Hi All,
I need to change the UID numbers of many NIS users, is there any command to modify the UID in NIS maps ? ( like usermod) so that their file permissions will be same even with their new UID.
If not, how to check all the files owned by particular user in a computer and change the... (1 Reply)
Hi,
I know the uid and I wan to know the user name the uid belongs to. How can I get it.
Suppose My user name is ssnayak and coresponding uid is 1110
Similarly I know one uid 1212 and how can I come to know the user name for this uid.
Thanks & Regards,
Siba (3 Replies)
Hi, I want to write a script to check whether an user ID is used in my server and then create that user.
If the user ID is not used, I will echo something like "OK, continue" and then continue to execute the script. Else, I will echo something like "Used, exit" and then exit the script.
As... (4 Replies)
Hi,
As the /etc/passwd file contents all system and other users accounts on a linux/unix system, can anyone tell me what is the User ID values range for human user accounts (not system user accounts) on a linux (Red Hat/SuSE etc) and Unix (Solaris) OS.
I heard below number 100, all users are... (2 Replies)
Hi Everyone,
We are encountering the following issue on AIX 5.3. When we do ls -ltr the list displays only user id and group id instead of user name and group name.
This is happening for all users except root. Whe we do ls -ltr with root user it shows perfectly fine.
When we searched... (25 Replies)
Discussion started by: madhav.kunapa
25 Replies
LEARN ABOUT LINUX
pam_rootok
PAM_ROOTOK(8) Linux-PAM Manual PAM_ROOTOK(8)NAME
pam_rootok - Gain only root access
SYNOPSIS
pam_rootok.so [debug]
DESCRIPTION
pam_rootok is a PAM module that authenticates the user if their UID is 0. Applications that are created setuid-root generally retain the
UID of the user but run with the authority of an enhanced effective-UID. It is the real UID that is checked.
OPTIONS
debug
Print debug information.
MODULE TYPES PROVIDED
The auth, acct and password module types are provided.
RETURN VALUES
PAM_SUCCESS
The UID is 0.
PAM_AUTH_ERR
The UID is not 0.
EXAMPLES
In the case of the su(1) application the historical usage is to permit the superuser to adopt the identity of a lesser user without the use
of a password. To obtain this behavior with PAM the following pair of lines are needed for the corresponding entry in the /etc/pam.d/su
configuration file:
# su authentication. Root is granted access by default.
auth sufficient pam_rootok.so
auth required pam_unix.so
SEE ALSO su(1), pam.conf(5), pam.d(5), pam(7)AUTHOR
pam_rootok was written by Andrew G. Morgan, <morgan@kernel.org>.
Linux-PAM Manual 06/04/2011 PAM_ROOTOK(8)