05-08-2008
For the first question : use who or finger and you'll see who's logged. For the second - how is the access policy organized - controlled by which application or audit control in your case ? We can't be aware of the policy your organization is using or have applied on your servers.
7 More Discussions You Might Find Interesting
1. Linux
Hi,
I want to know the command for finding out the list of active/disabled users in Linux System.
Model:x86_64. Rev:2.6.9
Thanks in advance for your help
Mike (1 Reply)
Discussion started by: Mike1234
1 Replies
2. AIX
Hi all,
I am new to HACMP. So sorry for the newie question. But I did search the forum and it seems that no one asks this before.
So if a 2-node cluster runs in active-active mode (and the same application), what is the benefit of using HACMP ?
If it runs in active-stanby, it is easy to... (9 Replies)
Discussion started by: qiulang
9 Replies
3. UNIX for Dummies Questions & Answers
Hello,
I've configured an user authentication against Active Directory (Windows Server 2008 R2) on AIX V6 with LDAP. It works fine.
And here's my problem:
How can I control ldap user permissions on the local AIX machine?
E.g. an AD user should be able to write all files of local sys... (1 Reply)
Discussion started by: xia777
1 Replies
4. Solaris
Hi,
I need to configure 4 ip address (same subnet and mask) in one ipmp group (two interfaces) in an active active formation (link based). Can some one provide the steps or a tutorial link.
Thanks (2 Replies)
Discussion started by: Mack1982
2 Replies
5. AIX
First, let me start off saying this is not spam. This is me trying to help out other AIX Admins with MS AD servers. If it is not applicable to you, someone else will find it useful.
As long as the "KDC" service is running on your AD server, these steps should work. There should be no... (3 Replies)
Discussion started by: kah00na
3 Replies
6. Shell Programming and Scripting
#!/bin/bash
for digit in $(seq 1 10)
do
if ping -c1 -w2 192.168.1.$digit &> /dev/null
then
echo "192.168.1.$digit is UP"
else
echo "192.168.1.$digit is DOWN"
fi
done (3 Replies)
Discussion started by: fusetrips
3 Replies
7. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
Send a fortune to all active/logged in users
2. Relevant commands, code, scripts, algorithms:
So I understand... (8 Replies)
Discussion started by: kjcraig77
8 Replies
LEARN ABOUT CENTOS
local.users
local.users(5) SELinux configuration local.users(5)
NAME
local.users - The SELinux local users configuration file
DESCRIPTION
The file contains local user definitions in the form of policy language user statements and is only found on older SELinux systems as it
has been deprecated and replaced by the semange(8) services.
This file is only read by selinux_mkload_policy(3) when SETLOCALDEFS in the SELinux config file (see selinux_config(5)) is set to 1.
selinux_users_path(3) will return the active policy path to the directory where this file is located. The default local users file is:
/etc/selinux/{SELINUXTYPE}/contexts/users/local.users
Where {SELINUXTYPE} is the entry from the selinux configuration file config (see selinux_config(5)).
FILE FORMAT
The file consists of one or more entries terminated with ';', each on a separate line as follows:
user seuser_id roles role_id [[level level] [range range]];
Where:
user
The user keyword.
seuser_id
The SELinux user identifier.
roles
The roles keyword.
role_id
One or more previously declared role identifiers. Multiple role identifiers consist of a space separated list enclosed in
braces '{}'.
level
If MLS/MCS is configured, the level keyword.
level
The users default security level. Note that only the sensitivity component of the level (e.g. s0) is required.
range
If MLS/MCS is configured, the range keyword.
range
The current and clearance levels that the user can run. These are separated by a hyphen '-' as shown in the EXAMPLE section.
EXAMPLE
# ./users/local.users
user test_u roles staff_r level s0 range s0 - s15:c0.c1023;
SEE ALSO
selinux(8), semanage(8), selinux_users_path(3), selinux_config(5), selinux_mkload_policy(3)
Security Enhanced Linux 28-Nov-2011 local.users(5)