Sponsored Content
Top Forums UNIX for Advanced & Expert Users Creating USERs with restricted Access Post 302192022 by frank_rizzo on Monday 5th of May 2008 11:05:01 PM
Old 05-06-2008
Quote:
Originally Posted by Vicky Narayan
Buddy,

In Unix, the users have been characterised into three groups:
Owner (you)
Group (a group of other users that you set up)
World (anyone else browsing around on the file system)

So you can put the users according to your conditions. Once this is done then u can provide permissions to those groups as a whole which will equally be applied on the users inside it.

This is the only way. We can't give permissions to users individually.
This is incorrect. You can give permissions to users or groups with ACLs if your UNIX system supports it.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Restricted SSH Access

OS: FreeBSD 4.9-RELEASE I have ssh up and running. However, I need to restrict users to their home directory and to links withing those directories (i.e. htdocs/mysite and mysql/var). Is this possible? Any Suggestions? Thanks In advance. (2 Replies)
Discussion started by: ezekiel61
2 Replies

2. Linux

Can Telnet in Linux 8.0 be restricted for users

Hi, I want to create a user and allow its to be able to have telnet session like what you have in the ftp allow and deny. Is this possible Thanx. (3 Replies)
Discussion started by: kayode
3 Replies

3. UNIX for Dummies Questions & Answers

replicating restricted sam users

I'm in the process of setting up two new HP-UX 11.23 i64 servers. On my existing server (HP-UX B.11.0) we have several users defined to have restricted sam access. I'm having trouble finding those definitions and copying them over to the new servers. Is this possible - to just copy over the... (1 Reply)
Discussion started by: LisaS
1 Replies

4. UNIX for Dummies Questions & Answers

Local web cache for restricted users question

I am in charge of a project to teach 20 or so inmates basic computer skills. These people cannot have outside access to the web, but I need to show them how to do a basic Google search and search for articles on Wikipedia. (also needs to be Arabic and English) I was thinking of using a squid... (0 Replies)
Discussion started by: brazen1445
0 Replies

5. Shell Programming and Scripting

To provide restricted access to certain user's on linux box

Hi, I need to provide execute access to certain users and not to all users For ex: if ther is a file /home/august/aug.sh. and there are user's like jan,feb,mar,april,May and jan is the owner of that box. I need to provide execute access to feb and mar only. I also know the root pwd for... (3 Replies)
Discussion started by: Ashok_oct22
3 Replies

6. HP-UX

how to view restricted sam access

Hello everybody, i need to check which users have resticted sam access..can anybody please let me know how to check this..? Thanks in advance.. (4 Replies)
Discussion started by: laxmikant
4 Replies

7. UNIX for Dummies Questions & Answers

/etc/sudoers - Restricted Access

Hi Expert, I have 2 questions. Scenario: Users login via ssh from other location, using putty. or any other equivalent ssh tunnel. All users has been assigned as sudoers due to testing environment. 1. How to disable sudoers from editing /etc/sudoers e.g $ sudo vi /etc/sudoers 2.... (3 Replies)
Discussion started by: regmaster
3 Replies

8. AIX

A user with restricted ftp access to a folder

Hi, We have Oracle Database on AIX 5.3 server.We want to give ftp access to a user to a specific folder.He should be able to put and get files from that specific folder only.Moreover he should not be able to cd to any other filesystems also along with root directory. Please note that as per... (1 Reply)
Discussion started by: dwiravi
1 Replies

9. Ubuntu

Restricted access possibilities

Hi, I have given a laptop from company with Ubuntu 10.04 on it. I have restricted access over it, means I have been given sudo login on it. SO I am unable to so many major activities over it, Can you all people tell me the Terminal tricks that I can use to get my hands on it. (1 Reply)
Discussion started by: nixhead
1 Replies

10. Programming

Creating a bash based restricted shell

Hello. I need to write a command line interface that can be invoked either directly from the shell (command sub-command arguments), or as a shell that can process sub-commands. i want to use bash auto completion for both scenarios. example: lets say my CLI module is called 'mycli' and there... (5 Replies)
Discussion started by: noamr
5 Replies
CHMOD(1)						      General Commands Manual							  CHMOD(1)

NAME
chmod - change access mode for files SYNOPSIS
chmod [-R] mode file ... OPTIONS
-R Change hierarchies recursively EXAMPLES
chmod 755 file # Owner: rwx Group: r-x Others: r-x chmod +x file1 file2 # Make file1 and file2 executable chmod a-w file # Make file read only chmod u+s file # Turn on SETUID for file chmod -R o+w dir # Allow writing for all files in dir DESCRIPTION
The given mode is applied to each file in the file list. If the -R flag is present, the files in a directory will be changed as well. The mode can be either absolute or symbolic. Absolute modes are given as an octal number that represents the new file mode. The mode bits are defined as follows: 4000 Set effective user id on execution to file's owner id 2000 Set effective group id on execution to file's group id 0400 file is readable by the owner of the file 0200 writeable by owner 0100 executable by owner 0070 same as above, for other users in the same group 0007 same as above, for all other users Symbolic modes modify the current file mode in a specified way. The form is: [who] op permissions { op permissions ...} {, [who] op ... } The possibilities for who are u, g, o, and a, standing for user, group, other and all, respectively. If who is omitted, a is assumed, but the current umask is used. The op can be +, -, or =; + turns on the given permissions, - turns them off; = sets the permissions exclu- sively for the given who. For example g=x sets the group permissions to --x. The possible permissions are r, w, x; which stand for read, write, and execute; s turns on the set effective user/group id bits. s only makes sense with u and g; o+s is harmless. SEE ALSO
ls(1), chmod(2). CHMOD(1)
All times are GMT -4. The time now is 01:55 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy