Sponsored Content
Full Discussion: who, w and company
Top Forums Shell Programming and Scripting who, w and company Post 302411907 by star_man on Friday 9th of April 2010 05:33:21 PM
Old 04-09-2010
who, w and company

What are some of the ways to get valid who data?

There's who and w but I have cases where we login as mailadmin or dbadmin and I want to trace those logins back as far as possible. We have mixed access to the env. Some use VPN client, some use ssh to a single host and then login to other internal hosts from there. Does anyone know of a tracewho or something like that?

How are you solving this problem? We could enforce that each user has to login as themselves(less desirable) or we could do other things at login.

We don't use nfs or an auth system, just separate /etc/passwd on each host.

Ideas/thoughts/suggestions?
 

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

So, like, I signed on with a new hosting company...

... and there was absolutely nothing installed except fedora and ssh. I used yum to install vsftp and httpd, both start and ps shows they're running, and yet I can't connect with either of them. Where on earth or in redhat do I begin looking to unravel this one? I've overseen a server before but... (3 Replies)
Discussion started by: Bobby
3 Replies

2. What is on Your Mind?

What Company Makes Your Mobile Phone?

Without getting into the exact models (which change all the time anyway), who makes your (primary) mobile phone? (35 Replies)
Discussion started by: Neo
35 Replies

3. IP Networking

Bypassing My Company Firewall!

Hi! My organization has put a Firewall which eat up a lot of important data access. So I came to know about SSH Tunneling to bypass the Firewall. I will have to setup a free access SSH server to tunnel data access through PUTTY or OpenSSH. The problem is that I don't know about any free... (1 Reply)
Discussion started by: nixhead
1 Replies

4. Red Hat

mail not working with company id

Hi, I have a fresh new installation of red hat linux. I am trying to send an email from the "mail" utility from inside my Linux box to my company id "xxx@company.com". We are using microsoft exchange server online version to host our company's email. I am able to send emails to gmail and... (2 Replies)
Discussion started by: priya33184
2 Replies

5. Shell Programming and Scripting

How to convert ip to DSL provider company name?

Hello, I am not sure this question is totally related to scripting. What I want to do is to match ip addresses with DSL provider company. It should extract ip addresses from log file (which is no problem) and ask the script to search each ip in regional internet registries source webpage.... (5 Replies)
Discussion started by: baris35
5 Replies
CHSH(1)                                                            User Commands                                                           CHSH(1)

NAME
chsh - change login shell SYNOPSIS
chsh [options] [LOGIN] DESCRIPTION
The chsh command changes the user login shell. This determines the name of the user's initial login command. A normal user may only change the login shell for her own account; the superuser may change the login shell for any account. OPTIONS
The options which apply to the chsh command are: -h, --help Display help message and exit. -R, --root CHROOT_DIR Apply changes in the CHROOT_DIR directory and use the configuration files from the CHROOT_DIR directory. -s, --shell SHELL The name of the user's new login shell. Setting this field to blank causes the system to select the default login shell. If the -s option is not selected, chsh operates in an interactive fashion, prompting the user with the current login shell. Enter the new value to change the shell, or leave the line blank to use the current one. The current shell is displayed between a pair of [ ] marks. NOTE
The only restriction placed on the login shell is that the command name must be listed in /etc/shells, unless the invoker is the superuser, and then any value may be added. An account with a restricted login shell may not change her login shell. For this reason, placing /bin/rsh in /etc/shells is discouraged since accidentally changing to a restricted shell would prevent the user from ever changing her login shell back to its original value. FILES
/etc/passwd User account information. /etc/shells List of valid login shells. /etc/login.defs Shadow password suite configuration. SEE ALSO
chfn(1), login.defs(5), passwd(5). shadow-utils 4.5 01/25/2018 CHSH(1)
All times are GMT -4. The time now is 08:58 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy