03-21-2011
10 More Discussions You Might Find Interesting
1. Solaris
not sure what the problem is, when I go to /home and enter command mkdir i get this error
mkdir chris
mkdir: Failed to make directory "chris"; Operation not applicable
im root.... (3 Replies)
Discussion started by: csaunders
3 Replies
2. UNIX for Advanced & Expert Users
I want to know what i can set up so that root user can read everything. On my Solaris systems root can read the following directory.
drwxrwx--- 408 icsrc icarc0 36864 Aug 21 07:24 dev
drwxrwsr-x 7 icsrc icarc0 4096 Aug 4 1998 test
But on my linux systems it gets:
# cd dev
bash: cd:... (4 Replies)
Discussion started by: frankkahle
4 Replies
3. Shell Programming and Scripting
Hi all, i hope i got this in the right place, what i am trying to do is make a program only run by root, ie
for instance user fred is logged in and uses firefox, what id like to do is change that so that when fred wants to use firefox he will be asked to enter root password before he is allowed to... (14 Replies)
Discussion started by: dave123
14 Replies
4. AIX
I use AIX 5.2 I want to allow a non-root user to do a system backup with 'mksysb' command.
I try to add 'ManageBackup' Role to that non-root user but it have an error "ksh: mksysb: 0403-006 Execute permission denied."
What should I do? (8 Replies)
Discussion started by: AIX122
8 Replies
5. UNIX for Dummies Questions & Answers
Hello every body,
I need to make a constant variable to the root such as #PS1="I am Amer" and so on.
I know if i am a user,I can make it fixed from #vi .profile
HOW to make it fixed for the root?
Thanks in advance
BR
Ahmed Amer
Cairo,Egypt (7 Replies)
Discussion started by: ahmedamer12
7 Replies
6. UNIX for Advanced & Expert Users
Hello,
As a purely learning purpose I am trying to make another set of partitions along my existing Ubuntu11.10 box. The reason to do this partition is to try a new Linux system by myself following "Linux From Scratch" (LFS). Because the instruction of LFS seems for very advanced user (I am... (3 Replies)
Discussion started by: yifangt
3 Replies
7. Cybersecurity
I stumbled upon this thread and one aspect of it got me thinking. As i am building a small Linux network right now for a friend i would like to hear your opinion on this.
I'd like to respectfully disagree. I think the Linux habit of disabling root login per default is wrong (not entirely... (6 Replies)
Discussion started by: bakunin
6 Replies
8. Shell Programming and Scripting
Hi All,
I have a situation to parse a file with following limitations:
2) The XML is not proper as it has no fix root tag rather have multiple XML in a single XML. or you can say multiple root elements.
This file will be huge in size. So before i think of some good solution to parse it, i... (1 Reply)
Discussion started by: peekuabc
1 Replies
9. UNIX for Advanced & Expert Users
I have a series of configuration files to deliver to multiple unix environments (dev, test, bench, prod etc). However I don't to modify them for each environment.
The files are text which currently contain this type of directory information
IN=/DVT/ms/sas/reception/PIL_QPA_SID/GSPIN001... (5 Replies)
Discussion started by: clarcombe
5 Replies
10. Shell Programming and Scripting
Hi,
i have two servers say server A and server B. i have a sudo user say user1 with full privilges on server A and B. i am trying to append the crontab entry of root from server A of server B with the following command. But its appending on A. i need to append it on server B.
please find the... (4 Replies)
Discussion started by: venkitesh
4 Replies
LEARN ABOUT HPUX
cmdprivadm
cmdprivadm(1M) cmdprivadm(1M)
NAME
cmdprivadm - noninteractive editing of a command's authorization and privilege information in the privrun database
SYNOPSIS
DESCRIPTION
is a noninteractive command that allows user with appropriate permission to add or delete a command and its privileges in the Role-Base
Access Control (RBAC) database, See privrun(1M) for more details on this file.
When adding a line to the database, sets fields that are not specified a default value. When deleting a line, the lines matching all the
given pairs will be deleted. That is, if all fields specified match, the entry will be deleted.
Appends a line as specified in pairs in the file.
Deletes a line as specified in pairs from file.
HP recommends that only the and commands be used to edit and view the RBAC databases; do not edit the RBAC files directly.
See rbac(5) for information on the RBAC databases.
Options
The following options are valid pairs for
command should include the full path name of the command. There can be one or more arguments following the command.
filename should specify the full path name of a file name.
Specifies the operation.
Specifies the object.
Specifies the real user ID
(ruid).
Specifies the effective user ID
(euid).
Specifies the real group ID
(rgid).
Specifies the effective group ID
(egid).
Specifies the compartment.
Specifies the privileges.
Specifies the PAM service name to reauthenticate under.
See pam.conf(4) for a list of PAM services.
Specifies the flags.
Note: You must enclose values that contain the space character, or any characters that may be interpreted by the shell, with single quotes.
For example, if the has one or more arguments, enclose them with single quotes:
Authorizations:
In order to invoke the user must either be root, (running with effective UID of 0), or have the appropriate authorizations. The following
is a list of the required authorizations for running with particular options:
Allows user to run
with options.
Allows user to run
with options.
EXTERNAL INFLUENCES
Environment Variables
determines the language in which messages are displayed.
International Code Set Support
Single-byte character code set is supported.
RETURN VALUE
Upon completion, returns one of the following values:
Success.
Failure.
An appropriate error message is printed on standard error.
EXAMPLES
The following commands add entries into the file:
The following commands delete entries from the file:
FILES
Database containing valid definitions of all roles.
Database containing definitions of all valid authorizations.
Database specifying the roles allowed for each specified user.
Database defining the authorizations for each specified role.
Database containing the authorization to execute specified commands,
and the privileges to alter UID and GID for command execution.
SEE ALSO
authadm(1M), privrun(1M), rbacdbchk(1M), roleadm(1M), rbac(5).
cmdprivadm(1M)