Sponsored Content
Full Discussion: Restricted shell
Operating Systems AIX Restricted shell Post 302395816 by zaxxon on Wednesday 17th of February 2010 04:53:02 AM
Old 02-17-2010
Did you try using a link to that file? If it doesn't work maybe a chroot environment is more suitable.
 

10 More Discussions You Might Find Interesting

1. Cybersecurity

Restricted user

A few of the other employees here need to learn "vi" in order to use crontab to schedule / unschedule jobs on one of our production servers. I tried to set up a login on one of my Linux boxes for them to use "vimtutor", but scrapped it and decided to try for something more secure, since there are... (1 Reply)
Discussion started by: LivinFree
1 Replies

2. UNIX for Dummies Questions & Answers

Restricted SSH Access

OS: FreeBSD 4.9-RELEASE I have ssh up and running. However, I need to restrict users to their home directory and to links withing those directories (i.e. htdocs/mysite and mysql/var). Is this possible? Any Suggestions? Thanks In advance. (2 Replies)
Discussion started by: ezekiel61
2 Replies

3. UNIX for Dummies Questions & Answers

Restricted Shells. . .

Hey, Could someone please help me distinguish between a captive account and a restricted shell? Many thanks, L. (0 Replies)
Discussion started by: crispy
0 Replies

4. UNIX for Advanced & Expert Users

HP-UX Restricted SAM

I am having trouble getting restricted SAM to work by allocating Privileges to a "group". I can make it work by allocaing to the userid's, but would preferre to use the "group" option. Running B.11.11 Tried the following.... 1) Created a user group in /etc/group first 2) Used the... (1 Reply)
Discussion started by: Andrek
1 Replies

5. HP-UX

Restricted Login ID

I have a task to create a new id that going to used by vendor. The ID profiles are: 1)The ID to be created is MUST be restricted sharing. 2)create for their own user account 3)unable to read/navigate/view other directories 4)unable to write to other directories able to create their own... (3 Replies)
Discussion started by: yeazas
3 Replies

6. Programming

restricted pointers

Hi all. I am trying to use restricted pointers to allow the gcc compiler optimize the code, but I have not been able to make it work so far. I am testing with this code: #include <stdlib.h> #include <stdio.h> #include <time.h> #include <sys/time.h> void vecmult(int n, int * restrict a, int... (0 Replies)
Discussion started by: carl.alv
0 Replies

7. Solaris

create a restricted user

I have solaris 10 os 64 bit. I need to create a restricted user which has the following command to run ls df and du list crontab of root and edit crontab of root also please help (2 Replies)
Discussion started by: reyazan
2 Replies

8. AIX

Restricted user

Hello everyone I need to create a restricted user or a special user. Here is what I need. I have this path next to profiles I have server1, server2, server3....... The user that I have to create I need that he can move between server1. server2, server3 because in every one have logs... (1 Reply)
Discussion started by: lo-lp-kl
1 Replies

9. Programming

Creating a bash based restricted shell

Hello. I need to write a command line interface that can be invoked either directly from the shell (command sub-command arguments), or as a shell that can process sub-commands. i want to use bash auto completion for both scenarios. example: lets say my CLI module is called 'mycli' and there... (5 Replies)
Discussion started by: noamr
5 Replies

10. UNIX Desktop Questions & Answers

Restricted shell with execution permission on a file

Hi, I've created a user which shell is the restricted one (/usr/lib/rsh), but I've realized that the user cannot execute a script !!! The scope was to allow the ssh access to a user that could not access to any other directories but there that user should be able to run a script that retrieves ... (2 Replies)
Discussion started by: mary0
2 Replies
smh(1M) 																   smh(1M)

NAME
smh - HP System Management Homepage (HP SMH). SYNOPSIS
[ | | | ] DESCRIPTION
The command launches HP System Management Homepage (HP SMH) for performing system administration on an HP-UX system. HP SMH is an enhanced version of HP System Administration Manager (HP SAM). HP SMH provides web-based graphical user interface (GUI), terminal user interface (TUI), and command line interface (CLI). You can access these interfaces using the smh command. However, you can also use the sam(1M) com- mand. The sam(1M) command behaves the same as the smh(1M) command except that the deprecation message is displayed in the beginning. For more information on HP SAM, refer sam(1M) manpage. When you run either the command or the command and if the environment variable is set, HP SMH opens in the default web browser. If the environment variable is not set, HP SMH opens in the terminal user interface (TUI). Options recognizes the following options. Launches HP SMH on a web browser without security warnings. Launches HP SMH on a web browser with security warnings. The -r option applies only to the TUI of HP SMH. This option invokes Restricted SMH which, enables the system administrator to assign limited privileged user access to SMH functionality. You must be a privileged user to use this option. See the section below for more information. The -p option applies only to the CLI of HP SMH. This option invokes the /opt/propplus/bin/cprop command which, provides a command- line interface to most of the information available from the HP SMH property pages. The -p option can be used with different com- mands to view information about hardware and software, operating system, network and other system devices. See the cprop(1) manpage for more information on the command and the option parameters. Restricted SMH SMH can be configured to provide a subset of its functionality to certain users or groups of users. This is done through Restricted SMH. System administrators access Restricted SMH by invoking SMH with the option (see "Options" above). In Restricted SMH, system administra- tors may assign subsets of SMH functionality on a per-user or per-group basis. Generally, SMH requires privileged user rights to execute successfully. However, through the use of Restricted SMH, SMH can be configured to allow subsets of its capabilities to be used by non-privileged users. When Restricted SMH is used, non-privileged users are promoted to privileged users when necessary to enable them to execute successfully. By default, Restricted SMH executes all applications as privileged user. However, certain applications like software distributor have their own security mechanism and do not follow the Restricted SMH security model. In such cases, the application launched through Restricted SMH will be executed with the login id of the user who invokes it. A non-privileged user that has been given Restricted SMH privileges simply executes and sees only those areas the user is privileged to access. All the SMH functional areas require the user to be promoted to be a privileged user in order to execute successfully. SMH does this auto- matically as needed. SMH provides a default set of SMH functional areas that the system administrator can assign to other users. Restricted SMH does not apply to web-based GUI of HP SMH from HP-UX 11i v3 release as HP SMH has its own roles. For more information, refer HP SMH documentation available at http:/ /docs.hp.com and the HP SMH product online help system. Logging For information on logging, see samlog_viewer(1). AUTHOR
was developed by HP. SEE ALSO
sam(1M), samlog_viewer(1), ugweb(1M), evweb(9), fsweb(1M), secweb(1M), ncweb(1M), hpsmh(1M), kcweb(1M), parmgr(1M), pdweb(1M), smhas- sist(1M), smhstartconfig(1M), intro(7), cprop(1), HP SMH White Paper available at http://www.docs.hp.com smh(1M)
All times are GMT -4. The time now is 04:34 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy