08-05-2010
On a linux system editing /etc/security/limits.conf will allow you to set ulimits on several different levels (user, group, etc).
I don't have access to an HP-UX machine, so I don't know if this caries to that flavour of UNIX. If it's not the same under HP-UX, maybe there is something similar.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hello,
I just want to know ow I can set permanent pathes or whatever using setenv command. I'm using c shell .
regards,
me (1 Reply)
Discussion started by: geoquest
1 Replies
2. UNIX for Dummies Questions & Answers
ulimit -a gives the following output:$ulimit -a
time(seconds) unlimited
file(blocks) 2097152
data(kbytes) 131072
stack(kbytes) 16384
memory(kbytes) unlimited
coredump(blocks) 32768
nofiles(descriptors) 400
vmemory(kbytes) 147456
Abot output... (3 Replies)
Discussion started by: nervous
3 Replies
3. AIX
how to set the ulimit on AIX 5.2 version? (3 Replies)
Discussion started by: Shilpi
3 Replies
4. UNIX for Advanced & Expert Users
Hi,
as per my Unix admin all parameters in Ulimit are set to Unlimited in Hard limits but some how few profiles setting data segment part to limited number value. So i wanted to over write in my profile to set unlimited as hard limits are set to unlimited. What is the command to set ulimit for... (1 Reply)
Discussion started by: terala_s
1 Replies
5. Solaris
Hi guys,
I'm running Solars 8 on a V100 server at home for testing.
If I switch user to root and do:
# echo $PATH
This is the output:
/usr/sbin:/usr/bin
I'm using rsync over ssh and need to add /usr/local/bin and /user/local/sbin.
I do this by running the line:
#... (3 Replies)
Discussion started by: Stin
3 Replies
6. AIX
I set my TERM variable to work with SMIT and everything works fine but when I logged out and log in again I have to set the variable again.
How can I set a permanent variable into the system so it will be as I wish even if a reboot is needed?
I set variables this way:
export VAR=value (7 Replies)
Discussion started by: agasamapetilon
7 Replies
7. Solaris
Hi,
I've read forums far and wide trying to learn how to append to my PATH in Solaris 9 and every time I think I am close I discover my system is not configured the same. Its so frustrating because this all stems from a new server I am trying to setup identical to the production machine. (Of... (5 Replies)
Discussion started by: thoraddict
5 Replies
8. UNIX for Advanced & Expert Users
I read this article as a way to do a non-permanent of something.
I saw 2 problems. The first that my rm is located at /bin/rm. I would assume I would change the location to /bin/rm. The second my rm is a executable file and not a text file. So will replacing my rm file with the shellscript... (3 Replies)
Discussion started by: cokedude
3 Replies
9. Solaris
Hi All
On my Solaris 10 X86, under my root directory I have a file called Aliases. It is owned by root (root:root) and the user (I mean root) has rwx permissions. In this file I have set some aliases like the following
alias a="cd /opt/IBM/WebSphere/AppAerver/Profiles"
When I run the above... (0 Replies)
Discussion started by: chrs0302
0 Replies
10. Shell Programming and Scripting
We are using csh on our AIX platform, if we have to export/set a specific environment variable we use setenv command but its only valid till session.
How do we set that variable permanent in our csh AIX? Do we put it in userprofile file or something else? (1 Reply)
Discussion started by: aixusrsys
1 Replies
LEARN ABOUT CENTOS
pam_group
PAM_GROUP(8) Linux-PAM Manual PAM_GROUP(8)
NAME
pam_group - PAM module for group access
SYNOPSIS
pam_group.so
DESCRIPTION
The pam_group PAM module does not authenticate the user, but instead it grants group memberships (in the credential setting phase of the
authentication module) to the user. Such memberships are based on the service they are applying for.
By default rules for group memberships are taken from config file /etc/security/group.conf.
This module's usefulness relies on the file-systems accessible to the user. The point being that once granted the membership of a group,
the user may attempt to create a setgid binary with a restricted group ownership. Later, when the user is not given membership to this
group, they can recover group membership with the precompiled binary. The reason that the file-systems that the user has access to are so
significant, is the fact that when a system is mounted nosuid the user is unable to create or execute such a binary file. For this module
to provide any level of security, all file-systems that the user has write access to should be mounted nosuid.
The pam_group module functions in parallel with the /etc/group file. If the user is granted any groups based on the behavior of this
module, they are granted in addition to those entries /etc/group (or equivalent).
OPTIONS
This module does not recognise any options.
MODULE TYPES PROVIDED
Only the auth module type is provided.
RETURN VALUES
PAM_SUCCESS
group membership was granted.
PAM_ABORT
Not all relevant data could be gotten.
PAM_BUF_ERR
Memory buffer error.
PAM_CRED_ERR
Group membership was not granted.
PAM_IGNORE
pam_sm_authenticate was called which does nothing.
PAM_USER_UNKNOWN
The user is not known to the system.
FILES
/etc/security/group.conf
Default configuration file
SEE ALSO
group.conf(5), pam.d(5), pam(8).
AUTHORS
pam_group was written by Andrew G. Morgan <morgan@kernel.org>.
Linux-PAM Manual 09/19/2013 PAM_GROUP(8)