01-19-2011
You can't feed stored plaintext passwords into any sane authentication system, it's designed to only accept them from an interactive interface. Not being able to configure your system limits your options quite sharply.
Is it possible to ssh into that user? Even if it's on the same machine. You don't need administrative privileges to set up passwordless ssh, since it supports
noninteractive key-based authentication. All you have to do is create the right files with the right contents in their respective ~/.ssh/ directories and it will go.
Password-less logins with OpenSSH
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
I have a script A.run which will call B.run.
How can i run B.run with a common id instead of using my login id?
I have tried as below, in Script A.run :
.........
echo "Running B.run......"
rsh -l commonid hostname B.run
.........
but it's give me "Permission Denied".......
... (3 Replies)
Discussion started by: wan
3 Replies
2. UNIX for Advanced & Expert Users
I want to start off by saying thanks to everyone here, you're answers and suggestions are always very helpful.
I have a shell script which is invoked when an email is received. This shell script extracts any attachments that are sent with this email, and then runs a script which submits these... (8 Replies)
Discussion started by: mskarica
8 Replies
3. Shell Programming and Scripting
Hi all,
I'm a newbie to the Linux world.
I have a script that needs to run under "UserB". But I don't want to give out the password to UserB. Is there a way to setup the script to run as "UserB" when UserA runs it.
Thanks in advance for your assistance. (1 Reply)
Discussion started by: mikey20
1 Replies
4. Shell Programming and Scripting
Hello Experts
I want to run script from another user in unix . Also the script
has been calling from SQL. HOST command helps to call the unix file
from sql . But my problem is the unix script has to be run by
another user.
I tried tht following
$ sudo su - user2 -c who... (4 Replies)
Discussion started by: Krishnaramjis
4 Replies
5. Shell Programming and Scripting
Good morning. I am searching for "how-to"'s for some particular questions:
1. How to write a script in HP-UX 11.
2. How to schedule a script.
3. How to "call" scripts from the original script.
4. How to su to another user from within a script.
This is the basics of what the... (15 Replies)
Discussion started by: instant000
15 Replies
6. AIX
Guy's
I have script to start the data base and this script need to be excited by Oracle user
Is there any command to be excited by root and to run this script Start_Oracal_DB.sh by Oracle user
Pls Advice …
Excessive formatting removed.
I have told you so on several occasions now and... (2 Replies)
Discussion started by: Mr.AIX
2 Replies
7. Shell Programming and Scripting
Dear all,
i am doing an SVN backup script. Almost done.
My problem is :
Script should run by user : svn
There is a chance to run the script by root itself.. so i coded like following
#This script path and name ... (2 Replies)
Discussion started by: linuxadmin
2 Replies
8. UNIX for Dummies Questions & Answers
Hi
I have a script that i would like to be run by a different user.
For example, I have a file called 'mytest.pl' created by user 'user4'
What command should i use to make sure that user 'ydanial' has ability to run 'mytest.pl' ?
Thanks (6 Replies)
Discussion started by: DallasT
6 Replies
9. Shell Programming and Scripting
I have a script ( the name is /tmp/script1) , the content is simple , just copy a file to another directory .
Now I would like every user will change to a specific user ( eg. userA ) before run this script so that the script will be run by userA , that mean I want only userA run this script , I... (2 Replies)
Discussion started by: ust3
2 Replies
10. Shell Programming and Scripting
Hi,
I want to deploy a (perl) script, in Linux. (Red Hat 7).
Is there a way to protect the script itself from being viewed by the user, but still allow the user to run the script?
I dont want the user to be able to see the source code of the script. (2 Replies)
Discussion started by: BG_JrAdmin
2 Replies
LEARN ABOUT ULTRIX
hosts.equiv
hosts.equiv(5) File Formats Manual hosts.equiv(5)
Name
hosts.equiv - list of trusted hosts
Description
The file resides in the directory and contains a list of trusted hosts. When an or request from a host listed in the file is made, and the
initiator of the request has an entry in further validity checking is not required. Thus, does not prompt for a password, and completes
successfully. When a remote user is in the local file, that user is defined as equivalenced to a local user with the same user ID.
The format of is a list of names, as in:
host1
-host2
+@group1
-@group2
A line consisting of a host name means that anyone logging in from that host is trusted. A line consisting of a host name preceded by -
means that anyone logging in from that host is not trusted. A line consisting of a single + means that all hosts are trusted. Placing a
line consisting of a single + in your file poses substantial security risks and is not recommended.
The +@ and -@ syntax are specific to Yellow Pages (YP). A line consisting of +@group means that all hosts in that network group (which is
served by YP) are trusted. A line consisting of -@group means that hosts in that network group (which is served by YP) are not trusted.
Programs scan the file sequentially and stop when they encounter the appropriate entry (either positive for host name and +@ entries, or
negative for -@ entries).
The file has the same format as the file. When a user executes or the file from that user's home directory is concatenated onto the file
for permission checking. The host names listed in the and files may optionally contain the local BIND domain name. For more information
on BIND, see the Guide to the BIND/Hesiod Service. If a user is excluded by a minus entry from but included in that user is considered
trusted. In the special case when the user is root, only the file is checked.
It is possible to have two entries on a single line. Separate the entires with a space. If the remote host is equivalenced by the first
entry, the user named by the second entry is allowed to specify any name to the option (provided that name is in the file). For example:
suez john
This entry allows John to log in from suez. The normal use would be to put this entry in the file in the home directory for bill. Then,
John can log in as bill when coming from suez without having to supply a password. The second entry can be a netgroup. For example:
+@group1 +@group2
This entry allows any user in group2 coming from a host in group1 to log in as anyone.
Files
/var/yp/domain/netgroup
/var/yp/domain/netgroup.byuser
/var/yp/domain/netgroup.byhost
See Also
rlogin(1c), rsh(1c), netgroup(5yp)
Guide to the BIND/Hesiod Service
Guide to the Yellow Pages Service
hosts.equiv(5)