05-20-2009
HMC Management -> Manage Task and Resource Roles
create a new role with just one lpar, then create a new user and assign this role to that user
Edit: oh you try to create a role, and not a user, sry
hmm I've a drop down menu for each managed system, showing all lpars
are you logged in as hscroot?
Last edited by funksen; 05-20-2009 at 08:03 AM..
9 More Discussions You Might Find Interesting
1. AIX
Can anyone tell me why its a bad idea to have rootvg span multiple physical drives
i.e.
hdisk0 00014861356a3c77 rootvg
hdisk1 0001486111354c7c rootvg
hdisk2 00014861fcef6a5d rootvg
hdisk3 none None
thanks (1 Reply)
Discussion started by: csaunders
1 Replies
2. What is on Your Mind?
In any given operating system, generally how much of AI software is involved? Is it related to user-friendliness of OS?
What is the future of strong AI? (3 Replies)
Discussion started by: MULTIVERSE
3 Replies
3. UNIX for Advanced & Expert Users
Hi,
I having problem with my linux machine
it have 6Gb physical memory and somehow it always almost coming to the bottom neck and than it start writing to the swap memory
you can see that there is more than 4G in cahce, is there any way to clean the cache or to limit it to 2Gb?
host1... (6 Replies)
Discussion started by: Igal Malka
6 Replies
4. IP Networking
I need help, how to set traffic management on the ubuntu server with the real life situation.
For example, I would like to set the lowest priority or the "Best-Effort Traffic" for the ports in the range from 35000-37000 only on the TX(transmit) and I would like that same port range has... (1 Reply)
Discussion started by: loopdemack
1 Replies
5. Red Hat
Hi guys.
I have configured Vsftpd with virtual users using Berkley DB. it is running fine. But how can we implement disk quotas for virtual users? (1 Reply)
Discussion started by: majid.merkava
1 Replies
6. Solaris
Hi gurus,
Please advice me in case such a process is taking too much of memory what are the necessary steps we need to do. Please explain with detailed.
Thanks | P.Bharathiraja:confused: (3 Replies)
Discussion started by: bharathiraja
3 Replies
7. UNIX for Dummies Questions & Answers
Hello Folks
so i have a question,
we have about 1000 linux machines in our org and would like to be able to manage all of them,
what type of software would i use, any suggestions?
i heard of puppet,
what else do we have available? (1 Reply)
Discussion started by: hookitup
1 Replies
8. UNIX and Linux Applications
Hi Experts,
I have question regarding linux cluster managment on Red Hat 5.x server. When I try to install 'luci' or 'ricci' in one of our linux servers it is giving me below error:-
yum install luci
Loaded plugins: katello, product-id, rhnplugin, security, subscription-manager
Updating... (0 Replies)
Discussion started by: Amey Joshi
0 Replies
9. Solaris
Hi all
I need to run a command that only a role user and root can run, I need to run that command remotely by script but the roles ask for a password.
Ex. from serverA with userA to serverB with userB:
userA can ssh serverB using userB without askink for a password.
ssh userB@serverB... (3 Replies)
Discussion started by: juanramos100
3 Replies
roles(1) User Commands roles(1)
NAME
roles - print roles granted to a user
SYNOPSIS
roles [ user ...]
DESCRIPTION
The command roles prints on standard output the roles that you or the optionally-specified user have been granted. Roles are special
accounts that correspond to a functional responsibility rather than to an actual person (referred to as a normal user).
Each user may have zero or more roles. Roles have most of the attributes of normal users and are identified like normal users in passwd(4)
and shadow(4). Each role must have an entry in the user_attr(4) file that identifies it as a role. Roles can have their own authorizations
and profiles. See auths(1) and profiles(1).
Roles are not allowed to log into a system as a primary user. Instead, a user must log in as him-- or herself and assume the role. The
actions of a role are attributable to the normal user. When auditing is enabled, the audited events of the role contain the audit ID of the
original user who assumed the role.
A role may not assume itself or any other role. Roles are not hierarchical. However, rights profiles (see prof_attr(4)) are hierarchical
and can be used to achieve the same effect as hierarchical roles.
Roles must have valid passwords and one of the shells that interprets profiles: either pfcsh, pfksh, or pfsh. See pfexec(1).
Role assumption may be performed using su(1M), rlogin(1), or some other service that supports the PAM_RUSER variable. Successful assumption
requires knowledge of the role's password and membership in the role. Role assignments are specified in user_attr(4).
EXAMPLES
Example 1: Sample output
The output of the roles command has the following form:
example% roles tester01 tester02
tester01 : admin
tester02 : secadmin, root
example%
EXIT STATUS
The following exit values are returned:
0 Successful completion.
1 An error occurred.
FILES
/etc/user_attr
/etc/security/auth_attr
/etc/security/prof_attr
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
SEE ALSO
auths(1), pfexec(1), profiles(1), rlogin(1), su(1M), getauusernam(3BSM), auth_attr(4), passwd(4), prof_attr(4), shadow(4), user_attr(4),
attributes(5)
SunOS 5.10 14 Feb 2001 roles(1)