Sponsored Content
Operating Systems Solaris rootsh on Solaris 10 is not sourcing root's .profile Post 302375168 by jlliagre on Thursday 26th of November 2009 07:07:29 PM
Old 11-26-2009
Quote:
Originally Posted by solaris_user
root access is only for system administrator and nobody else and that is final
Root login is a bad practice but raising someone's privileges to perform administrative tasks is both correct and unavoidable.
Quote:
set ALC entires and permissions instead giving root access
ACL is one way, sudo is another one and RBAC is probably the best one with Solaris. rootsh is a portable wrapper that logs every command run by a user granted root access. Quite a good security compromise.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

SunOS - root's .profile

There is no .profile file for the root user. It should reside in "/". Can I just copy a .profile file into "/"? (3 Replies)
Discussion started by: xadamz23
3 Replies

2. Solaris

.profile for root ?

Hi friends, On a Solaris system is the .profile executed for the user root also as it is for any normal user ? if i have to change the PATH variable can i add it to the .profile? and by default ther .profile is not found in the / directory. i can see it in /etc as /etc/profile. Should i... (1 Reply)
Discussion started by: sveera
1 Replies

3. UNIX for Dummies Questions & Answers

How to change root's .profile settings

As a regular (non-root) user on Unix servers I'm accustomed to changing my .profile file to set paths that I frequently use, etc. I am trying to learn unix and set up a test server running SunOS 5.8. When I login as root I don't see a .profile file that belongs to root wherein I could change the... (1 Reply)
Discussion started by: FredSmith
1 Replies

4. Solaris

trying to add .profile for root

I am trying to add a .profile for root I cd to / do vi .profile and get /var/tmp/ExGXaaqa Read only file system... What does this mean? (4 Replies)
Discussion started by: liven
4 Replies

5. AIX

Ho to copy root profile?

Does anybody know how to copy/mirror root profile in AIX 5.2? (1 Reply)
Discussion started by: fraydey
1 Replies

6. AIX

aix 6.1 root .profile not found

hello all i just installed my 1rst 6.1 machine and it's working fine but i can't find the root .profile ????? can any one help BEst Regards (1 Reply)
Discussion started by: islam.said
1 Replies

7. Shell Programming and Scripting

sourcing .profile for other users

Hi Team, Thank you for your time. i have a situation where the user IDs of the applicatio users have been locked down to Read only. Hence I am writing a script to invoke their old .profile every time they login. My problem is : when i run . $userpath/.profile from within the ksh script... (9 Replies)
Discussion started by: anitha111
9 Replies

8. UNIX for Dummies Questions & Answers

switch user (su) not sourcing the profile

Usually in solaris/Linux servers , when you do an su - username (space before and after the hyphen) the user's .profile should get sourced. But in the below linux machine it is not. As you see below ORACLE_HOME variable is not being set. # uname -a Linux revaltb214 2.6.18-238.el5 #1 SMP Sun... (7 Replies)
Discussion started by: John K
7 Replies

9. Shell Programming and Scripting

Sourcing as root automatically

Hey everyone! I have my .bash_profile file which is read automatically when I launch Terminal therefore I can run my own functions. BUT. When I do: sudo -s sudo su sudo su - No matter what I do, I can't get the .bash_profile file to be sourced automatically so I end up having to run... (2 Replies)
Discussion started by: dasx
2 Replies

10. UNIX for Advanced & Expert Users

Dot sourcing differences in ksh, AIX vs Linux vs Solaris

Why does dot sourcing of ksh functions behave so differently between AIX, Solaris, and Linux? How can I make Linux behave the way I want in the test I show below? I have a library of interdependent functions I have developed and use in ksh in AIX. They also run in Solaris. Now I am migrating... (9 Replies)
Discussion started by: charles_n_may
9 Replies
getacl(1)						      General Commands Manual							 getacl(1)

NAME
getacl - list access control lists (ACLs) for files (JFS File Systems only) SYNOPSIS
file... DESCRIPTION
For each argument that is a regular file, special file, or named pipe, displays the owner, group, and the Access Control List (ACL). For each directory argument, displays the owner, group, and the ACL and/or the default ACL. Only directories contain default ACLs. With the option specified, the filename, owner, group, and the ACL of the file will be displayed. With the option specified, the filename, owner, group, and the default ACL of the file, if it exists, will be displayed. With options not specified, the filename, owner, group, and both the ACL, and the default ACL, if it exists, will be displayed. This command may be executed on a file system that does not support ACLs. It will report the ACL consisting of only the owning user, own- ing group, class and other entries, based on the permission bits. When multiple files are specified on the command line, a blank line will separate the ACL for each file. Options The command recognizes the following options: Displays the filename, owner, group, and the ACL of the specified file. Displays the the filename, owner, group, and the default ACL of the file, if it exists. Operands The command recognizes the following operand: file The file or directory from which retrieves the access control information. ACL Format The format of an ACL is: The first three lines show the filename, the file owner, and the file owning group. Note that when only the option is specified, and the file has no default ACL, only these three lines will be displayed. The entry without a user ID indicates the permissions that will be granted to the owner of the file. One or more additional entries indi- cate the permissions that will be granted to the specified users. The entry without a group identifier indicates the permissions that will be granted to the owning group of the file. One or more additional entries indicate the permissions that will be granted to the specified groups. The entry indicates the permissions that will be granted to others. The entries and may only exist for directories, and indicate the default user, group, and other entries that will be added to a file cre- ated within the directory. The uid is a login name, or a user ID if there is no entry for the uid in the system's password file; gid is a group name, or a group ID if there is no entry for the gid in the system's group file; and perm is a three character string composed of the letters representing the separate discretionary access rights: (read), (write), (execute/search), or the placeholder character The perm will be displayed in the following order: If a permission is not granted by an ACL entry, the placeholder character will appear. The ACL entries will be displayed in the order in which they will be evaluated when an access check is performed. The default ACL entries that may exist on a directory have no effect on access checks. The file owner permission bits represent the access that the owning user ACL entry has. The file group class permission bits represent the most access that any additional user entry, additional group entry, or the owning group entry may grant. The file other permission bits represent the access that the other ACL entry has. If a user invokes the command and changes the file group class permission bits, the access granted by the additional ACL entries may be restricted. In order to indicate that the file group class permission bits restrict an ACL entry, will display, after each affected entry, text in the form , where perm will show only the permissions actually granted. EXAMPLES
Given file with an ACL six entries long, the command would print: Given file with an ACL six entries long, after the command was issued, the command would print: Given directory with an ACL containing default entries, the command would print: Given directory the command would print: NOTICES
The output from will be in the correct format for input to the command. If the output from is redirected to a file, the file may be used as input to In this way, a user may easily assign one file's ACL to another file. FILES
for user IDs for group IDs SEE ALSO
chmod(1), ls(1), setacl(1). acl(2), aclsort(3C). getacl(1)
All times are GMT -4. The time now is 01:30 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy