Sponsored Content
The Lounge What is on Your Mind? How Many Computers Do You Have Root Access At Work? Post 302185126 by reborg on Monday 14th of April 2008 09:27:44 AM
Old 04-14-2008
As an example I work in and R&D site. We have over 1000 servers in the R&D environment to all of which I have root access.A smaller number of servers also live in the local production LAN, in the region of 50 last time I looked. Support for the production LAN is managed gloabally and worldwide there would be over 1000 some of specialists in IT support would have access to all of these.

This does in fact not include the ~ 60,000 "personal" machines on the desktop.
 

8 More Discussions You Might Find Interesting

1. Linux

how to access root priveliges if root password is lost

wish to know how to access root password it root password is forgotten in linux (1 Reply)
Discussion started by: wojtyla
1 Replies

2. SCO

root access

We have SCO 5.0.5 and can't log into system as "root". The system indicates the password is incorrect. No one knows what happened. How can we resolve this issue.. Are there files we can restore from backup...? Any suggestions would be appreciated. Thank you.. (2 Replies)
Discussion started by: RBurer
2 Replies

3. Filesystems, Disks and Memory

Unix Sco Open Server, Windows Computers Problem Access Unix Shared Files Help!!!!!

Hello Moto I hope someone can help We's here at work, have a unix box with sco openserver 5 on it, so it has a nice gui interface.. and also a fair few windows computers.. a system admin guy b4 me, has set up a user called neil, which can, when u try to access the unix box using windows... (2 Replies)
Discussion started by: haggo
2 Replies

4. AIX

root access

Hello I have a question. I have a box with Aix 5.3 but I want to disable root access direct from any terminal or console. I mean If I want to login to 10.10.10.10 login:root password ********* Root access is not permited Which file I have to edit. to the users first login with... (4 Replies)
Discussion started by: lo-lp-kl
4 Replies

5. UNIX for Dummies Questions & Answers

How to allow access to some commands having root privleges to be run bu non root user

hi i am new to unix and i have abig task. i have to \run particular commands having root privileges from a non root user. i know sudo is one of the way but i need sum other approach kindly help Thanks (5 Replies)
Discussion started by: suryashikha
5 Replies

6. Shell Programming and Scripting

How to give root access to non root user?

Currently in my system Red Hat is installed. And Many user connect to my machine via SSH Techia Terminal. I want to give some users a root level access. Can anyone please help me how to make it possible. I too searched on the Google but didn't find the correct way Regards ADI (4 Replies)
Discussion started by: adisky123
4 Replies

7. SuSE

Auditors want more security with root to root access via ssh keys

I access over 100 SUSE SLES servers as root from my admin server, via ssh sessions using ssh keys, so I don't have to enter a password. My SUSE Admin server is setup in the following manner: 1) Remote root access is turned off in the sshd_config file. 2) I am the only user of this admin... (6 Replies)
Discussion started by: dvbell
6 Replies

8. Ubuntu

Root access that can't change root password?

We are having a little problem on a server. We want that some users should be able to do e.g. sudo and become root, but with the restriction that the user can't change root password. That is, a guarantee that we still can login to that server and become root no matter of what the other users will... (2 Replies)
Discussion started by: 244an
2 Replies
MOUNT_UMAP(8)						    BSD System Manager's Manual 					     MOUNT_UMAP(8)

NAME
mount_umap -- user and group ID remapping file system layer SYNOPSIS
mount_umap [-o options] -g gid-mapfile -u uid-mapfile target mount-point DESCRIPTION
The mount_umap command is used to mount a sub-tree of an existing file system that uses a different set of uids and gids than the local sys- tem. Such a file system could be mounted from a remote site via NFS, a local file system on removable media brought from some foreign loca- tion that uses a different user/group database, or could be a local file system for another operating system which does not support Unix- style user/group IDs, or which uses a different numbering scheme. Both target and mount-point are converted to absolute paths before use. The options are as follows: -g gid-mapfile Use the group ID mapping specified in gid-mapfile. This flag is required. -o Options are specified with a -o flag followed by a comma separated string of options. See the mount(8) man page for possible options and their meanings. -u uid-mapfile Use the user ID mapping specified in uid-mapfile. This flag is required. The mount_umap command uses a set of files provided by the user to make correspondences between uids and gids in the sub-tree's original environment and some other set of ids in the local environment. For instance, user smith might have uid 1000 in the original environment, while having uid 2000 in the local environment. The mount_umap command allows the subtree from smith's original environment to be mapped in such a way that all files with owning uid 1000 look like they are actually owned by uid 2000. target should be the current location of the sub-tree in the local system's name space. mount-point should be a directory where the mapped subtree is to be placed. uid-mapfile and gid-mapfile describe the mappings to be made between identifiers. The format of the user and group ID mapping files is very simple. The first line of the file is the total number of mappings present in the file. The remaining lines each consist of two numbers: the ID in the mapped subtree and the ID in the original subtree. For example, to map uid 1000 in the original subtree to uid 2000 in the mapped subtree: 1 2000 1000 For user IDs in the original subtree for which no mapping exists, the user ID will be mapped to the user ``nobody''. For group IDs in the original subtree for which no mapping exists, the group ID will be mapped to the group ``nobody''. There is a limit of 64 user ID mappings and 16 group ID mappings. The mapfiles can be located anywhere in the file hierarchy, but they must be owned by root, and they must be writable only by root. mount_umap will refuse to map the sub-tree if the ownership or permissions on these files are improper. It will also report an error if the count of mappings in the first line of the map files is not correct. SEE ALSO
mount(8), mount_null(8) HISTORY
The mount_umap utility first appeared in 4.4BSD. BUGS
The implementation is not very sophisticated. BSD
March 6, 2001 BSD
All times are GMT -4. The time now is 02:03 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy