03-09-2010
RBAC & Logging
I'm trying to set up RBAC, and I need to know where the logs for RBAC are.
I'm using Solaris 10 as my OS.
I've been reading a lot of documents online and just can't seem to find where the related logs are.
My problem is I need to be able to track a user when they su to a role profile, and what commands they use.
If there are no RBAC logs I may have to set up audit logs. I have never done this.
Any help would be great.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi gurus:
I have not come accross any links on the internet that shows how to set up logging in RBAC and also is it possible to get the granularity and simplicity of sudo logging in RBAC. I have heard that RBAC logs are complicated to read and not as simple and granular as sudo logs.
Your help... (0 Replies)
Discussion started by: geomonap
0 Replies
2. Solaris
I am trying to let user asillitoe su to the godbrook role to execute commands. I have editted files as follows:
user_attr:
asillito::::type=normal;roles=godbrook
godbrook::::type=role;profiles=Gadbrook,All
prof_attr:
Gadbrook:::Allow root commands to be used by godbrook:
exec_attr:... (0 Replies)
Discussion started by: chrisdberry
0 Replies
3. Solaris
do i have to create a new account to add a role?
i want the sysadmin login
i have 3 users on my systems
sysadmin
secman
oc01
also 3 profiles
SA (goes t0 sysadmin account)
SSO (goes to secman account)
LMICS (goes to oc01 account)
the user accounts are located in /h/USERS/local
the... (4 Replies)
Discussion started by: deaconf19
4 Replies
4. UNIX for Dummies Questions & Answers
Can anyone help me on "How to change Unix to support RBAC policy"? (4 Replies)
Discussion started by: JPoroo
4 Replies
5. Solaris
Hi all!
On backup server with contab my script worked, but one command don't fine to be executed:
bash-3.00$ scp itadmin@172.17.0.44:/export/backups/* /bckp1/opencms/bcp_`date +%Y%m%d`/
www-zone.cfg 100%... (0 Replies)
Discussion started by: sotich82
0 Replies
6. Solaris
Hello Everybody
I would like to know any major difference between sudo & RBAC as I am bit familiar with RBAC but not with sudo (2 Replies)
Discussion started by: girish.batra
2 Replies
7. HP-UX
hi every one i tried rbac and i made
1- role called GizaRoot
2- group called gizagroup
3- added privlage autherization called "m.k"
/usr/sbin/useradd:dflt:(m.k,*):0/0//:dflt:dflt:dflt:
i assigned the role to group and add user to that group then su to user and tried to use the command ... (0 Replies)
Discussion started by: maxim42
0 Replies
8. Solaris
Hello all, new to this forum (member of many others). Hopefully I can find help here.
SERVER:
Brand new server Oracle Enterprise SPARC T4-1
Loaded Solaris SPARC 10 u10, patched to 147440-27
Loaded OpenLDAP v2.4.30
Loaded Berkley DB 4.7.25.NC Loaded OpenSSL 1.0.1c
Note: All packages are... (2 Replies)
Discussion started by: Wraith_G2IC
2 Replies
9. Linux
When unlocking a Linux server's console there's no event indicating successful logging
Is there a way I can fix this ?
I have the following in my rsyslog.conf
auth.info /var/log/secure
authpriv.info /var/log/secure (1 Reply)
Discussion started by: walterthered
1 Replies
10. Solaris
Excuse my ignorance as I am very new to working with Solaris.
I'm looking for documentation on how to create a network log in Solaris 10 & 11. I don't wish to edit any of the logs currently the system. I simply want a log that will capture all incoming IP addresses and log them with a time-in... (8 Replies)
Discussion started by: FamousAv8er
8 Replies
LEARN ABOUT HPUX
cmdprivadm
cmdprivadm(1M) cmdprivadm(1M)
NAME
cmdprivadm - noninteractive editing of a command's authorization and privilege information in the privrun database
SYNOPSIS
DESCRIPTION
is a noninteractive command that allows user with appropriate permission to add or delete a command and its privileges in the Role-Base
Access Control (RBAC) database, See privrun(1M) for more details on this file.
When adding a line to the database, sets fields that are not specified a default value. When deleting a line, the lines matching all the
given pairs will be deleted. That is, if all fields specified match, the entry will be deleted.
Appends a line as specified in pairs in the file.
Deletes a line as specified in pairs from file.
HP recommends that only the and commands be used to edit and view the RBAC databases; do not edit the RBAC files directly.
See rbac(5) for information on the RBAC databases.
Options
The following options are valid pairs for
command should include the full path name of the command. There can be one or more arguments following the command.
filename should specify the full path name of a file name.
Specifies the operation.
Specifies the object.
Specifies the real user ID
(ruid).
Specifies the effective user ID
(euid).
Specifies the real group ID
(rgid).
Specifies the effective group ID
(egid).
Specifies the compartment.
Specifies the privileges.
Specifies the PAM service name to reauthenticate under.
See pam.conf(4) for a list of PAM services.
Specifies the flags.
Note: You must enclose values that contain the space character, or any characters that may be interpreted by the shell, with single quotes.
For example, if the has one or more arguments, enclose them with single quotes:
Authorizations:
In order to invoke the user must either be root, (running with effective UID of 0), or have the appropriate authorizations. The following
is a list of the required authorizations for running with particular options:
Allows user to run
with options.
Allows user to run
with options.
EXTERNAL INFLUENCES
Environment Variables
determines the language in which messages are displayed.
International Code Set Support
Single-byte character code set is supported.
RETURN VALUE
Upon completion, returns one of the following values:
Success.
Failure.
An appropriate error message is printed on standard error.
EXAMPLES
The following commands add entries into the file:
The following commands delete entries from the file:
FILES
Database containing valid definitions of all roles.
Database containing definitions of all valid authorizations.
Database specifying the roles allowed for each specified user.
Database defining the authorizations for each specified role.
Database containing the authorization to execute specified commands,
and the privileges to alter UID and GID for command execution.
SEE ALSO
authadm(1M), privrun(1M), rbacdbchk(1M), roleadm(1M), rbac(5).
cmdprivadm(1M)