04-07-2009
Quote:
Originally Posted by
jlliagre
The maximum UID has been raised to 2147483648 since Solaris 2.5.1( around 1996).
I'm not aware of any privilege restrictions linked to uids, outside specific ones like 60000, 60002 and 65534 in the context of NFS.
great information.. you googled it somewhere?
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
hello guys,
well as i mentioned first i have a serious problem, i need your help.
i have a hosting plan with linux, apache and php.
i have a script (that have my UID=32256) inside my web site (in the panel folder -see below-) that creates new scripts (in the pages folder) (the new scripts... (1 Reply)
Discussion started by: mehdi
1 Replies
2. Cybersecurity
hi
Does anyone anyone know what the last line of a unix user passwd file signifes?
Mine shows "+:::::"
best (4 Replies)
Discussion started by: s_mad010
4 Replies
3. HP-UX
Hi ,
I am using adduser in hp-ux to create users in Hp-ux.
i would like to know what are the valid values for uids and gids in hp-ux
what are the rannges for the valid uids .
How to check what are the used uids in Hp-ux .
Thanks
Narendra babu C (7 Replies)
Discussion started by: naren_chella
7 Replies
4. AIX
We have a problem where we delete a user and their associated UID gets dumped back in the UID pool. The if we immediately create a another (new) user, AIX reuses the last UID, the one that was just released. This is causing a problem when reports are being generated because the new users name is... (2 Replies)
Discussion started by: xsys2000
2 Replies
5. UNIX for Advanced & Expert Users
Hi,
What is the best ways to keep UIDs and GIDs consistent across unix and linux server. my company have a servers running on hpux, linux, aix and many of them have veritas cluster and hacmp running, many time user account have been created only on one of the cluster node and not the others... (4 Replies)
Discussion started by: robertngo
4 Replies
6. Solaris
Hi Folks,
I have Solaris 10, latest release.
We have passwd aging set in /etc/defalut/passwd.
I have an account that passwd should never expire. Acheived by emptying associated users shadow file entries for passwd aging.
When I reset the users passwd using passwd command, it re enables... (3 Replies)
Discussion started by: BG_JrAdmin
3 Replies
7. UNIX for Dummies Questions & Answers
Not an unix expert, I read a few pages on the web about passwd files, but I didn't find the answers I need about the last 8 lines of the passwd file I'm taking a look at.
I'm assuming their shortcuts to another file that may have the actual usernames of users on the system.
Please, any help... (1 Reply)
Discussion started by: fusion31
1 Replies
8. Red Hat
Hi,
I'm considering implementing pam_krb5 on RHEL 5.5 and Solaris 10, and I'm in an environment that has a number of legacy NIS domains. They've all been migrated into Active Directory, RFC2307, with the NIS maps that differed in each domain kept within its own container. However, users and... (0 Replies)
Discussion started by: cambridge
0 Replies
9. AIX
Does anyone know when AIX started using /etc/security/passwd instead of /etc/passwd to store encrypted passwords? (1 Reply)
Discussion started by: Anne Neville
1 Replies
10. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
Write a script that displays all usernames and their UIDs in the following fashion:
name1 uid=999
name2... (2 Replies)
Discussion started by: baniel
2 Replies
LEARN ABOUT CENTOS
keyctl_set_reqkey_keyring
KEYCTL_SET_REQKEY_KEYRING(3) Linux Key Management Calls KEYCTL_SET_REQKEY_KEYRING(3)
NAME
keyctl_set_reqkey_keyring - Set the implicit destination keyring
SYNOPSIS
#include <keyutils.h>
long keyctl_set_reqkey_keyring(int reqkey_defl);
DESCRIPTION
keyctl_set_reqkey_keyring() sets the default destination for implicit key requests for the current thread and returns the old setting.
After this operation has been issued, keys acquired by implicit key requests, such as might be performed by open() on an AFS or NFS
filesystem, will be linked by default to the specified keyring by this function.
The valid values of reqkey_defl are:
KEY_REQKEY_DEFL_NO_CHANGE
This makes no change to the current setting.
KEY_REQKEY_DEFL_THREAD_KEYRING
This makes the thread-specific keyring the default destination.
KEY_REQKEY_DEFL_PROCESS_KEYRING
This makes the process-specific keyring the default destination.
KEY_REQKEY_DEFL_SESSION_KEYRING
This makes the session keyring the default destination.
KEY_REQKEY_DEFL_USER_KEYRING
This makes the UID-specific keyring the default destination.
KEY_REQKEY_DEFL_USER_SESSION_KEYRING
This makes the UID-specific session keyring the default destination.
KEY_REQKEY_DEFL_DEFAULT
This selects the default behaviour which is to use the thread-specific keyring if there is one, otherwise the process-specific
keyring if there is one, otherwise the session keyring if there is one, otherwise the UID-specific session keyring.
This setting is inherited across fork() and exec().
RETURN VALUE
On success keyctl_set_reqkey_keyring() returns 0. On error, the value -1 will be returned and errno will have been set to an appropriate
error.
ERRORS
EINVAL The value of reqkey_defl is invalid.
LINKING
This is a library function that can be found in libkeyutils. When linking, -lkeyutils should be specified to the linker.
SEE ALSO
keyctl(1),
add_key(2),
keyctl(2),
request_key(2),
keyctl(3),
request-key(8)
Linux 4 May 2006 KEYCTL_SET_REQKEY_KEYRING(3)