Sponsored Content
Full Discussion: role based user
Operating Systems AIX role based user Post 302353762 by sumathi.k on Thursday 17th of September 2009 01:57:32 AM
Old 09-17-2009
MySQL

Thanks Mr.garethr...

I found the site & assigned user role also.. It was very helpful..

---------- Post updated 09-17-09 at 12:57 AM ---------- Previous update was 09-16-09 at 05:09 AM ----------

Hi ..

I have one more doubt also.. can we configure RBAC in aix 5.3 version..

if it is possible how to do...

Thanks..
 

7 More Discussions You Might Find Interesting

1. What is on Your Mind?

Role of AI in any OS

In any given operating system, generally how much of AI software is involved? Is it related to user-friendliness of OS? What is the future of strong AI? (3 Replies)
Discussion started by: MULTIVERSE
3 Replies

2. Shell Programming and Scripting

Update LDIF User info based on Test User Certs ID's

Hi I need help.......... I have an Sun One Directory server LDIF file with 5000 user entries, I need to change the data to match Test ID's, so I can run a perf test. I'm way out of my league as I have not done any scripting for 10 years. There are four entries for each user in the file... (3 Replies)
Discussion started by: Macdaddy99
3 Replies

3. Shell Programming and Scripting

Script interacts with user , based on user input it operates

i have a script which takes input from user, if user gives either Y/y then it should continue, else it should quit by displaying user cancelled. #!/bin/sh echo " Enter your choice to continue y/Y OR n/N to quit " read A if then echo " user requested to continue " ##some commands... (7 Replies)
Discussion started by: only4satish
7 Replies

4. Red Hat

Unable to change user role using SELinux

Initial SELinux context for user hitendra $ id -Z unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 I changed the role # semanage login -a -s user_u hitendra # Then I logged in again # su - hitendra $ id -Z unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 $ But I don't... (1 Reply)
Discussion started by: hiten.r.chauhan
1 Replies

5. Solaris

Is there a difference between setting a user as nologin and setting it as a role?

Trying to figure out the best method of security for oracle user accounts. In Solaris 10 they are set as regular users but have nologin set forcing the dev's to login as themselves and then su to the oracle users. In Solaris11 we have the option of making it a role because RBAC is enabled but... (1 Reply)
Discussion started by: os2mac
1 Replies

6. Cybersecurity

Role based access and security

Hello, We are planning to setup a Role based access and security to our Linux servers. We can use mostly use sudo for providing the limited access to service and files. My query is that how can we manage that members can edit/access only specific files (it would be 1 or multiple files or... (3 Replies)
Discussion started by: sunnysthakur
3 Replies

7. Shell Programming and Scripting

Add user based on file

The script it should add all the users from this file "users.txt" All users should have the login shell as /sbin/nologin. When this script is called with any other argument, it should print the message as “Input File Not Found”ť. When this script is run without any argument, it should display... (1 Reply)
Discussion started by: invinzin21
1 Replies
roleadm(1M)															       roleadm(1M)

NAME
roleadm - noninteractive editing of role-related information in RBAC databases SYNOPSIS
[comments] [role] DESCRIPTION
is a noninteractive command that allows users with the appropriate authorization to modify and list the role information in and See rbac(5) for information on these RBAC databases. HP recommends that only the and commands be used to edit and view the RBAC databases. Do not edit the RBAC files directly. Options recognizes the following options: Add a role to the system list of valid roles. Appends a line in file with rolename. You can enter an optional comment after the role. Remove a role from the system list of valid roles. If role is present in remove entry. If role is not present, then returns an error code; see Change the name of a role. This option causes a modification of the RBAC databases and replacing each occurrence of oldrolename with newrolename. Assign a role to a user or a group. First verifies that the user is a valid user, and the role is present in the file. When this is the case, the role is appended to the user->role mapping in the file. If user argument has an ampersand at the beginning (such as &users), then it is assumed that what follows after the ampersand is a group name - the ampersand must be shell escaped or put in quotes such as users or "&users". An administrator may specify a default set of roles by assigning roles to the keyword. If a user is not otherwise explicitly assigned roles in the database, he or she will be given roles assigned to the role. Revoke a role from the specified user. If no role is specified, then all roles are revoked for the given user. (The user entry is removed from If user argument has an ampersand at the beginning (such as &users), then it is assumed that what follows after the ampersand is a group name - the amper- sand must be shell escaped or put in quotes such as users or "&users". List user and role information from the RBAC databases, and If neither nor are specified, then list all the users with assigned roles. If is specified, then only the role(s) of the specified user will be listed. If user has an ampersand at the beginning (such as &users), then it is assumed that what follows after the ampersand is a group name - the ampersand must be shell escaped or put in quotes such as users or "&users". If only is specified, then only list the user(s) assigned to the specified role. If both and are specified, then the entry with the user username and role rolename will be listed, if it exists. If the specified user does not exist in the system and there exists the special user, in the database, then the roles listed for the specified user will be those of the user. In the event that there is more than one user defined in the database, the system will recognize only the last one. If is specified, then all the roles in the roles database, will be listed. When is specified, no other argument will be taken by Authorizations In order to invoke the user must either be root, (running with effective uid of 0), or have the appropriate authorization(s). The follow- ing is a list of the required authorizations for running with particular options: hpux.security.access.role.add,* Allows user to run roleadm with "add" option. hpux.security.access.role.delete,* Allows user to run roleadm with "delete" option. hpux.security.access.role.modify,* Allows user to run roleadm with "modify" option. hpux.security.access.role.assign,* Allows user to run roleadm with "assign" option. hpux.security.access.role.revoke,* Allows user to run roleadm with "revoke" option. hpux.security.access.role.list,* Allows user to run roleadm with "list" option. EXTERNAL INFLUENCES
Environment Variables determines the language in which messages are displayed. International Code Set Support Single-byte character code set is supported. RETURN VALUE
Upon completion, returns one of the following values: Success. Failure. An appropiate error message is printed to stderr. EXAMPLES
The following command will append the line to file. The following command will append the line to the file. The following command will delete line in file and other databases. The following command will delete line from the file. The following command will replace role name with in and The following command will append line to file: The following command will remove the line from file: The following command will remove all the roles for user from file: The following command will remove all the roles for group name from file: The following command will list all the roles for user The following command will list all users and groups with role The following command will list entries with user and rolename The following command will list entries with group name The following command will list all the entries in FILES
Database containing valid definitions of all roles. Database containing definitions of all valid authorizations. Database specifying the roles allowed for each specified user. Database that defines the allowed authorization for each specified role. Database containing the authorization to execute specified commands and the privileges to alter uid and gid for command execution. SEE ALSO
authadm(1M), cmdprivadm(1M), privrun(1M), rbacdbchk(1M), rbac(5). roleadm(1M)
All times are GMT -4. The time now is 02:57 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy