04-16-2009
this question makes me think you are about to have big security problems.
the question inmplys you have the wrong solution to the problem.
why does this "normal user" need root access?
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Is it possible to grant write privileges to a user on a directory with out having to add the user to a group or make the user the owner of the directory?
My background is in Windows and in Windows you can grant specific privileges to a user without having to put the user in a group or making the... (3 Replies)
Discussion started by: here2learn
3 Replies
2. Solaris
Hello All,
I need your help to know how i can give regular user ALL root privileges.
If there is any way pleas help me :)
Regards,
Ahmad (7 Replies)
Discussion started by: ahmad_one
7 Replies
3. AIX
I'm trying to give a non-root user the right to start IBM HTTP Server, the web server is listening on port 80, but for AIX, ports under 1024 are privilege ports which can be used only by root.
/usr/IBMIHS/bin# ./apachectl start
(13)Permission denied: make_sock: could not bind to address :::80... (1 Reply)
Discussion started by: ibmer414
1 Replies
4. UNIX for Dummies Questions & Answers
Hi,
I use a nomachine terminal to access KDE desktop(redhat linux enterprise) on a server. Is there any way to get the mouse wheel to work without root privilege ?
I have a usb mouse connected to a nomachine terminal,most likely the mouse wheel problem is not the problem of nomachine, but... (1 Reply)
Discussion started by: grossgermany
1 Replies
5. AIX
How to assign superuser privilege to an ordinary user temporarily (1 Reply)
Discussion started by: udtyuvaraj
1 Replies
6. AIX
I am planning to implement sudo for users.
Under , it looks I have to put the users who need to have sudo access:
What are the recommended for users? I don't think I need to give the ALL privilege (i.e ) to AIX users.
I'd like to know the commonly used privilege specification for sudo... (9 Replies)
Discussion started by: Daniel Gate
9 Replies
7. UNIX for Dummies Questions & Answers
I've been through many threads before i decide to create a separate thread.
I can't really find the solution to my (simple) problem.
Here's what I'm trying to achieve:
As "canar" user I want to run a command, let's say "/opt/ocaml/bin/ocaml" as "duck" user.
The only to achieve this is to... (1 Reply)
Discussion started by: canar
1 Replies
8. Shell Programming and Scripting
Hi ,
I want to create 3 different user with below privilege in Solaris and Linux.
1) Read Only
2)Read and Write Only
3) Admin user
Can you guys help me on this . (3 Replies)
Discussion started by: Naveen Pathak
3 Replies
9. Solaris
Hi
I need to assign proc_owner privilege to particular user through RBAC. How can I assign this privilege to user, I need help on this.
Further I need to understand if I give this proc_owner privilege to particular user, what kind of control user will get on other user or system processes... (7 Replies)
Discussion started by: sb200
7 Replies
10. Red Hat
Hey
is there any method (base on kernel) to block adding any root Privilege?
only "root" account allow on system and no one can add new root Privilege, ? (4 Replies)
Discussion started by: nimafire
4 Replies
LEARN ABOUT HPUX
userdbck
userdbck(1M) userdbck(1M)
NAME
userdbck - verify or fix information in the user database, /var/adm/userdb
SYNOPSIS
[file]
DESCRIPTION
verifies the information in the user database reports inconsistencies, and fixes problems.
If no options and no arguments are specified, reports all data corruption problems in all files in
If the option is also specified, each reported problem is repaired.
If a file argument (hex 00-ff) is specified, only that file in the directory is verified.
Options
The following options are recognized:
Verify attributes. Information in
is used to report any attribute that is not valid, not allowed in the user database, has an invalid value, or is allowed only
for a local user and the user is not in
Normally when the user database is disabled (see
userdb(4)), immediately exits without verifying or repairing the database. The option overrides this and forces to verify or
repair the database.
Verify user names.
User names found in the database are reported if they do not exist in any of the repositories defined in This option could take
a long time on a system with many users.
Repair all data corruption problems that are found.
If this option is not specified, problems are reported but not repaired.
Notes
Only users who have read and write access to can run
RETURN VALUE
exits with one of the following values:
success: no inconsistencies were found
inconsistencies were found and fixed
invalid usage
database is disabled; see
userdb(4)
inconsistencies were found but not fixed,
because the option was not specified
a problem was found that could not be fixed
EXAMPLES
In the following example, all problems in the user database are reported but not repaired.
In the following example, all problems in file are reported and repaired.
FILES
user database
security defaults configuration file
security attributes description file
SEE ALSO
userdbget(1M), userdbset(1M), userdb_read(3), security(4), userdb(4).
userdbck(1M)