07-23-2010
That depends on what exactly your day-to-day requirements are.
In the worst case scenario you might get some "Permission denied" error or something alike.
You can setup a sudo account... but without further details of what you are trying to accomplish it's difficult to provide useful pointers.
This User Gave Thanks to verdepollo For This Post:
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
We have several people that log in using root. What I need to do is have everyone to log in using there own account then su to root. How would I do this. We have aix 4.2 (5 Replies)
Discussion started by: eyounes
5 Replies
2. SuSE
When I try to log on as root now all it does is load YaST. When I used to log on as root it would have a desktop and all...what has happened? Thanks in advance. (10 Replies)
Discussion started by: CTroxtell21
10 Replies
3. UNIX for Advanced & Expert Users
Hi gurus:
We have several production *nix boxes from vendors and the policy here has been to give them root access as and when they require ( upgrade, troubleshooting the application, etc). Sudo is implemented on the systems but vendors cannot upgrade the application cause it says that the root... (2 Replies)
Discussion started by: geomonap
2 Replies
4. Solaris
I would like to know how to prevent users connecting to a server using SSH as root.
I would still like them to be able to login with their username and then change to su.
But I would like to prevent them logging in directly as root.
I have searched the forum and read that I should set... (3 Replies)
Discussion started by: Sepia
3 Replies
5. HP-UX
when i am trying to login through root i am getting following error
Last successful login for root: Tue Feb 3 16:44:40 IST-5:30 2009 on pts/tc
Last unsuccessful login for root: Tue Feb 3 16:41:01 IST-5:30 2009 on pts/tc
Please wait...checking for disk quotas
crt0: ERROR couldn't open... (6 Replies)
Discussion started by: mnmca
6 Replies
6. Shell Programming and Scripting
Hi Guys.
I have 3 variables
$HOST
$Username
$Password
I want to connect to a remote server using SFTP.
usr/bin/sftp -o Cipher=blowfish $HostWhere do I put in the options for the username and pwd??? I have tried different ways and nothing works. It keeps coming back and promting me.
... (5 Replies)
Discussion started by: ramangill
5 Replies
7. HP-UX
Hi,
We're running HP-UX 11.21 / 11.31 on PARISC and ITANIUM. We're looking for soluation to avoid the core dump files to fill up / disk. Which moethod or technology that you normally use to implement this?
Thanks. (4 Replies)
Discussion started by: lamoul
4 Replies
8. UNIX for Dummies Questions & Answers
I've been through many threads before i decide to create a separate thread.
I can't really find the solution to my (simple) problem.
Here's what I'm trying to achieve:
As "canar" user I want to run a command, let's say "/opt/ocaml/bin/ocaml" as "duck" user.
The only to achieve this is to... (1 Reply)
Discussion started by: canar
1 Replies
9. Shell Programming and Scripting
Can someone help in writing some script through which I can transfer file (scp) from root user in abc server to crt user in hfg server and can give the crt user password in script itself so that it doesn't prompt me every time for password (4 Replies)
Discussion started by: Moon1234
4 Replies
LEARN ABOUT LINUX
pam_sm_acct_mgmt
PAM_SM_ACCT_MGMT(3) Linux-PAM Manual PAM_SM_ACCT_MGMT(3)
NAME
pam_sm_acct_mgmt - PAM service function for account management
SYNOPSIS
#define PAM_SM_ACCOUNT
#include <security/pam_modules.h>
PAM_EXTERN int pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, int argc, const char **argv);
DESCRIPTION
The pam_sm_acct_mgmt function is the service module's implementation of the pam_acct_mgmt(3) interface.
This function performs the task of establishing whether the user is permitted to gain access at this time. It should be understood that the
user has previously been validated by an authentication module. This function checks for other things. Such things might be: the time of
day or the date, the terminal line, remote hostname, etc. This function may also determine things like the expiration on passwords, and
respond that the user change it before continuing.
Valid flags, which may be logically OR'd with PAM_SILENT, are:
PAM_SILENT
Do not emit any messages.
PAM_DISALLOW_NULL_AUTHTOK
Return PAM_AUTH_ERR if the database of authentication tokens for this authentication mechanism has a NULL entry for the user.
RETURN VALUES
PAM_ACCT_EXPIRED
User account has expired.
PAM_AUTH_ERR
Authentication failure.
PAM_NEW_AUTHTOK_REQD
The user's authentication token has expired. Before calling this function again the application will arrange for a new one to be given.
This will likely result in a call to pam_sm_chauthtok().
PAM_PERM_DENIED
Permission denied.
PAM_SUCCESS
The authentication token was successfully updated.
PAM_USER_UNKNOWN
User unknown to password service.
SEE ALSO
pam(3), pam_acct_mgmt(3), pam_sm_chauthtok(3), pam_strerror(3), PAM(8)
Linux-PAM Manual 06/04/2011 PAM_SM_ACCT_MGMT(3)