03-26-2009
Do you have to use a group to allow individual users access to a folder owned by the group? If so, can a user belong to more than 1 group?
~David
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi
I need to access files from a specific folder of a Linux system from an another Linux System Remotely.
I know how to, Export a folder on One SCO System & can access the same by using Import via., NFS in the Sco Unix SVR4 System using the scoadmin utility.
Also, I know to use mount -t ... (2 Replies)
Discussion started by: S.Vishwanath
2 Replies
2. UNIX for Dummies Questions & Answers
I have two users, user1 and defaultuser. Whenever i logon to my unix session from a remote machine i log into defaultuser. Inside this "defaultuser" i have some setup files that i need to run from the other user that i have created myself i.e. "user1". The problem is even granting the ownership of... (3 Replies)
Discussion started by: awaismalik82
3 Replies
3. UNIX for Advanced & Expert Users
I am struggling with finding a way of securing a unix folder by controlling access to it by a LDAP Group.
In simpler terms,I am looking forward to see a username password prompt,when a specific unix folder is accessed.
That UserID and password ,should be authenticated by a secure directory (via... (1 Reply)
Discussion started by: sunmatts
1 Replies
4. UNIX for Advanced & Expert Users
Hi
I have requirement to create 3 new users on my server but to restrict their access to a set of particular folders.
/export/home/kapil/shared,
/export/home/kapil/shared/Folder1
/export/home/kapil/shared/Folder2
These folders should be accessible to all the 3 users and to me too.... (1 Reply)
Discussion started by: kapilk
1 Replies
5. AIX
Hi,
We have Oracle Database on AIX 5.3 server.We want to give ftp access to a user to a specific folder.He should be able to put and get files from that specific folder only.Moreover he should not be able to cd to any other filesystems also along with root directory.
Please note that as per... (1 Reply)
Discussion started by: dwiravi
1 Replies
6. Linux
Linux OS : Fedora 10 (No graphical mode)
Windows OS : XP and Windows Server NT
I am able to access from my windows to linux using following step
//fedora10 ip
username of admin and password
I am able to view the admin and shared printer of fedora 10.
When i try to enter in the admin... (0 Replies)
Discussion started by: nightmare49
0 Replies
7. UNIX for Dummies Questions & Answers
A friend and I run a vbulletin forum which recently got hacked. We believe what wound up happening was the attacker gained access to the VPS box and from there elevated their user accounts to admin status on our forums.
Obviously if someone gets into our box in the future it'll be a disaster so... (1 Reply)
Discussion started by: fannypack
1 Replies
8. UNIX for Advanced & Expert Users
here is the setup<br/>
sshd_config:
<pre>
Match User sftp
ChrootDirectory /chroot/sftp
</pre>
I connect just fine to the folder
<pre>/chroot/sftp</pre>
However I cannot access the website developer folder due to it being outside the scope of the defined chrootdirectory... (2 Replies)
Discussion started by: dunpealslyr
2 Replies
9. UNIX for Advanced & Expert Users
Hi all,
Can someone help me with creating user with special privilegies?
I need to create user who will have access ONLY to one folder (like /etc/log/) through ftp (read only access) and which will not have any other ways to log in like telnet, ssh etc.? (5 Replies)
Discussion started by: nypreH
5 Replies
10. UNIX for Advanced & Expert Users
Hello,
I have a a directory dir1 with permissions 700 (yes wantedly) and is owned by user1:group1
rwx------ user1 group1 dir1I need to give permissions to user2 (belongs to group2) on dir1 and its files, so I granted the permissions using setfacl ; instead of adding the user to groups and... (3 Replies)
Discussion started by: karumudi7
3 Replies
GSHADOW(5) File Formats and Conversions GSHADOW(5)
NAME
gshadow - shadowed group file
DESCRIPTION
/etc/gshadow contains the shadowed information for group accounts.
This file must not be readable by regular users if password security is to be maintained.
Each line of this file contains the following colon-separated fields:
group name
It must be a valid group name, which exist on the system.
encrypted password
Refer to crypt(3) for details on how this string is interpreted.
If the password field contains some string that is not a valid result of crypt(3), for instance ! or *, users will not be able to use a
unix password to access the group (but group members do not need the password).
The password is used when a user who is not a member of the group wants to gain the permissions of this group (see newgrp(1)).
This field may be empty, in which case only the group members can gain the group permissions.
A password field which starts with an exclamation mark means that the password is locked. The remaining characters on the line
represent the password field before the password was locked.
This password supersedes any password specified in /etc/group.
administrators
It must be a comma-separated list of user names.
Administrators can change the password or the members of the group.
Administrators also have the same permissions as the members (see below).
members
It must be a comma-separated list of user names.
Members can access the group without being prompted for a password.
You should use the same list of users as in /etc/group.
FILES
/etc/group
Group account information.
/etc/gshadow
Secure group account information.
SEE ALSO
gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1).
shadow-utils 4.5 01/25/2018 GSHADOW(5)