Sponsored Content
Operating Systems Solaris how to assign the rights to groups in solaris Post 302246179 by dellroxy on Monday 13th of October 2008 04:33:05 AM
Old 10-13-2008
Dears.

To assign the rights to specific User In Solaris

Role-based access control (RBAC) is an alternative to the all-or-nothing superuser model. RBAC uses the security principle of least privilege. No user should be given more privilege than necessary for performing the user's job. RBAC makes it possible for an organization to separate superusers' capabilities and assign these capabilities to specific users or to special user accounts that are called roles. Roles can be assigned to specific individuals, according to their job needs

you have already user in your system named dell
you want to assign some administration tasks to del to do

1) you must make profile in this example the profile named is useradmin
# vi /etc/security/prof_attr
then you will write at the end of the file

useradmin::::
==========================================================
then at this file /etc/security/exec_attr you will assign the command what you want this user (dell) to do

/etc/security/exec_attr

useracc:suser:cmd:::/usr/sbin/useradd:uid=0
useracc:suser:cmd:::/usr/sbin/userdel:uid=0
useracc:suser:cmd:::/usr/sbin/usermod:uid=0
useracc:suser:cmd:::/usr/sbin/groupadd:uid=0
useracc:suser:cmd:::/usr/sbin/groupdel:uid=0
useracc:suser:cmd:::/usr/sbin/groupmod:uid=0
==========================================================
when you add role it's like useradd you will found the role name at /etc/passwd


Create role:-
**************
# roleadd -c "User Administration" -g "Primary Group" -md /export/home/username -s /user/bin/pfksh -P "useracc" username

-c if you want to add comment
-g if you want to add this role to primary group
-md to create the home directory for the role (it's like useradd home directory for the user)
-s to assign shell for user (this is like ksh we use but it is special for this command becouse it is check the rights you given to the user)
-P capital P to assign the profile


# passwd username
# usermod -R username dell
-R to assign role to existing user

Last edited by dellroxy; 03-02-2009 at 10:36 AM..
 

10 More Discussions You Might Find Interesting

1. UNIX Desktop Questions & Answers

Groups Rights

I just created a group. How do i make the groups read only to a specific file systems.(home directory). (3 Replies)
Discussion started by: niasdad
3 Replies

2. UNIX for Dummies Questions & Answers

Assign groups by e-mail

Folks; I want to give a group a read access to a directory tree, but i want the group to be defined by the email account. here's the details: I have a punch users who use e-mail addresses of "*@blue.com". I want give this group of "*@blue.com" a read access to a directory tree so every one who... (8 Replies)
Discussion started by: moe2266
8 Replies

3. Solaris

How to assign MAC address to N/W interface in solaris

I m having interface ce0 ce1 and its sub interfaces for that. I want to give MAC addresses for the same. How will I assign it. Please give solution for the same (4 Replies)
Discussion started by: sunray
4 Replies

4. Solaris

Solaris - Assign Static IP

Hi, I have cloned a SOLARIS 8 (BLADE 150) Hard Disk and have put into other system. So, now how do I configure the NIC and assign static IP for this new machine ? (8 Replies)
Discussion started by: angshuman_ag
8 Replies

5. Solaris

Assign Superuser rights to normal user

Hi, It's actually strange, but Is there any way through which I can assign super user rights to normal user. Actually su/sudo/rbac does solve these but switching id is the problem for an application. For eg: $dladm show-dev insufficient priviliges. Is there any way to get it done ? ... (8 Replies)
Discussion started by: tuxian
8 Replies

6. UNIX for Advanced & Expert Users

Assign default password to new users in Solaris

Hi All, I am working on a Solaris 10 machine and now working with a user creation script. I want to create users using the script and assign a default password. I found the use of 'expect' in one post, but 'expect' is not available in our server. Also, the below code is not working for... (2 Replies)
Discussion started by: jaiseaugustine
2 Replies

7. Solaris

Maximum limit for allocation of groups to a folder in solaris 10

Hi, As per my knowledge, the maximum number of groups that can be allocated to a folder (in Solaris 10) is 16. But I wonder how this rule is applicable to folders which are mounted on NFS which can be accessed by 100s of groups? or is there is a restriction present? I have never handled such a... (5 Replies)
Discussion started by: poga
5 Replies

8. Shell Programming and Scripting

Domain and work groups in solaris 10

Hello all, In solaris 10 can we create domains and workgroups like Active directory in windows? If that is possible, can some one please advise the procedure.. (1 Reply)
Discussion started by: bhargav90
1 Replies

9. Shell Programming and Scripting

Script to read through a file and create new users/assign them to groups in Ubuntu

Hi all. I need a shell script that can, in short, read through a text file line by line and create a new user in Ubuntu, as well as assign that user to a group. The format of the text file is not important but preferably: 'username:group'. I don't have much programming knowledge no matter shell... (3 Replies)
Discussion started by: LewisWeekly
3 Replies

10. Solaris

Solaris 10 groups

I have a Solaris 10 system inherited from several previous admins. While trying to decipher a permissions issue, I ran "grpck" and it reported a ton of errors. Among them were these: 1. group name too long 2. group name contains illegal characters (special chars or caps) 3. group membership... (2 Replies)
Discussion started by: cjhilinski
2 Replies
exec_attr(4)															      exec_attr(4)

NAME
exec_attr - execution profiles database SYNOPSIS
/etc/security/exec_attr /etc/security/exec_attr is a local database that specifies the execution attributes associated with profiles. The exec_attr file can be used with other sources for execution profiles, including the exec_attr NIS map and NIS+ table. Programs use the getexecattr(3SECDB) rou- tines to access this information. The search order for multiple execution profile sources is specified in the /etc/nsswitch.conf file, as described in the nsswitch.conf(4) man page. The search order follows the entry for prof_attr(4). A profile is a logical grouping of authorizations and commands that is interpreted by a profile shell to form a secure execution environ- ment. The shells that interpret profiles are pfcsh, pfksh, and pfsh. See the pfsh(1) man page. Each user's account is assigned zero or more profiles in the user_attr(4) database file. Each entry in the exec_attr database consists of one line of text containing seven fields separated by colons (:). Line continuations using the backslash (fR) character are permitted. The basic format of each entry is: name:policy:type:res1:res2:id:attr name The name of the profile. Profile names are case-sensitive. policy The security policy that is associated with the profile entry. The valid policies are suser (standard Solaris superuser) and solaris. The solaris policy recognizes privileges (see privileges(5)); the suser policy does not. The solaris and suser policies can coexist in the same exec_attr database, so that Solaris releases prior to the current release can use the suser policy and the current Solaris release can use a solaris policy. solaris is a superset of suser; it allows you to specify privileges in addition to UIDs. Policies that are specific to the current release of Solaris or that contain privileges should use solaris. Policies that use UIDs only or that are not specific to the current Solaris release should use suser. type The type of object defined in the profile. The only valid type is cmd. res1 Reserved for future use. res2 Reserved for future use. id A string that uniquely identifies the object described by the profile. For a profile of type cmd, the id is either the full path to the command or the asterisk (*) symbol, which is used to allow all commands. An asterisk that replaces the filename component in a pathname indicates all files in a particular directory. To specify arguments, the pathname should point to a shell script that is written to execute the command with the desired argument. In a Bourne shell, the effective UID is reset to the real UID of the process when the effective UID is less than 100 and not equal to the real UID. Depending on the euid and egid values, Bourne shell limitations might make other shells preferable. To prevent the effective UIDs from being reset to real UIDs, you can start the script with the -p option. #!/bin/sh -p attr An optional list of semicolon-separated (;) key-value pairs that describe the security attributes to apply to the object upon execu- tion. Zero or more keys may be specified. The list of valid key words depends on the policy enforced. The following key words are valid: euid, uid, egid, gid, privs, and limitprivs. euid and uid contain a single user name or a numeric user ID. Commands designated with euid run with the effective UID indicated, which is similar to setting the setuid bit on an executable file. Commands designated with uid run with both the real and effective UIDs. Setting uid may be more appropriate than setting the euid on privileged shell scripts. egid and gid contain a single group name or a numeric group ID. Commands designated with egid run with the effective GID indicated, which is similar to setting the setgid bit on a file. Commands designated with gid run with both the real and effective GIDs. Setting gid may be more appropriate than setting guid on privileged shell scripts. privs contains a privilege set which will be added to the inheritable set prior to running the command. limitprivs contains a privilege set which will be assigned to the limit set prior to running the command. privs and limitprivs are only valid for the solaris policy. Example 1: Using Effective User ID The following example shows the audit command specified in the Audit Control profile to execute with an effective user ID of root(0): Audit Control:suser:cmd:::/usr/sbin/audit:euid=0 /etc/nsswitch.conf /etc/user_attr /etc/security/exec_attr CAVEATS
When deciding which authorization source to use (see ), keep in mind that NIS+ provides stronger authentication than NIS. Because the list of legal keys is likely to expand, any code that parses this database must be written to ignore unknown key-value pairs without error. When any new keywords are created, the names should be prefixed with a unique string, such as the company's stock symbol, to avoid potential naming conflicts. The following characters are used in describing the database format and must be escaped with a backslash if used as data: colon (:), semi- colon (;), equals (=), and backslash (fR). auths(1), profiles(1), roles(1), sh(1), makedbm(1M), getauthattr(3SECDB), getauusernam(3BSM), getexecattr(3SECDB), getprofattr(3SECDB), getuserattr(3SECDB), kva_match(3SECDB), auth_attr(4), prof_attr(4), user_attr(4), privileges(5) 25 Feb 2005 exec_attr(4)
All times are GMT -4. The time now is 08:36 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy