Sponsored Content
Full Discussion: Root privilege for user
Operating Systems Solaris Root privilege for user Post 302307627 by robsonde on Thursday 16th of April 2009 12:44:49 AM
Old 04-16-2009
this question makes me think you are about to have big security problems.
the question inmplys you have the wrong solution to the problem.

why does this "normal user" need root access?
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Write privilege for user

Is it possible to grant write privileges to a user on a directory with out having to add the user to a group or make the user the owner of the directory? My background is in Windows and in Windows you can grant specific privileges to a user without having to put the user in a group or making the... (3 Replies)
Discussion started by: here2learn
3 Replies

2. Solaris

root privilege

Hello All, I need your help to know how i can give regular user ALL root privileges. If there is any way pleas help me :) Regards, Ahmad (7 Replies)
Discussion started by: ahmad_one
7 Replies

3. AIX

[Help] Give privilege to an ordinary user

I'm trying to give a non-root user the right to start IBM HTTP Server, the web server is listening on port 80, but for AIX, ports under 1024 are privilege ports which can be used only by root. /usr/IBMIHS/bin# ./apachectl start (13)Permission denied: make_sock: could not bind to address :::80... (1 Reply)
Discussion started by: ibmer414
1 Replies

4. UNIX for Dummies Questions & Answers

How to get the mouse wheel to work without root privilege

Hi, I use a nomachine terminal to access KDE desktop(redhat linux enterprise) on a server. Is there any way to get the mouse wheel to work without root privilege ? I have a usb mouse connected to a nomachine terminal,most likely the mouse wheel problem is not the problem of nomachine, but... (1 Reply)
Discussion started by: grossgermany
1 Replies

5. AIX

User Privilege

How to assign superuser privilege to an ordinary user temporarily (1 Reply)
Discussion started by: udtyuvaraj
1 Replies

6. AIX

sudo - User privilege specification

I am planning to implement sudo for users. Under , it looks I have to put the users who need to have sudo access: What are the recommended for users? I don't think I need to give the ALL privilege (i.e ) to AIX users. I'd like to know the commonly used privilege specification for sudo... (9 Replies)
Discussion started by: Daniel Gate
9 Replies

7. UNIX for Dummies Questions & Answers

Sudo to delegate permission from non-root user to another non-root user

I've been through many threads before i decide to create a separate thread. I can't really find the solution to my (simple) problem. Here's what I'm trying to achieve: As "canar" user I want to run a command, let's say "/opt/ocaml/bin/ocaml" as "duck" user. The only to achieve this is to... (1 Reply)
Discussion started by: canar
1 Replies

8. Shell Programming and Scripting

Create user with different privilege

Hi , I want to create 3 different user with below privilege in Solaris and Linux. 1) Read Only 2)Read and Write Only 3) Admin user Can you guys help me on this . (3 Replies)
Discussion started by: Naveen Pathak
3 Replies

9. Solaris

Assigning proc_owner privilege to particular user in RBAC

Hi I need to assign proc_owner privilege to particular user through RBAC. How can I assign this privilege to user, I need help on this. Further I need to understand if I give this proc_owner privilege to particular user, what kind of control user will get on other user or system processes... (7 Replies)
Discussion started by: sb200
7 Replies

10. Red Hat

Block any root Privilege

Hey is there any method (base on kernel) to block adding any root Privilege? only "root" account allow on system and no one can add new root Privilege, ? (4 Replies)
Discussion started by: nimafire
4 Replies
userdbck(1M)															      userdbck(1M)

NAME
userdbck - verify or fix information in the user database, /var/adm/userdb SYNOPSIS
[file] DESCRIPTION
verifies the information in the user database reports inconsistencies, and fixes problems. If no options and no arguments are specified, reports all data corruption problems in all files in If the option is also specified, each reported problem is repaired. If a file argument (hex 00-ff) is specified, only that file in the directory is verified. Options The following options are recognized: Verify attributes. Information in is used to report any attribute that is not valid, not allowed in the user database, has an invalid value, or is allowed only for a local user and the user is not in Normally when the user database is disabled (see userdb(4)), immediately exits without verifying or repairing the database. The option overrides this and forces to verify or repair the database. Verify user names. User names found in the database are reported if they do not exist in any of the repositories defined in This option could take a long time on a system with many users. Repair all data corruption problems that are found. If this option is not specified, problems are reported but not repaired. Notes Only users who have read and write access to can run RETURN VALUE
exits with one of the following values: success: no inconsistencies were found inconsistencies were found and fixed invalid usage database is disabled; see userdb(4) inconsistencies were found but not fixed, because the option was not specified a problem was found that could not be fixed EXAMPLES
In the following example, all problems in the user database are reported but not repaired. In the following example, all problems in file are reported and repaired. FILES
user database security defaults configuration file security attributes description file SEE ALSO
userdbget(1M), userdbset(1M), userdb_read(3), security(4), userdb(4). userdbck(1M)
All times are GMT -4. The time now is 04:19 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy