Sponsored Content
Top Forums UNIX for Advanced & Expert Users Restrict access to specific users. Post 302227516 by ynilesh on Thursday 21st of August 2008 10:34:23 AM
Old 08-21-2008
Instead of predicting things, its better if you provide what type of restriction are you looking for ?

- nilesh
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Restrict users to certain functions

Hi Gurus, Tried searching for something similiar in this forum but not really what i want. This is my case: I have about 20 users running on sun workstation. We have done a upgrade recently and right now it seems that the users can access to terminal and console which they are not suppose... (12 Replies)
Discussion started by: lweegp
12 Replies

2. UNIX for Advanced & Expert Users

Restrict Access to the folder

Hi I have requirement to create 3 new users on my server but to restrict their access to a set of particular folders. /export/home/kapil/shared, /export/home/kapil/shared/Folder1 /export/home/kapil/shared/Folder2 These folders should be accessible to all the 3 users and to me too.... (1 Reply)
Discussion started by: kapilk
1 Replies

3. Red Hat

Restrict local users to access ftp

Hi, I had installed vsftp in rhel5 and i want to restrict all the local users from accessing the ftp. i want to allow specific users to access the ftp server. Request you to please help. Thanks & regards Arun (1 Reply)
Discussion started by: Arun.Kakarla
1 Replies

4. Solaris

To restrict the users not to change the passwords for NIS users

Hi All, How to restrict the NIS users not to change their passwords in for NIS users?? and my NIS user is unable to login to at client location what could be the problem for this ? Any body can help me. Thanks in advance. (1 Reply)
Discussion started by: Sharath Kumar
1 Replies

5. UNIX for Dummies Questions & Answers

Restrict user access.

Hi All, How can we restrict a particular user access to a particular shell in solaris 10. Thanks in Advance. (5 Replies)
Discussion started by: rama krishna
5 Replies

6. Red Hat

Restrict user access

Hi there I have an application user on my system that wants accesses to these file systems as such: rwx: /SAPO /SAPS12 /R3_888 /R3_888B /R3_888F /R3_888R r: /usr/sap these are the existing FS permissions:ownerships: # ls -ld /SAPO (9 Replies)
Discussion started by: hedkandi
9 Replies

7. Ubuntu

Restrict SUDO Access

Linux ubuntu 3.0.0-12-generic #20-Ubuntu SMP Fri Oct 7 14:56:25 UTC 2011 x86_64 x86_64 x86_64 GNU/Linux Hi Folks, Please help me. I am bit struck here. Here is the OS info. Linux ubuntu 3.0.0-12-generic #20-Ubuntu SMP Fri Oct 7 14:56:25 UTC 2011 x86_64 x86_64 x86_64 GNU/Linux I have a... (17 Replies)
Discussion started by: explorer007
17 Replies

8. Solaris

How to restrict rm -rf * to users other than root?

I'm using Solaris 10. I want to restrict users from executing this dangerous command. rm -rf * But they should be able to perform the below actions: rm -rf *.* rm -rf filename rm -rf directory Is it possible? If yes then pls let me know how to do it? (7 Replies)
Discussion started by: Arun_Linux
7 Replies

9. UNIX for Dummies Questions & Answers

Restrict access

I'm trying to use squid to restrict elinks' access to certain websites(only http traffic). I have tried some configs in squid.conf but no luck. Hope someone has a bit of time to explain me how can you make these config's :) ---------- Post updated at 05:40 PM ---------- Previous update was at... (1 Reply)
Discussion started by: Birnbacher
1 Replies

10. Solaris

How to Limit ftp access parameters for specific users?

Dear friends, :) I create new user useradd -g other -d /export/home/sltftp -m -s /bin/bash -c "SLT user account for TMA ftp backup" sltftp now i need do restrict thees chmod delete overwrite rename from this user:(for all the files in the server ,sltftp user can only able to download... (4 Replies)
Discussion started by: darakas
4 Replies
asecure(1M)															       asecure(1M)

NAME
asecure - control access to Audio on a workstation (OBSOLETED) SYNOPSIS
[] [] [] [] [] [] [] [] [] DESCRIPTION
On Series 700 workstations, audio is secured so that only the user on the local workstation can access audio. You use the command to mod- ify audio security. This command does not apply to X stations; on an X station, access to audio is unrestricted. To modify audio security, become root on the local workstation where you want make a change. Then, use as follows: When prompted, enter any meaningful password. Issuing creates the Audio Security File (ASF). The ASF contains information that determines which hosts and users can access the Aserver, and which users (other than the superuser) can modify the ASF. If needed, you can allow unrestricted access to audio on this workstation. To remove audio security, issue this command: If instead, you wish to modify security, you use to make changes to the information in the ASF. (Because the ASF is a binary file, we do not recommend using an editor on this file.) You can use to make these types of changes: o Allow all clients from a remote host to access the server. o Allow specific users from all other hosts to access the server. o Allow a specific user from a specific host to access the server. o Disable access control, allowing complete unrestricted access to the server, but leaving the ASF intact. Every operation that creates, reinitializes, or changes the contents of the ASF is logged in the file, so that you can track any changes to the ASF. Options supports the following options: Add/delete hostname,username pair. You must be either superuser or a to do this. You can supply more than one hostname,username pair separated by blanks. To use either the or options, you MUST supply at least one hostname,username pair. This option will not work without a pair. Create a new ASF file, called the file. Access control default is enabled with no entries in the access list. Aserver can now be accessed only by local users on the host machine. If an file already exists, it is re-initialized. You must be superuser to execute this option. This option is mutually-exclusive of all other options. This option requires a password. This is an extra layer of protection for the contents of the ASF. It is designed to prevent surreptitious manipulation of the ASF. If you are creating a new ASF, you are prompted for a password and an encrypted copy of that password is stored in the new ASF. If the ASF already exists, you are prompted for the password. If your password matches the password stored in the ASF, the ASF is then re-initialized. Disable access control to the Aserver. This allows unrestricted access by all clients. Enable access control to the Aserver. This restricts access to clients listed in the ASF. Enabled is the default state. Add/delete hostnames for ALL users. You must be either superuser or a to do this. You can supply more than one hostname sepa- rated by blanks. List the contents of the ASF. This option shows a list of the hostnames and/or usernames that have access to the Aserver. Change password for file. You must be superuser to do this. You are prompted once for the old password, then prompted twice for the new password. Add/delete You must be superuser to do this and must enter the password given when the ASF was created (see option). To see a list of privileged users, you must be superuser and use the option. Add/delete usernames for ALL hosts. You must be either superuser or a to do this. You can supply more than one username sepa- rated by blanks. EXAMPLES
List entries in access list. Disable access control. This means anyone can connect to Aserver without restriction. Add host for all users to access list. Remove host for all users from access list. Add user for hosts and to access list. Add user to access list for all hosts. Remove users and from access list for all hosts. Create new access list. AUTHOR
was developed by HP. FILES
asecure log pathname ASF pathname SEE ALSO
attributes(1), convert(1), send_sound(1), asecure(1M), aserver(1M), audio(5). OBSOLETED asecure(1M)
All times are GMT -4. The time now is 02:21 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy