04-26-2009
I'd suggest looking up the necessary UID's and using those instead.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi All
I am being trained in unix and am tryin to write a script for listing the user Processes by user's names exactly the following manner WITHOUT USING A TEMPORARY FILE or SED OR AWK! The format of the output I want is:
James Hallan
PID TTY TIME CMD
31799 pts/3 00:00:00 vim
31866... (1 Reply)
Discussion started by: kartikkumar84@g
1 Replies
2. UNIX for Dummies Questions & Answers
Hi All
I am being trained in unix and am tryin to write a script for listing the user Processes by user's names exactly the following manner WITHOUT USING A TEMPORARY FILE or SED OR AWK! The format of the output I want is:
Code:
James Hallan
PID TTY TIME CMD
31799 pts/3 00:00:00 vim ... (2 Replies)
Discussion started by: kartikkumar84@g
2 Replies
3. Shell Programming and Scripting
Hi all,
I am trying to eject the cdrom from a livecd after certain stage...
Now assuming that it is possible to eject,please consider my issue!!!
The OS boots into a regular user by default...so i am unable to use the eject command to push out the drive...
However if i try pfexec eject it... (3 Replies)
Discussion started by: wrapster
3 Replies
4. Forum Support Area for Unregistered Users & Account Problems
To Whom It May Concern,
I've tried registering, and am unable to do so. The message being returned is that my name choices are being rejected for not meeting some administrator criteria, which is not discernible from the message returned by the board software.
The password I chose was all... (1 Reply)
Discussion started by: username_in_use
1 Replies
5. Solaris
Hello, I am running a Solaris 8 system.
I Have encountered that each time I ask the system to report to me the users who have or are about to exceed their quota limit for disk usage, a strange number appears in a user name, it does not appear in my /etc/group or in my /etc/passwd files
The user... (13 Replies)
Discussion started by: lzcool
13 Replies
6. UNIX for Dummies Questions & Answers
Thanks
AVKlinux (3 Replies)
Discussion started by: avklinux
3 Replies
7. Shell Programming and Scripting
Hi All
I have written one shell script for GPRS route add is given below named GPRSRouteSet.sh
URL="www.google.com"
VBURL="10.5.2.211"
echo "Setting route for $URL for GPRS"
URL_Address=`nslookup $URL|grep Address:|grep -v "#"|awk -F " " '{print $2}'|head -1`
echo "Executing ... (3 Replies)
Discussion started by: mnmonu
3 Replies
8. UNIX for Advanced & Expert Users
Besides doing some shell-script which loops through /etc/passwd, I was wondering if there was some command that would tell me, like an enhanced version of getent.
The Operating system is Solaris 10 (recent-ish revision) using Sun DS for LDAP. (5 Replies)
Discussion started by: ckmehta
5 Replies
9. Shell Programming and Scripting
Hi I need help..........
I have an Sun One Directory server LDIF file with 5000 user entries, I need to change the data to match Test ID's, so I can run a perf test.
I'm way out of my league as I have not done any scripting for 10 years.
There are four entries for each user in the file... (3 Replies)
Discussion started by: Macdaddy99
3 Replies
10. UNIX for Dummies Questions & Answers
Whenever i switch from root to another user, by doing su - user, it takes me to home directory of user. This is very annoying as i want to be in same dir to run different commands as root sometimes and sometimes as normal user.
How to fix this? (1 Reply)
Discussion started by: syncmaster
1 Replies
LEARN ABOUT LINUX
persistent-keyring
PERSISTENT-KEYRING(7) Linux Programmer's Manual PERSISTENT-KEYRING(7)
NAME
persistent-keyring - per-user persistent keyring
DESCRIPTION
The persistent keyring is a keyring used to anchor keys on behalf of a user. Each UID the kernel deals with has its own persistent keyring
that is shared between all threads owned by that UID. The persistent keyring has a name (description) of the form _persistent.<UID> where
<UID> is the user ID of the corresponding user.
The persistent keyring may not be accessed directly, even by processes with the appropriate UID. Instead, it must first be linked to one
of a process's keyrings, before that keyring can access the persistent keyring by virtue of its possessor permits. This linking is done
with the keyctl_get_persistent(3) function.
If a persistent keyring does not exist when it is accessed by the keyctl_get_persistent(3) operation, it will be automatically created.
Each time the keyctl_get_persistent(3) operation is performed, the persistent key's expiration timer is reset to the value in:
/proc/sys/kernel/keys/persistent_keyring_expiry
Should the timeout be reached, the persistent keyring will be removed and everything it pins can then be garbage collected. The key will
then be re-created on a subsequent call to keyctl_get_persistent(3).
The persistent keyring is not directly searched by request_key(2); it is searched only if it is linked into one of the keyrings that is
searched by request_key(2).
The persistent keyring is independent of clone(2), fork(2), vfork(2), execve(2), and _exit(2). It persists until its expiration timer
triggers, at which point it is garbage collected. This allows the persistent keyring to carry keys beyond the life of the kernel's record
of the corresponding UID (the destruction of which results in the destruction of the user-keyring(7) and the user-session-keyring(7)). The
persistent keyring can thus be used to hold authentication tokens for processes that run without user interaction, such as programs started
by cron(8).
The persistent keyring is used to store UID-specific objects that themselves have limited lifetimes (e.g., kerberos tokens). If those
tokens cease to be used (i.e., the persistent keyring is not accessed), then the timeout of the persistent keyring ensures that the corre-
sponding objects are automatically discarded.
Special operations
The keyutils library provides the keyctl_get_persistent(3) function for manipulating persistent keyrings. (This function is an interface
to the keyctl(2) KEYCTL_GET_PERSISTENT operation.) This operation allows the calling thread to get the persistent keyring corresponding to
its own UID or, if the thread has the CAP_SETUID capability, the persistent keyring corresponding to some other UID in the same user names-
pace.
NOTES
Each user namespace owns a keyring called .persistent_register that contains links to all of the persistent keys in that namespace. (The
.persistent_register keyring can be seen when reading the contents of the /proc/keys file for the UID 0 in the namespace.) The
keyctl_get_persistent(3) operation looks for a key with a name of the form _persistent.<UID> in that keyring, creates the key if it does
not exist, and links it into the keyring.
SEE ALSO
keyctl(1), keyctl(3), keyctl_get_persistent(3), keyrings(7), process-keyring(7), session-keyring(7), thread-keyring(7), user-keyring(7),
user-session-keyring(7)
Linux 2017-03-13 PERSISTENT-KEYRING(7)