Sponsored Content
Operating Systems AIX cloning users access with different user name Post 302254591 by HPL1706 on Tuesday 4th of November 2008 08:59:25 PM
Old 11-04-2008
Hi Zaxxon,

Greetings

Actually, I am creating a log in ID for AIX. I just want to make another login ID that has the same rights with the existing ID's. So we can log names of users who login. Example. The existing ID is ADM001. I want to make a login id ADMJOE. And I want them to have the same access, execution, commands rights.

I've tried making ADMJOE as similar to ADM001 using the smit user. But there are certain commands that ADMJOE cannot execute.

Please bear with me, this is just my first 1 month to handle Security Administration in AIX. Thank you for your responses. Hope you can help me...

HPL1706
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Creating USERs with restricted Access

Hi There, i need to creat USERS in UNIX with restricted access to different directories. for example user1 should have access to dir1 and dir2 user2 should have access to dir2 and dir3 Please help me (4 Replies)
Discussion started by: ramanan25
4 Replies

2. UNIX for Advanced & Expert Users

Restrict access to specific users.

Hi All! I would like to know if there is any specific way by which I can restrict access to apecific users (ip addresses). OS : Red hat linux Thanks! nua7 (6 Replies)
Discussion started by: nua7
6 Replies

3. Solaris

List users who have administrative access

Hi , Could you please give me the commands for the following. 1.list users who have direct access to solaris database at os-level 2.list users who have administrative access at os-level in solaris Please also let me know how to figure out these specific users i need from a... (6 Replies)
Discussion started by: James777
6 Replies

4. Cybersecurity

File owned by oracle user and dba group need readonly access to other users

Under oracle user file abc.txt was created. Oracle user belong to dba group on UNIX Server. However other non Oracle users which belongs to some other network groups need read only access to this file. Every time when I login as other then oracle user and try to view this file it saying that I... (2 Replies)
Discussion started by: groosha
2 Replies

5. UNIX for Dummies Questions & Answers

Access another users files

Hi, I want to access another users files and directories.Is there any command to do in unix ??.I think CHOWN would work.May i know the exact command for it. Regards, (1 Reply)
Discussion started by: William1482
1 Replies

6. UNIX for Dummies Questions & Answers

kernel giving access for multiple users to access files

hi all, i want to know y kernel is giving access for multiple users to access a file when one user may be the owner is executing that file. Because other user can manipulate that file when the other user is executing that file, it will give the unexpected result to owner . plz help me... (1 Reply)
Discussion started by: jimmyuk
1 Replies

7. HP-UX

access to .beroot for users

Hp info HP-UX tmelps04 B.11.31 U ia64 issue I created a user in his primary group is sysadmin. However when this user executes HPPI he gets shot down because he is not a super user. How do I grant the user permissions to access the beroot script? Sorry, user xxxxxx is not allowed to execute... (2 Replies)
Discussion started by: sctxms
2 Replies

8. Solaris

samba read write access to owner and no access to other users

Hi All, I want to configure samba share permission so that only directory creator/owner has a read and write permission and other users should not have any read/write access to that folder.Will that be possible and how can this be achieved within samba configuration. Regards, Sahil (1 Reply)
Discussion started by: sahil_shine
1 Replies

9. Ubuntu

Users Access - AD Authentication - User can't log in?

I have a user who's having troubles logging into one of my servers, that is authenticating with AD. After glancing over /etc/passwd, I found the users account is different than mine and others who aren't having any issues. What's the difference between these two accounts? What's the "1 60 14 60" ?... (1 Reply)
Discussion started by: Nvizn
1 Replies

10. Solaris

How to check sudo access of other users?

Hi, I always use "sudo -U user -l" as root and it gives me list of sudo access, that person have. But on one Solaris server, I can't run it. recently only I installed latest patchset on this server. Not sure, if that changed something on this. However, sudo package is showing old one. # id -a... (1 Reply)
Discussion started by: ron323232
1 Replies
wbemadmin(1M)						  System Administration Commands					     wbemadmin(1M)

NAME
wbemadmin - start Sun WBEM User Manager SYNOPSIS
/usr/sadm/bin/wbemadmin DESCRIPTION
The wbemadmin utility starts Sun WBEM User Manager, a graphical user interface that enables you to add and delete authorized WBEM users and to set their access privileges. Use this application to manage access to groups of managed resources, such as disks and installed software, in the Solaris operating environment. The wbemadmin utility allows you to perform the following tasks: Manage user access rights Use the wbemadmin utility to add, delete, or modify an individual user's access rights to a namespace on a WBEM-enabled system. Manage namespace access rights Use the wbemadmin utility to add, delete, or modify access rights for all users to a namespace. The Sun WBEM User Manager displays a Login dialog box. You must log in as root or a user with write access to the rootsecurity namespace to grant access rights to users. By default, Solaris users have guest privileges, which grants them read access to the default namespaces. Managed resources are described using a standard information model called Common Information Model (CIM). A CIM object is a computer repre- sentation, or model, of a managed resource, such as a printer, disk drive, or CPU. CIM objects can be shared by any WBEM-enabled system, device, or application. CIM objects are grouped into meaningful collections called schema. One or more schemas can be stored in directory- like structures called namespaces. All programming operations are performed within a namespace. Two namespaces are created by default during installation: o root o rootsecurity -- Contains the security classes used by the CIM Object Manager to represent access rights for users and namespaces. When a WBEM client application connects to the CIM Object Manager in a particular namespace, all subsequent operations occur within that namespace. When you connect to a namespace, you can access the classes and instances in that namespace (if they exist) and in any names- paces contained in that namespace. When a WBEM client application accesses CIM data, the WBEM system validates the user's login information on the current host. By default, a validated WBEM user is granted read access to the Common Information Model (CIM) Schema. The CIM Schema describes managed objects on your system in a standard format that all WBEM-enabled systems and applications can interpret. You can set access privileges on individual namespaces or for a user-namespace combination. When you add a user and select a namespace, by default the user is granted read access to CIM objects in the selected namespace. An effective way to combine user and namespace access rights is to first restrict access to a namespace. Then grant individual users read, read and write, or write access to that namespace. You cannot set access rights on individual managed objects. However you can set access rights for all managed objects in a namespace as well as on a per-user basis. If you log in to the root account, you can set the following types of access to CIM objects: o Read Only -- Allows read-only access to CIM Schema objects. Users with this privilege can retrieve instances and classes, but cannot create, delete, or modify CIM objects. o Read/Write -- Allows full read, write, and delete access to all CIM classes and instances. o Write -- Allows write and delete, but not read access to all CIM classes and instances. o None -- Allows no access to CIM classes and instances. Context help is displayed in the left side of the wbemadmin dialog boxes. When you click on a field, the help content changes to describe the selected field. No context help is available on the main User Manager window. The wbemadmin security administration tool updates the following Java classes in the rootsecurity namespace: o Solaris_UserAcl -- Updated when access rights are granted or changed for a user. o Solaris_namespaceAcl -- Updated when access rights are granted or changed for a namespace. USAGE
The wbemadmin utility is not the tool for a distributed environment. It is used for local administration on the machine on which the CIM Object Manager is running. EXIT STATUS
The wbemadmin utility terminates with exit status 0. WARNING
The rootsecurity namespace stores access privileges. If you grant other users access to the rootsecurity namespace, those users can grant themselves or other users rights to all other namespaces. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWwbcor | +-----------------------------+-----------------------------+ SEE ALSO
mofcomp(1M), wbemlogviewer(1M), init.wbem(1M), attributes(5) SunOS 5.10 7 Oct 1999 wbemadmin(1M)
All times are GMT -4. The time now is 02:14 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy