Sponsored Content
Operating Systems Linux Debian Assign administrative rigth to user for CUPS service Post 302464065 by jim mcnamara on Tuesday 19th of October 2010 07:47:47 AM
Old 10-19-2010
There are several ways one is:

Allow your user to sudo lpstat, lpadmin and other commands. You visudo the /etc/sudoers
file to specify who is allowed to run what as root, or any other user. See your man page for sudo.
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

User defined service

I want to add a new IP service which executes a script on SCO OS5. I have amended /etc/services and added to port number (3333) I have amended /etc/inetd.conf and added a line for this service but I can't get it to execute my own shell script When I telnet to the IP address on port 3333 I... (1 Reply)
Discussion started by: markdrury
1 Replies

2. Solaris

nfs administrative tasks

I have been reading and implementing the tasks of nfs admin on the sun docs website but my nfs is still not working. Seems like the instructions on website just end all of a sudden without completing the instructions. Anycase, this is what i have checked/did. We had nfs filesystem before our... (1 Reply)
Discussion started by: lombard_c
1 Replies

3. AIX

administrative user

Hi, I have administrative groups: group1, group2, group3. If a regular user have one of these group. Does it mean he is an administrator like root? What's the priveleges of administrative groups? Thanks in advance, itik (0 Replies)
Discussion started by: itik
0 Replies

4. Solaris

List users who have administrative access

Hi , Could you please give me the commands for the following. 1.list users who have direct access to solaris database at os-level 2.list users who have administrative access at os-level in solaris Please also let me know how to figure out these specific users i need from a... (6 Replies)
Discussion started by: James777
6 Replies

5. Solaris

what privilege to assign for user to cancel or disable print queue?

OS Version: Sun Solaris version 9 Other than root, we need operation to manage printer queue by using following command: lprm -P cancel enable/disable What privilege should be given? Pls advise. Thank you. (4 Replies)
Discussion started by: KhawHL
4 Replies

6. Solaris

how to assign group policy to user in solaris

hi, how to assign group policy to user in solaris (1 Reply)
Discussion started by: meet2muneer
1 Replies

7. Solaris

Assign crontab for user

hi, how can i assign a crontab to my username "user1", here is my current list details; $ who root console Nov 15 14:38 user1 pts/1 Dec 14 21:07 (192.168.1.75) $ pwd /etc/cron.d $ ls -alh total 20 drwxr-xr-x 2 root sys 512 Nov 15 14:37 .... (3 Replies)
Discussion started by: fspalero
3 Replies

8. Solaris

Assign Superuser rights to normal user

Hi, It's actually strange, but Is there any way through which I can assign super user rights to normal user. Actually su/sudo/rbac does solve these but switching id is the problem for an application. For eg: $dladm show-dev insufficient priviliges. Is there any way to get it done ? ... (8 Replies)
Discussion started by: tuxian
8 Replies

9. Shell Programming and Scripting

Assign user input to already declared array

What I am doing is creating a top menu, which a user will select a choice with a number entry. That number corresponds to a string in an array. I then want to assign that response to another array I've already declared. For example: #!/bin/bash colors=(red blue yellow) red=(cherry fire)... (2 Replies)
Discussion started by: Akilleez
2 Replies
visudo(8)						       MAINTENANCE COMMANDS							 visudo(8)

NAME
visudo - edit the sudoers file SYNOPSIS
visudo [ -c ] [ -f sudoers ] [ -q ] [ -s ] [ -V ] DESCRIPTION
visudo edits the sudoers file in a safe fashion, analogous to vipw(8). visudo locks the sudoers file against multiple simultaneous edits, provides basic sanity checks, and checks for parse errors. If the sudoers file is currently being edited you will receive a message to try again later. There is a hard-coded list of editors that visudo will use set at compile-time that may be overridden via the editor sudoers Default vari- able. This list defaults to the path to vi(1) on your system, as determined by the configure script. Normally, visudo does not honor the EDITOR or VISUAL environment variables unless they contain an editor in the aforementioned editors list. However, if visudo is configured with the --with-enveditor flag or the enveditor Default variable is set in sudoers, visudo will use any the editor defines by EDITOR or VISUAL. Note that this can be a security hole since it allows the user to execute any program they wish simply by setting EDITOR or VIS- UAL. visudo parses the sudoers file after the edit and will not save the changes if there is a syntax error. Upon finding an error, visudo will print a message stating the line number(s) where the error occurred and the user will receive the "What now?" prompt. At this point the user may enter "e" to re-edit the sudoers file, "x" to exit without saving the changes, or "Q" to quit and save changes. The "Q" option should be used with extreme care because if visudo believes there to be a parse error, so will sudo and no one will be able to sudo again until the error is fixed. If "e" is typed to edit the sudoers file after a parse error has been detected, the cursor will be placed on the line where the error occurred (if the editor supports this feature). OPTIONS
visudo accepts the following command line options: -c Enable check-only mode. The existing sudoers file will be checked for syntax and a message will be printed to the standard output detailing the status of sudoers. If the syntax check completes successfully, visudo will exit with a value of 0. If a syntax error is encountered, visudo will exit with a value of 1. -f Specify and alternate sudoers file location. With this option visudo will edit (or check) the sudoers file of your choice, instead of the default, @sysconfdir@/sudoers. The lock file used is the specified sudoers file with ".tmp" appended to it. -q Enable quiet mode. In this mode details about syntax errors are not printed. This option is only useful when combined with the -c flag. -s Enable strict checking of the sudoers file. If an alias is used before it is defined, visudo will consider this a parse error. Note that it is not possible to differentiate between an alias and a hostname or username that consists solely of uppercase letters, digits, and the underscore ('_') character. -V The -V (version) option causes visudo to print its version number and exit. ERRORS
sudoers file busy, try again later. Someone else is currently editing the sudoers file. /etc/sudoers.tmp: Permission denied You didn't run visudo as root. Can't find you in the passwd database Your userid does not appear in the system passwd file. Warning: undeclared Alias referenced near ... Either you are using a {User,Runas,Host,Cmnd}_Alias before defining it or you have a user or hostname listed that consists solely of uppercase letters, digits, and the underscore ('_') character. If the latter, you can ignore the warnings (sudo will not complain). In -s (strict) mode these are errors, not warnings. ENVIRONMENT
The following environment variables are used only if visudo was configured with the --with-env-editor option: EDITOR Invoked by visudo as the editor to use VISUAL Used Invoked visudo if EDITOR is not set FILES
/etc/sudoers List of who can run what /etc/sudoers.tmp Lock file for visudo AUTHOR
Many people have worked on sudo over the years; this version of visudo was written by: Todd Miller <Todd.Miller@courtesan.com> See the HISTORY file in the sudo distribution or visit http://www.sudo.ws/sudo/history.html for more details. BUGS
If you feel you have found a bug in sudo, please submit a bug report at http://www.sudo.ws/sudo/bugs/ DISCLAIMER
Visudo is provided ``AS IS'' and any express or implied warranties, including, but not limited to, the implied warranties of merchantabil- ity and fitness for a particular purpose are disclaimed. See the LICENSE file distributed with sudo for complete details. CAVEATS
There is no easy way to prevent a user from gaining a root shell if the editor used by visudo allows shell escapes. SEE ALSO
vi(1), sudo(8), vipw(8). 3rd Berkeley Distribution 1.6.6 visudo(8)
All times are GMT -4. The time now is 03:52 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy