Hi Linux gurus,
My boss had asked me to setup a box consisting of this 3 OS (CentOS, Fedora, RedHat) for autopatching. So, whenever there is new patches for CentOS from the internet, this box will grab it, implement it, if tested ok and approved, the patches will then be push to Production... (23 Replies)
Does anyone know if you can use a virtual box image on different O/S's and be able to move it from one server to another of different O/S if needed? (1 Reply)
I am trying to create a new virtual machine (Red Hat) but I am getting the following error
I am completely new to VB and I am probably missing something.
Any help will be greatly appreciated. (4 Replies)
Hi all,
I'm in a pretty messed-up situation, hope you can give me a hand.
I deleted by accident a folder containing a VMware server virtual machine, that contains most critical information. The host OS is CentOS 5.5, which I believe by default uses Ext3.
I shut down the PC intermediately... (2 Replies)
hi
Am Using Windows vista machine where i installed Sun Virtual Box on Which i installled Solaris 10.. am not able to ping my windows machine from Sun OS neither viceversa.. Can someone help me out to get this sorted please .... (2 Replies)
Hello,
Can someone suggest me what I missing, I re-sized a root virtual disk to 30GB on the CentOS VM. After re-sizing the disk, I booted the OS and ran fdisk -list command I was able view the size of the disk as 30GB.
Paritions in the vm before I resize are:
/boot - Primary parition
/... (1 Reply)
Trying to set or modify the randomly set hostID of a Solaris 10 virtual/guest machine that I installed on a Windows-XP host machine (using Virtual Box 4.1.12).
I was able to set/modify the hostname of the Solaris 10 virtual/guest machine during installation as well as via the Virtual Box... (4 Replies)
Hello,
I have two virtual machines ubuntu on virtual box vm1 and vm2 , i'd like to use ssh to connect from vm1 to vm2, please what's the configuration should do?
Thank you (1 Reply)
HI,
I have a Centos linux box and there is interface connect to internet.
I stop the iptables in this box .
After a few day , I find the linux box have been hacked and install some perl script into the box .
Could anyone tell me how the hacker can login into the centos box without knowing... (1 Reply)
Discussion started by: chuikingman
1 Replies
LEARN ABOUT CENTOS
cimauth
cimauth(8)cimauth(8)NAME
cimauth - add, modify, remove, or list CIM namespace authorizations of users
SYNOPSIS
cimauth -a -u username -n namespace [ -R ] [ -W ]
cimauth -m -u username -n namespace [ -R ] [ -W ]
cimauth -r -u username [ -n namespace ]
cimauth -l
cimauth -h
cimauth --help
cimauth --version
DESCRIPTION
The cimauth command manages read and write CIM namespace authorizations of users. The operations are executed on the local host by submit-
ting requests to the CIM Server. If the value of the configuration property enableNamespaceAuthorization is True , the CIM Server
restricts access to namespaces based on user authorizations configured via cimauth . Changes to "Dynamic" authorization parameters does
not require the CIM Server to be restarted. "Non Dynamic" configuration properties (E.g. enableNamespaceAuthorization ) can only be set as
planned configuration and the CIM Server needs to be restarted to realize the change. (See cimconfig (8) for information on configuring
the CIM Server.)
Options
The cimauth command recognizes the following options:
-a Adds read and/or write authorizations to the specified user on the specified namespace. If neither the -R nor the -W
option is specified, adds a read authorization by default.
-h, --help Display command usage information.
-l Lists all the authorizations configured in the CIM Server.
-m Modifies authorizations of the specified user on the specified namespace. If neither the -R nor the -W option is
specified, modifies the authorization to be a read authorization by default.
-n namespace Specifies the R namespace for the operation.
-r Removes authorizations of the specified user on the specified namespace. If no namespaces are specified, removes
authorizations on all namespaces for the specified user.
-R Specifies read authorization on the namespace.
-u username Specifies the user for the operation. The specified R username must represent a valid user on the local host.
--version Display CIM Server version number.
-W Specifies write authorization on the namespace.
EXIT STATUS
When an error occurs, an error message is written to stderr and an error value of 1 is returned. The following return values are returned:
0 Successful completion
1 Error
USAGE NOTE
The cimauth command requires that the CIM Server is running.
EXAMPLES
Add read authorizations to user "guest" on namespace "root/cimv2".
cimauth -a -u guest -n root/cimv2 -R
Add read and write authorizations to user "guest" on namespace "root/system".
cimauth -a -u guest -n root/system -R -W
Modify authorizations of the user "guest" on namespace "root/system" to read only.
cimauth -m -u guest -n root/system -R
Remove the authorizations of the user "guest" on namespace "root/system".
cimauth -r -u guest -n root/system
List all the authorizations configured in the CIM Server.
cimauth -l
SEE ALSO cimserver(8), cimconfig(8).
cimauth(8)