server but I only see it being written to the terminal. I want to know if there is a log file and how to not just log root access but if I can also log the IP address from which it is coming? Thanks in advance. (1 Reply)
Discussion started by: dsbeck
1 Replies

4. UNIX for Advanced & Expert Users

restricting root access

I'm the admin in a shop in which my developers have and use the root account, all UNIX newbies. I've been unable to convince management myself that this is an unacceptable practice. I've looked in a couple books I have and can't find any chapters, discussions, etc that make the argument that... (2 Replies)
Discussion started by: keith.m
2 Replies

5. AIX

root access

Hello I have a question. I have a box with Aix 5.3 but I want to disable root access direct from any terminal or console. I mean If I want to login to 10.10.10.10 login:root password ********* Root access is not permited Which file I have to edit. to the users first login with... (4 Replies)
Discussion started by: lo-lp-kl
4 Replies

6. SuSE

"scp" access denied:/etc/security/access.conf

Guys i have 2 SUSE Linux Enterprise Server 10 SP1 (i586) boxes.if i take a look into /etc/security/access.conf ,i see following lines at the eof # All other users should be denied to get access from all sources. #- : ALL : ALL - : myID : ALL now earlier i had written scripts where files... (1 Reply)
Discussion started by: ak835
1 Replies

7. UNIX for Dummies Questions & Answers

How to allow access to some commands having root privleges to be run bu non root user

hi i am new to unix and i have abig task. i have to \run particular commands having root privileges from a non root user. i know sudo is one of the way but i need sum other approach kindly help Thanks (5 Replies)
Discussion started by: suryashikha
5 Replies

8. Shell Programming and Scripting

How to give root access to non root user?

Currently in my system Red Hat is installed. And Many user connect to my machine via SSH Techia Terminal. I want to give some users a root level access. Can anyone please help me how to make it possible. I too searched on the Google but didn't find the correct way Regards ADI (4 Replies)
Discussion started by: adisky123
4 Replies

9. SuSE

Auditors want more security with root to root access via ssh keys

I access over 100 SUSE SLES servers as root from my admin server, via ssh sessions using ssh keys, so I don't have to enter a password. My SUSE Admin server is setup in the following manner: 1) Remote root access is turned off in the sshd_config file. 2) I am the only user of this admin... (6 Replies)
Discussion started by: dvbell
6 Replies

10. Ubuntu

Root access that can't change root password?

We are having a little problem on a server. We want that some users should be able to do e.g. sudo and become root, but with the restriction that the user can't change root password. That is, a guarantee that we still can login to that server and become root no matter of what the other users will... (2 Replies)
Discussion started by: 244an
2 Replies
console.perms(5)					   System Administrator's Manual					  console.perms(5)

NAME
console.perms - permissions control file for users at the system console DESCRIPTION
/etc/security/console.perms and .perms files in the /etc/security/console.perms.d directory determine the permissions that will be given to priviledged users of the console at login time, and the permissions to which to revert when the users log out. They are read by the pam_console_apply helper executable. The format is: <class>=space-separated list of words login-regexp|<login-class> perm dev-glob|<dev-class> revert-mode revert-owner[.revert-group] The revert-mode, revert-owner, and revert-group fields are optional, and default to 0600, root, and root, respectively. The words in a class definition are evaluated as globs if they refer to files, but as regular expressions if they apply to a console defi- nition. Do not mix them. Any line can be broken and continued on the next line by using a character as the last character on the line. The login-class class and the login-regexp word are evaluated as regular expressions. The dev-class and the dev-glob word are evaluated as shell-style globs. If a name given corresponds to a directory, and if it is a mount point listed in /etc/fstab, the device node associated with the filesystem mounted at that point will be substituted in its place. Classes are denoted by being contained in < angle bracket > characters; a lack of < angle brackets > indicates that the string is to be taken literally as a login-regexp or a dev-glob, depending on its input position. SEE ALSO
pam_console(8) pam_console_apply(8) console.apps(5) AUTHOR
Michael K. Johnson <johnsonm@redhat.com> Red Hat Software 2005/5/2 console.perms(5)
All times are GMT -4. The time now is 10:09 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy