Sponsored Content
Full Discussion: Groups access
Operating Systems HP-UX Groups access Post 302429333 by cyberfrog on Monday 14th of June 2010 06:42:24 AM
Old 06-14-2010
Do you mean permissions in terms of:

dwrxwrxwrx for each directory?
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Need help to access/mount so to access folder/files on a Remote System using Linux OS

Hi I need to access files from a specific folder of a Linux system from an another Linux System Remotely. I know how to, Export a folder on One SCO System & can access the same by using Import via., NFS in the Sco Unix SVR4 System using the scoadmin utility. Also, I know to use mount -t ... (2 Replies)
Discussion started by: S.Vishwanath
2 Replies

2. AIX

Where are my groups

Hello A couple of weeks ago, I added a user to an AIX 5.3 system. I go to add one today, and it appears that when creating a user in smit, I cannot see any groups. No primary groups No Group set No Admin Groups The /etc/group and etc/secuity/group files seem to be intact. I did... (4 Replies)
Discussion started by: mhenryj
4 Replies

3. Solaris

groups

how to create 1000 users in 1 group (0 Replies)
Discussion started by: tirupathi
0 Replies

4. Solaris

groups

1 user in member of 4 groups find file permissions and default group (1 Reply)
Discussion started by: tirupathi
1 Replies

5. UNIX for Dummies Questions & Answers

kernel giving access for multiple users to access files

hi all, i want to know y kernel is giving access for multiple users to access a file when one user may be the owner is executing that file. Because other user can manipulate that file when the other user is executing that file, it will give the unexpected result to owner . plz help me... (1 Reply)
Discussion started by: jimmyuk
1 Replies

6. IP Networking

Does my provider limit my internet access or somesites access?

Hi Good Day, i would like to ask for further info about my problems experiencing this evening. Im a PPP0 connection in the internet using 3G located in asia pacific region.i had this problem this evening in my INTERNET connections that there are some sites i can't open example ( Gizmodo.com,... (2 Replies)
Discussion started by: jao_madn
2 Replies

7. UNIX for Dummies Questions & Answers

Groups

Must I be in a group? I am using Ubuntu and am the only user on my PC. I know how to change groups but do not see a way to not be in a group. Any help would be appreciated. (2 Replies)
Discussion started by: nthepines
2 Replies

8. Solaris

samba read write access to owner and no access to other users

Hi All, I want to configure samba share permission so that only directory creator/owner has a read and write permission and other users should not have any read/write access to that folder.Will that be possible and how can this be achieved within samba configuration. Regards, Sahil (1 Reply)
Discussion started by: sahil_shine
1 Replies

9. Shell Programming and Scripting

Selecting groups

I have a file with contents like host1.domain.com:9090,host2.domain.com:9090,host3.domain.com:9090 I am looking for such an operation so that, the output should be host1.domain.com:9090 host2.domain.com:9090 host3.domain.com:9090 And also, if the number of entries are more, the... (1 Reply)
Discussion started by: anil510
1 Replies

10. Proxy Server

How to use Squid on Linux to control certain IP to access Web Server and certain IP cannot access?

Dear all experts here, :) I would like to install a proxy server on Linux server to perform solely to control the access of Web server. In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server. I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
hosts.equiv(5)							File Formats Manual						    hosts.equiv(5)

Name
       hosts.equiv - list of trusted hosts

Description
       The file resides in the directory and contains a list of trusted hosts.	When an or request from a host listed in the file is made, and the
       initiator of the request has an entry in further validity checking is not required.  Thus, does not prompt for a  password,  and  completes
       successfully.  When a remote user is in the local file, that user is defined as equivalenced to a local user with the same user ID.

       The format of is a list of names, as in:
       host1
       -host2
       +@group1
       -@group2

       A  line	consisting  of a host name means that anyone logging in from that host is trusted.  A line consisting of a host name preceded by -
       means that anyone logging in from that host is not trusted.  A line consisting of a single + means that all hosts are trusted.	Placing  a
       line consisting of a single + in your file poses substantial security risks and is not recommended.

       The  +@ and -@ syntax are specific to Yellow Pages (YP).  A line consisting of +@group means that all hosts in that network group (which is
       served by YP) are trusted.  A line consisting of -@group means that hosts in that network group (which is served by YP)	are  not  trusted.
       Programs  scan  the  file sequentially and stop when they encounter the appropriate entry (either positive for host name and +@ entries, or
       negative for -@ entries).

       The file has the same format as the file.  When a user executes or the file from that user's home directory is concatenated onto  the  file
       for  permission	checking.  The host names listed in the and files may optionally contain the local BIND domain name.  For more information
       on BIND, see the Guide to the BIND/Hesiod Service.  If a user is excluded by a minus entry from but included in	that  user  is	considered
       trusted.  In the special case when the user is root, only the file is checked.

       It  is  possible to have two entries on a single line.  Separate the entires with a space.  If the remote host is equivalenced by the first
       entry, the user named by the second entry is allowed to specify any name to the option (provided that name is in the file).  For example:
       suez john
       This entry allows John to log in from suez.  The normal use would be to put this entry in the file in the home directory for  bill.   Then,
       John can log in as bill when coming from suez without having to supply a password.  The second entry can be a netgroup.	For example:
       +@group1 +@group2
       This entry allows any user in group2 coming from a host in group1 to log in as anyone.

Files
       /var/yp/domain/netgroup
       /var/yp/domain/netgroup.byuser
       /var/yp/domain/netgroup.byhost

See Also
       rlogin(1c), rsh(1c), netgroup(5yp)
       Guide to the BIND/Hesiod Service
       Guide to the Yellow Pages Service

																    hosts.equiv(5)
All times are GMT -4. The time now is 02:50 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy