11-04-2008
Sorry, but this sounds a bit strange to me. Why do you want to clone users and keep the UID? Why not have every user his own unique UID etc. and put them together in groups? You can always try to manipulate your /etc/passwd but I can not foretell what will happen, up to you experimenting.
Maybe you describe a bit more what this stuff should be good for so we can offer alternatives.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi There,
i need to creat USERS in UNIX with restricted access to different directories.
for example
user1 should have access to dir1 and dir2
user2 should have access to dir2 and dir3
Please help me (4 Replies)
Discussion started by: ramanan25
4 Replies
2. UNIX for Advanced & Expert Users
Hi All!
I would like to know if there is any specific way by which I can restrict access to apecific users (ip addresses).
OS : Red hat linux
Thanks!
nua7 (6 Replies)
Discussion started by: nua7
6 Replies
3. Solaris
Hi ,
Could you please give me the commands for the following.
1.list users who have direct access to solaris database at os-level
2.list users who have administrative access at os-level in solaris
Please also let me know how to figure out these specific users i need from a... (6 Replies)
Discussion started by: James777
6 Replies
4. Cybersecurity
Under oracle user file abc.txt was created. Oracle user belong to dba group on UNIX Server. However other non Oracle users which belongs to some other network groups need read only access to this file.
Every time when I login as other then oracle user and try to view this file it saying that I... (2 Replies)
Discussion started by: groosha
2 Replies
5. UNIX for Dummies Questions & Answers
Hi,
I want to access another users files and directories.Is there any command to do in unix ??.I think CHOWN would work.May i know the exact command for it.
Regards, (1 Reply)
Discussion started by: William1482
1 Replies
6. UNIX for Dummies Questions & Answers
hi all,
i want to know y kernel is giving access for multiple users to access a file when one user may be the owner is executing that file. Because other user can manipulate that file when the other user is executing that file, it will give the unexpected result to owner . plz help me... (1 Reply)
Discussion started by: jimmyuk
1 Replies
7. HP-UX
Hp info
HP-UX tmelps04 B.11.31 U ia64
issue I created a user in his primary group is sysadmin. However when this user executes HPPI he gets shot down because he is not a super user. How do I grant the user permissions to access the beroot script?
Sorry, user xxxxxx is not allowed to execute... (2 Replies)
Discussion started by: sctxms
2 Replies
8. Solaris
Hi All,
I want to configure samba share permission so that only directory creator/owner has a read and write permission and other users should not have any read/write access to that folder.Will that be possible and how can this be achieved within samba configuration.
Regards,
Sahil (1 Reply)
Discussion started by: sahil_shine
1 Replies
9. Ubuntu
I have a user who's having troubles logging into one of my servers, that is authenticating with AD. After glancing over /etc/passwd, I found the users account is different than mine and others who aren't having any issues. What's the difference between these two accounts? What's the "1 60 14 60" ?... (1 Reply)
Discussion started by: Nvizn
1 Replies
10. Solaris
Hi,
I always use "sudo -U user -l" as root and it gives me list of sudo access, that person have. But on one Solaris server, I can't run it. recently only I installed latest patchset on this server. Not sure, if that changed something on this. However, sudo package is showing old one.
# id -a... (1 Reply)
Discussion started by: ron323232
1 Replies
LEARN ABOUT LINUX
user-keyring
USER-KEYRING(7) Linux Programmer's Manual USER-KEYRING(7)
NAME
user-keyring - per-user keyring
DESCRIPTION
The user keyring is a keyring used to anchor keys on behalf of a user. Each UID the kernel deals with has its own user keyring that is
shared by all processes with that UID. The user keyring has a name (description) of the form _uid.<UID> where <UID> is the user ID of the
corresponding user.
The user keyring is associated with the record that the kernel maintains for the UID. It comes into existence upon the first attempt to
access either the user keyring, the user-session-keyring(7), or the session-keyring(7). The keyring remains pinned in existence so long as
there are processes running with that real UID or files opened by those processes remain open. (The keyring can also be pinned indefi-
nitely by linking it into another keyring.)
Typically, the user keyring is created by pam_keyinit(8) when a user logs in.
The user keyring is not searched by default by request_key(2). When pam_keyinit(8) creates a session keyring, it adds to it a link to the
user keyring so that the user keyring will be searched when the session keyring is.
A special serial number value, KEY_SPEC_USER_KEYRING, is defined that can be used in lieu of the actual serial number of the calling
process's user keyring.
From the keyctl(1) utility, '@u' can be used instead of a numeric key ID in much the same way.
User keyrings are independent of clone(2), fork(2), vfork(2), execve(2), and _exit(2) excepting that the keyring is destroyed when the UID
record is destroyed when the last process pinning it exits.
If it is necessary for a key associated with a user to exist beyond the UID record being garbage collected--for example, for use by a
cron(8) script--then the persistent-keyring(7) should be used instead.
If a user keyring does not exist when it is accessed, it will be created.
SEE ALSO
keyctl(1), keyctl(3), keyrings(7), persistent-keyring(7), process-keyring(7), session-keyring(7), thread-keyring(7),
user-session-keyring(7), pam_keyinit(8)
Linux 2017-03-13 USER-KEYRING(7)