04-09-2010
who, w and company
What are some of the ways to get valid who data?
There's who and w but I have cases where we login as mailadmin or dbadmin and I want to trace those logins back as far as possible. We have mixed access to the env. Some use VPN client, some use ssh to a single host and then login to other internal hosts from there. Does anyone know of a tracewho or something like that?
How are you solving this problem? We could enforce that each user has to login as themselves(less desirable) or we could do other things at login.
We don't use nfs or an auth system, just separate /etc/passwd on each host.
Ideas/thoughts/suggestions?
5 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
... and there was absolutely nothing installed except fedora and ssh. I used yum to install vsftp and httpd, both start and ps shows they're running, and yet I can't connect with either of them. Where on earth or in redhat do I begin looking to unravel this one? I've overseen a server before but... (3 Replies)
Discussion started by: Bobby
3 Replies
2. What is on Your Mind?
Without getting into the exact models (which change all the time anyway), who makes your (primary) mobile phone? (35 Replies)
Discussion started by: Neo
35 Replies
3. IP Networking
Hi!
My organization has put a Firewall which eat up a lot of important data access. So I came to know about SSH Tunneling to bypass the Firewall.
I will have to setup a free access SSH server to tunnel data access through PUTTY or OpenSSH.
The problem is that I don't know about any free... (1 Reply)
Discussion started by: nixhead
1 Replies
4. Red Hat
Hi,
I have a fresh new installation of red hat linux. I am trying to send an email from the "mail" utility from inside my Linux box to my company id "xxx@company.com". We are using microsoft exchange server online version to host our company's email.
I am able to send emails to gmail and... (2 Replies)
Discussion started by: priya33184
2 Replies
5. Shell Programming and Scripting
Hello,
I am not sure this question is totally related to scripting.
What I want to do is to match ip addresses with DSL provider company.
It should extract ip addresses from log file (which is no problem) and ask the script to search each ip in regional internet registries source webpage.... (5 Replies)
Discussion started by: baris35
5 Replies
LEARN ABOUT OPENDARWIN
chsh
CHSH(1) User Commands CHSH(1)
NAME
chsh - change login shell
SYNOPSIS
chsh [options] [LOGIN]
DESCRIPTION
The chsh command changes the user login shell. This determines the name of the user's initial login command. A normal user may only change
the login shell for her own account; the superuser may change the login shell for any account.
OPTIONS
The options which apply to the chsh command are:
-h, --help
Display help message and exit.
-R, --root CHROOT_DIR
Apply changes in the CHROOT_DIR directory and use the configuration files from the CHROOT_DIR directory.
-s, --shell SHELL
The name of the user's new login shell. Setting this field to blank causes the system to select the default login shell.
If the -s option is not selected, chsh operates in an interactive fashion, prompting the user with the current login shell. Enter the new
value to change the shell, or leave the line blank to use the current one. The current shell is displayed between a pair of [ ] marks.
NOTE
The only restriction placed on the login shell is that the command name must be listed in /etc/shells, unless the invoker is the superuser,
and then any value may be added. An account with a restricted login shell may not change her login shell. For this reason, placing /bin/rsh
in /etc/shells is discouraged since accidentally changing to a restricted shell would prevent the user from ever changing her login shell
back to its original value.
FILES
/etc/passwd
User account information.
/etc/shells
List of valid login shells.
/etc/login.defs
Shadow password suite configuration.
SEE ALSO
chfn(1), login.defs(5), passwd(5).
shadow-utils 4.5 01/25/2018 CHSH(1)