Sponsored Content
Operating Systems AIX cloning users access with different user name Post 302254276 by zaxxon on Tuesday 4th of November 2008 04:47:00 AM
Old 11-04-2008
Sorry, but this sounds a bit strange to me. Why do you want to clone users and keep the UID? Why not have every user his own unique UID etc. and put them together in groups? You can always try to manipulate your /etc/passwd but I can not foretell what will happen, up to you experimenting.
Maybe you describe a bit more what this stuff should be good for so we can offer alternatives.
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Creating USERs with restricted Access

Hi There, i need to creat USERS in UNIX with restricted access to different directories. for example user1 should have access to dir1 and dir2 user2 should have access to dir2 and dir3 Please help me (4 Replies)
Discussion started by: ramanan25
4 Replies

2. UNIX for Advanced & Expert Users

Restrict access to specific users.

Hi All! I would like to know if there is any specific way by which I can restrict access to apecific users (ip addresses). OS : Red hat linux Thanks! nua7 (6 Replies)
Discussion started by: nua7
6 Replies

3. Solaris

List users who have administrative access

Hi , Could you please give me the commands for the following. 1.list users who have direct access to solaris database at os-level 2.list users who have administrative access at os-level in solaris Please also let me know how to figure out these specific users i need from a... (6 Replies)
Discussion started by: James777
6 Replies

4. Cybersecurity

File owned by oracle user and dba group need readonly access to other users

Under oracle user file abc.txt was created. Oracle user belong to dba group on UNIX Server. However other non Oracle users which belongs to some other network groups need read only access to this file. Every time when I login as other then oracle user and try to view this file it saying that I... (2 Replies)
Discussion started by: groosha
2 Replies

5. UNIX for Dummies Questions & Answers

Access another users files

Hi, I want to access another users files and directories.Is there any command to do in unix ??.I think CHOWN would work.May i know the exact command for it. Regards, (1 Reply)
Discussion started by: William1482
1 Replies

6. UNIX for Dummies Questions & Answers

kernel giving access for multiple users to access files

hi all, i want to know y kernel is giving access for multiple users to access a file when one user may be the owner is executing that file. Because other user can manipulate that file when the other user is executing that file, it will give the unexpected result to owner . plz help me... (1 Reply)
Discussion started by: jimmyuk
1 Replies

7. HP-UX

access to .beroot for users

Hp info HP-UX tmelps04 B.11.31 U ia64 issue I created a user in his primary group is sysadmin. However when this user executes HPPI he gets shot down because he is not a super user. How do I grant the user permissions to access the beroot script? Sorry, user xxxxxx is not allowed to execute... (2 Replies)
Discussion started by: sctxms
2 Replies

8. Solaris

samba read write access to owner and no access to other users

Hi All, I want to configure samba share permission so that only directory creator/owner has a read and write permission and other users should not have any read/write access to that folder.Will that be possible and how can this be achieved within samba configuration. Regards, Sahil (1 Reply)
Discussion started by: sahil_shine
1 Replies

9. Ubuntu

Users Access - AD Authentication - User can't log in?

I have a user who's having troubles logging into one of my servers, that is authenticating with AD. After glancing over /etc/passwd, I found the users account is different than mine and others who aren't having any issues. What's the difference between these two accounts? What's the "1 60 14 60" ?... (1 Reply)
Discussion started by: Nvizn
1 Replies

10. Solaris

How to check sudo access of other users?

Hi, I always use "sudo -U user -l" as root and it gives me list of sudo access, that person have. But on one Solaris server, I can't run it. recently only I installed latest patchset on this server. Not sure, if that changed something on this. However, sudo package is showing old one. # id -a... (1 Reply)
Discussion started by: ron323232
1 Replies
USER-KEYRING(7) 					     Linux Programmer's Manual						   USER-KEYRING(7)

NAME
user-keyring - per-user keyring DESCRIPTION
The user keyring is a keyring used to anchor keys on behalf of a user. Each UID the kernel deals with has its own user keyring that is shared by all processes with that UID. The user keyring has a name (description) of the form _uid.<UID> where <UID> is the user ID of the corresponding user. The user keyring is associated with the record that the kernel maintains for the UID. It comes into existence upon the first attempt to access either the user keyring, the user-session-keyring(7), or the session-keyring(7). The keyring remains pinned in existence so long as there are processes running with that real UID or files opened by those processes remain open. (The keyring can also be pinned indefi- nitely by linking it into another keyring.) Typically, the user keyring is created by pam_keyinit(8) when a user logs in. The user keyring is not searched by default by request_key(2). When pam_keyinit(8) creates a session keyring, it adds to it a link to the user keyring so that the user keyring will be searched when the session keyring is. A special serial number value, KEY_SPEC_USER_KEYRING, is defined that can be used in lieu of the actual serial number of the calling process's user keyring. From the keyctl(1) utility, '@u' can be used instead of a numeric key ID in much the same way. User keyrings are independent of clone(2), fork(2), vfork(2), execve(2), and _exit(2) excepting that the keyring is destroyed when the UID record is destroyed when the last process pinning it exits. If it is necessary for a key associated with a user to exist beyond the UID record being garbage collected--for example, for use by a cron(8) script--then the persistent-keyring(7) should be used instead. If a user keyring does not exist when it is accessed, it will be created. SEE ALSO
keyctl(1), keyctl(3), keyrings(7), persistent-keyring(7), process-keyring(7), session-keyring(7), thread-keyring(7), user-session-keyring(7), pam_keyinit(8) Linux 2017-03-13 USER-KEYRING(7)
All times are GMT -4. The time now is 11:06 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy