Sponsored Content
Full Discussion: Reg. user creation
Operating Systems Solaris Reg. user creation Post 302333411 by sahil_shine on Monday 13th of July 2009 03:29:19 AM
Old 07-13-2009
MySQL reg : user creation

If u mean u want to create a duplicate root user having all the privilages of root user..then just create a normal user and afterwards .. just change the uid in /etc/passwd file for the user to '0' .. but do take backup first of /etc/passwd .. for safety..
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

user creation problem

hello, Actually I want to create a user for our brower based custom application for the mail access from our mailserver(linux). I create user dummy and I granted all the privileages to dummy user and made dummy equivelent to root and if I tried to create a another user logging as dummy ... (1 Reply)
Discussion started by: jarkvarma
1 Replies

2. UNIX for Dummies Questions & Answers

user creation privileage

hello, How do I assign a user to create users other than root in linux . I want to create a users from other user. bye varma (4 Replies)
Discussion started by: jarkvarma
4 Replies

3. Solaris

User creation

Hi all, I want to create one user with full permissions to one directory called /opt/tivoli/tsm/client/ba/bin. Name for the user Tivoli Thanks & Regards Babu (7 Replies)
Discussion started by: lbreddy
7 Replies

4. AIX

User ID creation date

Dear All, I'd like to know is there any way to determine when a user id created in AIX? Thanks, Istvan (2 Replies)
Discussion started by: istvan.banai
2 Replies

5. Solaris

User Creation

i am trying to create a user on solaris 10. it is not taking user name with more than ten characters. which file i need to edit to do this setting. (4 Replies)
Discussion started by: raynu.sharma
4 Replies

6. Solaris

Reg user creation

I created a user in my Solaris box , but after creating am not able to login with that user name . Can anyone tell me that i have to change any files for enabling the login. (2 Replies)
Discussion started by: rogerben
2 Replies

7. Red Hat

User creation

Hi Thanks in advance. How to create a user without useradd command ?? (1 Reply)
Discussion started by: krish4linux
1 Replies

8. Solaris

Need help with user creation

Hello guys, i have a problem where i cant create a user and here some problem that i encounter. 1. /etc/passwd seems locked. 2. getting this error UX: useradd: ERROR: Cannot update system files - login cannot be created. # useradd -u 47367 -g 1084 -c "user123" -d /local/home/user123 -s... (2 Replies)
Discussion started by: brew
2 Replies

9. AIX

User creation

hi seniors i want to create the users like when the user try to login it should not should not promt for passwd is it possible to create users like this please help me (6 Replies)
Discussion started by: senmak
6 Replies

10. Solaris

NIS user creation

Hi can anyone help me how to create a NIS user by editing the files like Passwd,group, Netgroup,auto.home and Aliases using the "enis" utility? Please do the needful................................ (4 Replies)
Discussion started by: Revathi@1
4 Replies
gsscred(1M)						  System Administration Commands					       gsscred(1M)

NAME
gsscred - add, remove, and list gsscred table entries SYNOPSIS
gsscred [-n user [-o oid] [-u uid]] [-c comment] -m mech -a gsscred [-n user [-o oid]] [-u uid] [-m mech] -r gsscred [-n user [-o oid]] [-u uid] [-m mech] -l DESCRIPTION
The gsscred utility is used to create and maintain a mapping between a security principal name and a local UNIX uid. The format of the user name is assumed to be GSS_C_NT_USER_NAME. You can use the -o option to specify the object identifier of the name type. The OID must be specified in dot-separated notation, for example: 1.2.3.45464.3.1 The gsscred table is used on server machines to lookup the uid of incoming clients connected using RPCSEC_GSS. When adding users, if no user name is specified, an entry is created in the table for each user from the passwd table. If no comment is specified, the gsscred utility inserts a comment that specifies the user name as an ASCII string and the GSS-APIsecurity mechanism that applies to it. The security mechanism will be in string representation as defined in the /etc/gss/mech file. The parameters are interpreted the same way by the gsscred utility to delete users as they are to create users. At least one of the follow- ing options must be specified: -n, -u, or -m. If no security mechanism is specified, then all entries will be deleted for the user identi- fied by either the uid or user name. If only the security mechanism is specified, then all user entries for that security mechanism will be deleted. Again, the parameters are interpreted the same way by the gsscred utility to search for users as they are to create users. If no options are specified, then the entire table is returned. If the user name or uid is specified, then all entries for that user are returned. If a security mechanism is specified, then all user entries for that security mechanism are returned. OPTIONS
-a Add a table entry. -c comment Insert comment about this table entry. -l Search table for entry. -m mech Specify the mechanism for which this name is to be translated. -n user Specify the optional principal name. -o oid Specify the OID indicating the name type of the user. -r Remove the entry from the table. -u uid Specify the uid for the user if the user is not local. EXAMPLES
Example 1 Creating a gsscred Table for the Kerberos v5 Security Mechanism The following shows how to create a gsscred table for the kerberos v5 security mechanism. gsscred obtains user names and uid's from the passwd table to populate the table. example% gsscred -m kerberos_v5 -a Example 2 Adding an Entry for root/host1 for the Kerberos v5 Security Mechanism The following shows how to add an entry for root/host1 with a specified uid of 0 for the kerberos v5 security mechanism. example% gsscred -m kerberos_v5 -n root/host1 -u 0 -a Example 3 Listing All User Mappings for the Kerberos v5 Security Mechanism The following lists all user mappings for the kerberos v5 security mechanism. example% gsscred -m kerberos_v5 -l Example 4 Listing All Mappings for All Security Mechanism for a Specified User The following lists all mappings for all security mechanisms for the user bsimpson. example% gsscred -n bsimpson -l EXIT STATUS
The following exit values are returned: 0 Successful completion. >0 An error occurred. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWgss | +-----------------------------+-----------------------------+ |Interface Stability |Evolving | +-----------------------------+-----------------------------+ SEE ALSO
gssd(1m), gsscred.conf(4), attributes(5) NOTES
Some GSS mechanisms, such as kerberos_v5, provide their own authenticated-name-to-local-name (uid) mapping and thus do not usually have to be mapped using gsscred. See gsscred.conf(4) for more information. SunOS 5.11 11 Feb 2004 gsscred(1M)
All times are GMT -4. The time now is 07:59 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy