Sponsored Content
Top Forums UNIX for Dummies Questions & Answers I need to make a constant variables to the root Post 302516649 by ahmedamer12 on Sunday 24th of April 2011 03:56:05 PM
Old 04-24-2011
-I created it in this path #pwd >>>> / (i.e in the root main page,I don`t knw what to call it but i hope u got what i wanted to say)

-The shell logins with "sh"
 

7 More Discussions You Might Find Interesting

1. Solaris

cant make dir as root

not sure what the problem is, when I go to /home and enter command mkdir i get this error mkdir chris mkdir: Failed to make directory "chris"; Operation not applicable im root.... (3 Replies)
Discussion started by: csaunders
3 Replies

2. UNIX for Advanced & Expert Users

how to make root user read all

I want to know what i can set up so that root user can read everything. On my Solaris systems root can read the following directory. drwxrwx--- 408 icsrc icarc0 36864 Aug 21 07:24 dev drwxrwsr-x 7 icsrc icarc0 4096 Aug 4 1998 test But on my linux systems it gets: # cd dev bash: cd:... (4 Replies)
Discussion started by: frankkahle
4 Replies

3. Shell Programming and Scripting

Make program only run by root

Hi all, i hope i got this in the right place, what i am trying to do is make a program only run by root, ie for instance user fred is logged in and uses firefox, what id like to do is change that so that when fred wants to use firefox he will be asked to enter root password before he is allowed to... (14 Replies)
Discussion started by: dave123
14 Replies

4. UNIX for Dummies Questions & Answers

MAKE and its macros and variables

I want to build a Makefile that simply takes a template file and modifies it (sed or perl, probably) before installing the result in the right place - my problem is creating the variable for substitution... So I have SYSTEM = SYS1 SYS2 SYS1_CHANNELS = CHANNEL1 CHANNEL2 CHANNEL4... (1 Reply)
Discussion started by: JerryHone
1 Replies

5. AIX

make a mksysb without root credentials

dears, good day. i need to be able to take a mksysb for a machine running aix 6.1.5 without the root credentials and also without using sudo any advice ? (2 Replies)
Discussion started by: islam.said
2 Replies

6. Cybersecurity

Root login in Linux - does it make sense?

I stumbled upon this thread and one aspect of it got me thinking. As i am building a small Linux network right now for a friend i would like to hear your opinion on this. I'd like to respectfully disagree. I think the Linux habit of disabling root login per default is wrong (not entirely... (6 Replies)
Discussion started by: bakunin
6 Replies

7. UNIX for Advanced & Expert Users

Make a subdirectory the root directory

I have a series of configuration files to deliver to multiple unix environments (dev, test, bench, prod etc). However I don't to modify them for each environment. The files are text which currently contain this type of directory information IN=/DVT/ms/sas/reception/PIL_QPA_SID/GSPIN001... (5 Replies)
Discussion started by: clarcombe
5 Replies
edauth(8)						      System Manager's Manual							 edauth(8)

NAME
edauth - update and list authentication and capabilities (authcap) database information (Enhanced Security) SYNOPSIS
/usr/tcb/bin/edauth [-d db] [-L|-N] [-q] [-v] entryname ... /usr/tcb/bin/edauth -g [-d db] [-L|-N] [-q] [-v] [entryname...] /usr/tcb/bin/edauth -s [-d db] [-L|-N] [-R] [-U uid] [-C] [-q] [-v] /usr/tcb/bin/edauth -r [-d db] [-L|-N] [-q] [-v] entryname... /usr/tcb/bin/edauth -H FLAGS
-d db Specifies which database to use. Select from one of the characters d, f, p, t, or v. d - The system default database, /etc/auth/system/default f - The file control database, /etc/auth/system/files p - User profile data in the /tcb/files/auth.db, /var/tcb/files/auth.db, and optional associated NIS map sources. t - The terminal control database, /etc/auth/system/ttys.db v - The terminal control database, /etc/auth/system/devassign The user profile database (p) is the default if no -d option is given. -g Gets the named entries (or all) and prints them to standard output rather than editing them. If the -q option is also given, the entries are not printed, and the exit status is the only confirmation of whether at least one entry would have been printed if -q had not been specified. -r Removes (deletes) named entries rather than editing them. -s Sets new values based on pre-edited entries read from standard input. If a new entry is being created, the corresponding passwd entry must be created first. If the -C option is not given, existing entries are overwritten by the new data. -v Gives more verbose messages. -C Restricts the -s option to creating new entries only, rather than possibly overwriting existing ones. -L Uses only local entries, not NIS. -N Uses only NIS entries, not local. -R Causes new local user-profile entries to be written to the root partition only, no matter what the UID of the profile. -U uid Specifies the minimum general user UID. User-profile entries with UIDs less than this value (default of 100) are written to the root partition in the /tcb/files/auth.db file. Profiles with uids greater than or equal to the specified value are written to the /var/tcb/files/auth.db file. -H Print a help message and exit successfully with no further processing. DESCRIPTION
The edauth utility displays and modifies the system databases used by the enhanced security subsets. These include the user profile data- bases and their NIS map source files, the file control database, the terminal control and device assignment databases, and the system default database. Note that edauth does not alter /etc/passwd. The edauth utility is intended for disaster-recovery situations, since the GUIs provide a much friendlier interface. However, for sites where X is not available, edauth can be used for general maintenance of these databases. If none of the -s, -g, or -r options are given, edauth extracts each matching entry into a temporary file, and allows the user to edit that entry. If the edited entry has more unparsed fields than did the old copy, a warning is given. If the -v option was given, the unparsed text is displayed. Editing and setting of entries in NIS maps is only allowed on the NIS master host, in which case the changes are made to the NIS map source files themselves, and a make of the NIS maps is then performed by edauth. The only option available to a non-root user is displaying the publicly-accessible databases or the user's own profile. EXAMPLES
To display just the wildcard entries from the ttys and devassign databases: # edauth -g -dt '*' '*:*' # edauth -g -dv '*' '*:*' To display the system defaults data: # edauth -g -dd For a non-root user to display his or her own profile: % edauth -g For a privileged user to display all user profiles: # edauth -g To display the user profile for root: # edauth -g root To edit the entry for user root: # edauth root To edit the ttys database entry for lat/628: # edauth -dt lat/628 To edit the NIS profile entry for user nobody: # edauth -N nobody To add a template of cis401 to a list of user names contained in a file named students: edauth -g `cat students` | sed 's/:chkent:/:u_template=cis401:chkent:/' | edauth -s ENVIRONMENT
The following environment variables can be used by edauth: TERM Checked for being set only, in order to determine whether the $VISUAL environment variable should be consulted to find an editor to use. The $TERM variable is also likely to be used by the editor that is spawned. VISUAL Checked to find the editor to use when editing data, if the $TERM environment variable is set. EDITOR Checked to find the editor to use when editing data. If neither the $VISUAL nor the $EDITOR environment variable is available, edauth checks /usr/bin/ex and /sbin/ed for execute permissions and stops attempts to edit data if none can be found. Other environment variables which are likely to be used: NOPUSH This environment variable is checked by the /var/yp/Makefile file when updating the NIS maps in order to determine whether to force the NIS slave servers to update their maps immediately (and to wait for that update). RELATED INFORMATION
Commands: convuser(8), convauth(8), authck(8) Files: authcap(4), prpasswd(4), ttys(4), default(4), devassign(4), files(4) Security delim off edauth(8)
All times are GMT -4. The time now is 09:33 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy