10-29-2008
found the solution
at last fast the solution myself
i was missing the authorization file
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello again!
When I log in to my computer (Ultra 5 running Solaris 8) from a pc (FTP or Telnet) I have to wait forever (about 30 seconds) before I can log in. Is this some kind of security thing? Can I turn it of? How?
Anders (8 Replies)
Discussion started by: alfabetman
8 Replies
2. Shell Programming and Scripting
Hi,
I want to log-in to a remote server using shell script.
The server requires the following while allowing a connection:
username
password
one - letter authorisation.
How can i implement this in my script?
thanks,
abey (6 Replies)
Discussion started by: abey
6 Replies
3. Shell Programming and Scripting
Hi All,
I am using a script for remotely logging into a rhost using telnet and shutdown a server. The script is as follows.
IP = 10.24.12.23; export IP
UNAME = username ; export UNAME
PWD = password; export PWD
CRDIR = /etc/rc.d/init.d ; export CRDIR
echo "logging into remote... (4 Replies)
Discussion started by: patil_reddy
4 Replies
4. AIX
Hi gurus,
I am trying to configure ssh2 for not asking passwords when logging in from a remote machine, but it is failing. I ran the command based on the oracle documentation. down below are the steps, please do let me know how to get this solved.
the steps followed
$ /usr/bin/ssh-keygen2 -t dsa... (1 Reply)
Discussion started by: arunrao_oradba
1 Replies
5. AIX
My SSH version is OpenSSH_5.0p1 and it is not prompting for new password and it is saying that when password expired "Permission denied". Please some one help me regarding this
$ ssh devdhq4
"Use is subject to monitoring by First American CREDCO personnel. Any
Criminal activity or wrongdoing... (1 Reply)
Discussion started by: choudarysuresh
1 Replies
6. Solaris
how to login with ssh to remote system with out applying the remote root/user password
with rlogin we can ujse .rhosts file
but with ssh howits possible
plz guide (2 Replies)
Discussion started by: tv.praveenkumar
2 Replies
7. SCO
Hello,
I am trying to write log from sco box to a remote host.
We already have that setting working for linux server using syslog.
With this setting(on LINUX)
*.* @remote-host for sco I have this
*.debug /usr/adm/syslog
*.* ... (3 Replies)
Discussion started by: polestar
3 Replies
8. AIX
I've noticed that when running a script that connects to a number of our servers (to essentially run batch commands) that the commands aren't logged in the user's .sh_history or .bash_history files. Is there a place where this is logged (assuming the script itself isn't doing the logging and I'm... (3 Replies)
Discussion started by: kneemoe
3 Replies
9. Shell Programming and Scripting
Below is the code.
I need to login into the router if the 1st set of credentials are correct..
if wrong... then it has to check with 2nd set of credentials..
=> if the credentials are correct... then it should continue..
=> if the credentials are wrong(should not check for 2nd time... then... (0 Replies)
Discussion started by: scriptscript
0 Replies
LEARN ABOUT SUSE
gss_auth_rules
gss_auth_rules(5) Standards, Environments, and Macros gss_auth_rules(5)
NAME
gss_auth_rules - overview of GSS authorization
DESCRIPTION
The establishment of the veracity of a user's credentials requires both authentication (Is this an authentic user?) and authorization (Is
this authentic user, in fact, authorized?).
When a user makes use of Generic Security Services (GSS) versions of the ftp or ssh clients to connect to a server, the user is not neces-
sarily authorized, even if his claimed GSS identity is authenticated, Authentication merely establishes that the user is who he says he is
to the GSS mechanism's authentication system. Authorization is then required: it determines whether the GSS identity is permitted to access
the specified Solaris user account.
The GSS authorization rules are as follows:
o If the mechanism of the connection has a set of authorization rules, then use those rules. For example, if the mechanism is Kerberos,
then use the krb5_auth_rules(5), so that authorization is consistent between raw Kerberos applications and GSS/Kerberos applications.
o If the mechanism of the connection does not have a set of authorization rules, then authorization is successful if the remote user's
gssname matches the local user's gssname exactly, as compared by gss_compare_name(3GSS).
FILES
/etc/passwd
System account file. This information may also be in a directory service. See passwd(4).
ATTRIBUTES
See attributes(5) for a description of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Interface Stability |Evolving |
+-----------------------------+-----------------------------+
SEE ALSO
ftp(1), ssh(1), gsscred(1M), gss_compare_name(3GSS), passwd(4), attributes(5), krb5_auth_rules(5)
SunOS 5.10 13 Apr 2004 gss_auth_rules(5)