Sponsored Content
Full Discussion: access to .beroot for users
Operating Systems HP-UX access to .beroot for users Post 302502940 by sctxms on Wednesday 9th of March 2011 09:41:20 AM
Old 03-09-2011
I found it and i totaly missed it but I don't know how lol I added the user id to the sudoers for broot duh my bad but thank you for the bit suggestion I did check it as well
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Creating USERs with restricted Access

Hi There, i need to creat USERS in UNIX with restricted access to different directories. for example user1 should have access to dir1 and dir2 user2 should have access to dir2 and dir3 Please help me (4 Replies)
Discussion started by: ramanan25
4 Replies

2. AIX

Find all users with shell access

Hi, how do I find all users currently setup with shell access. Thanks in advance. Gav (1 Reply)
Discussion started by: LionFeen
1 Replies

3. UNIX for Advanced & Expert Users

Restrict access to specific users.

Hi All! I would like to know if there is any specific way by which I can restrict access to apecific users (ip addresses). OS : Red hat linux Thanks! nua7 (6 Replies)
Discussion started by: nua7
6 Replies

4. AIX

cloning users access with different user name

Hi! this would be my first time to post here in this forums, hope you can help me with my queries. i would like to create a different user name but have the same access rights. Example: root > rootbaby. thanks (5 Replies)
Discussion started by: HPL1706
5 Replies

5. Solaris

List users who have administrative access

Hi , Could you please give me the commands for the following. 1.list users who have direct access to solaris database at os-level 2.list users who have administrative access at os-level in solaris Please also let me know how to figure out these specific users i need from a... (6 Replies)
Discussion started by: James777
6 Replies

6. UNIX for Dummies Questions & Answers

Access another users files

Hi, I want to access another users files and directories.Is there any command to do in unix ??.I think CHOWN would work.May i know the exact command for it. Regards, (1 Reply)
Discussion started by: William1482
1 Replies

7. UNIX for Dummies Questions & Answers

kernel giving access for multiple users to access files

hi all, i want to know y kernel is giving access for multiple users to access a file when one user may be the owner is executing that file. Because other user can manipulate that file when the other user is executing that file, it will give the unexpected result to owner . plz help me... (1 Reply)
Discussion started by: jimmyuk
1 Replies

8. Shell Programming and Scripting

Access rights for users - list

Hi, I would like to retrieve a list of user ids on an AIX server along with the access rights that each id has? Can someone please help me on how this can be achieved? Gayathri (3 Replies)
Discussion started by: ggayathri
3 Replies

9. Solaris

samba read write access to owner and no access to other users

Hi All, I want to configure samba share permission so that only directory creator/owner has a read and write permission and other users should not have any read/write access to that folder.Will that be possible and how can this be achieved within samba configuration. Regards, Sahil (1 Reply)
Discussion started by: sahil_shine
1 Replies

10. Solaris

How to check sudo access of other users?

Hi, I always use "sudo -U user -l" as root and it gives me list of sudo access, that person have. But on one Solaris server, I can't run it. recently only I installed latest patchset on this server. Not sure, if that changed something on this. However, sudo package is showing old one. # id -a... (1 Reply)
Discussion started by: ron323232
1 Replies
LOGIN.ACCESS(5) 					      BSD File Formats Manual						   LOGIN.ACCESS(5)

NAME
login.access -- login access control table DESCRIPTION
The login.access file specifies on which ttys or from which hosts certain users are allowed to login. At login, the /etc/login.access file is checked for the first entry that matches a specific user/host or user/tty combination. That entry can either allow or deny login access to that user. Each entry have three fields separated by colon: o The first field indicates the permission given if the entry matches. It can be either ``+'' (allow access) or ``-'' (deny access) . o The second field is a comma separated list of users or groups for which the current entry applies. NIS netgroups can used (if configured) if preceeded by @. The magic string ALL matches all users. A group will match if the user is a member of that group, or it is the user's primary group. o The third field is a list of ttys, or network names. A network name can be either a hostname, a domain (indicated by a starting period), or a netgroup. As with the user list, ALL matches anything. LOCAL matches a string not containing a period. If the string EXCEPT is found in either the user or from list, the rest of the list are exceptions to the list before EXCEPT. BUGS
If there's a user and a group with the same name, there is no way to make the group match if the user also matches. SEE ALSO
login(1) AUTHORS
The login_access() function was written by Wietse Venema. This manual page was written for Heimdal. HEIMDAL
March 21, 2003 HEIMDAL
All times are GMT -4. The time now is 02:46 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy