I have used several Linux Flavors and now I need to know something. I have the ROOT user and then I have my personal user. What I need to do is for my normal user to be able to write files to directories where appearntly, only the root user has privileges.
For example, to write files to... (1 Reply)
Hi All,
I use "cp -R /fs/* /newfs" and I can copy everything except it won't have the files/directories the same privileges.
Is there a trick to this without using a software-backup.
Thanks in advance,
itik (3 Replies)
Hi,
I need a command or a script to change the group permissions to be the same as the owner permissions for all my files and directories (recursive)
any idea ? (4 Replies)
I can't seem to make sense of this.
$ cat /etc/redhat-release
Red Hat Enterprise Linux Server release 5.2 Beta (Tikanga)
$
$ mount
/dev/sda2 on / type ext3 (rw)
proc on /proc type proc (rw)
sysfs on /sys type sysfs (rw)
devpts on /dev/pts type devpts (rw,gid=5,mode=620)
/dev/sda1 on... (6 Replies)
Special group and user privileges help
I'm having some trouble understanding the group and user privileges.
So let's say I make a group.. and assign some users to the groups that I made.
How would I --
1) Allow different groups and different users to have full privileges over a file with .X... (5 Replies)
Hi,
Anyone can help me on how to duplicate privileges and group for useroradb01 to userrootdb01. I have currently using "useroradb01" and create a newly user "userrootdb01".
I want both in the sames privileges and group. Please see the existing users list below;
drwxr-xr-x 53 useroradb01... (0 Replies)
Hi,
I am working on setup a environment where only a specific user can upload the builds on htdocs of apache.
Now i want that a specific user can copy the builds on htdocs folder.
I created a group "deploy" and assign user1 and user2 to this group.
On Apache side i mentioned User=deploy... (3 Replies)
I am working on setup a wiki which should have users and group having read or write permission.
Before that we were using simple write to all methodology.
Now the challenge is this that i have created a 3 users and all of the 3 are able to write to wiki and update the page. Now what i what to... (0 Replies)
I'm looking for some suggestions to accomplish what a specific user needs, without adding them to the "sudoers" group. I have X user, that is requesting to be able to change file permissions on items owned by others and search directories where X user doesn't have access. I'm open to any... (2 Replies)
Hi,
In the following output you can see the the user "richard" is a member on the team/group "developers":
# id richard
uid=10247(richard) gid=100361(developers) groups=100361(developers),10053(testers)
but in the following details of the said group (developers), the said user... (3 Replies)
Discussion started by: indiansoil
3 Replies
LEARN ABOUT HPUX
setprivgrp
getprivgrp(2) System Calls Manual getprivgrp(2)NAME
getprivgrp(), setprivgrp() - get and set special attributes for group
SYNOPSIS DESCRIPTION
getprivgrp()
The system call returns a table of the privileged group assignments into a user-supplied structure. grplist points to an array of struc-
tures of type associating a group ID with a privilege mask. Privilege masks are formed by ORing together elements from the access types
specified in The array may have gaps in it, distinguished as having a field value of The group number gives the global privilege mask.
Only information about groups which are in the user's group access list, or about the user's real or effective group ID, is returned to an
ordinary user. The complete set is returned to a user with the privilege.
setprivgrp()
The system call associates a kernel capability with a group ID. This allows subletting of superuser-like privileges to members of a par-
ticular group or groups. takes two arguments: grpid, the integer group ID, and mask, a mask of permissions. The mask is created by treat-
ing the access types defined in as bit numbers (using 1 for the least significant bit). Thus, privilege number 5 would be represented by
the bits or 16. More generally, privilege p is represented by:
where is given 8 bits per byte. As it is possible to have more than word-size distinct privileges, mask is a pointer to an integer array
of size
privileges include those specified in the file A process can access the system call protected by a specific privileged group if it belongs
to or has an effective group ID of a group having access to the system call. All processes are considered to belong to the pseudo-group
Specifying a grpid of causes privileges to be revoked on all privileged groups that have any of the privileges specified in mask. Specify-
ing a grpid of causes privileges to be granted to all processes.
The constant in defines the system limit on the number of groups that can be assigned privileges. One of these is always the psuedo-group
allowing for actual groups.
Only processes with the privilege can use
Security Restrictions
Some or all of the actions associated with this system call require the privilege. Processes owned by the superuser have this privilege.
Processes owned by other users may have this privilege, depending on system configuration. See privileges(5) for more information about
privileged access on systems that support fine-grained privileges.
RETURN VALUE
and return the following values:
Successful completion.
Failure.
is set to indicate the error.
ERRORS
If fails, is set to one of the following values.
grplist points to an illegal address. The reliable detection of this error is implementation dependent.
If fails, is set to one of the following values.
The request would require assigning privileges to more than
groups.
mask points to an illegal address. The reliable detection of this error is implementation dependent.
mask has bits set for one or more unknown privileges.
grpid is out of range.
The caller is not a privileged user.
EXAMPLES
The following example prints out and the group IDs of the privilege groups to which the user belongs:
AUTHOR
and were developed by HP.
SEE ALSO getprivgrp(1), setprivgrp(1M), setgroups(2), privgrp(4), privileges(5).
getprivgrp(2)