Sponsored Content
Top Forums UNIX for Advanced & Expert Users Unix user with root power problem in to login in putty Post 302534083 by omonoiatis9 on Monday 27th of June 2011 01:21:24 AM
Old 06-27-2011
i want to have other users with root authority other than root itself.
when i was creating these users i search around and i find out that the only way to do that is to give to these users the same uid as that of root user.
if this is the normal behaviour of a unix system then what do you suggest to do?
a) change uid and create root users in a different way?
b) or there is something i can do in order to change this behaviour?
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

No user able to login except root(superuser)

Hi All, Oracle 8.0 database is running on SCO-UNIXWARE 7.0 Operating system. Some how ORACLLE DATABASE has crashed. After rebooting the PC only the SUPER USER could login. No other user is able to login. we need ORACLE user to start the DATABASE again. It is asking for the password, after... (2 Replies)
Discussion started by: konda
2 Replies

2. HP-UX

CDE login Problem for root user only

Hi All, I m facing a problem that, i m not able to login as root user on cde on hp-ux 11.00, i can login as root on commond line as well as telnet. Thanks in Advance for help. Regards, Awadhesh (1 Reply)
Discussion started by: Awadhesh
1 Replies

3. Linux

resticting user to login using putty on port 21(ftp)

Hi, I am having small query and wheather it is possible ? that user can transfer the files using ftp client examples (filezilla) , but he can not use putty to login using ftp and run the commands, Regards, Manoj (2 Replies)
Discussion started by: manoj.solaris
2 Replies

4. Solaris

Am not able to login as a root User with telnet

Hi to All, I have configured telnet service in my server but am not able to login with root user in Linux Servers. For that what can i do ? Please help me Thanks in Advance. (1 Reply)
Discussion started by: Sharath Kumar
1 Replies

5. Solaris

Unable to login as a User or Root on one client

I am running 5.10 Generic_120011-14 Sunblade 1500 I have one client that was working fine in a training environment. Then this week the user is unable to login as the user that is created by default. The students do not have access to root to change system files or user accounts. This is... (11 Replies)
Discussion started by: deaconf19
11 Replies

6. Debian

password less login to root from a user account

hello friends, one user is created named "user1" I login as "user1" . Now when i do "su -" to be root user I have to give password for root . Is there any way through which we can skip giving the password to root. i.e. user1@work:~$ su - Password: xxxxxx work:~$ I don't want that... (1 Reply)
Discussion started by: pradeepreddy
1 Replies

7. UNIX for Dummies Questions & Answers

Can not login with root user

Hi folks. our developer had a root user and he changed some settings about root user. We have not known what he changed. There is an oracle user, we can login to oracle, no problem. But when we try to login to root user we are getting this error : $ su root Password: bash:... (9 Replies)
Discussion started by: futi
9 Replies

8. Shell Programming and Scripting

login as root user

hello all, if we haven't set a password to root user, how can we login as root user in konsole by using su? is it necessary to set password for root to login as root user?how can we set password to root user? (6 Replies)
Discussion started by: aarathy
6 Replies

9. Shell Programming and Scripting

How to Login as another user through Shell script from current user[Not Root]

Hi Every body, I would need a shell script program to login as different user and perform some copy commands in the script. example: Supppose ora_toms is the active user ora_toms should be able to run a script where user: ftptomsp pass: XXX should login through and run the commands ... (9 Replies)
Discussion started by: ujjwal27
9 Replies

10. UNIX for Advanced & Expert Users

Only root could login Redhat and could not su other user

Anyone has met the error following:- 1. Only root could login Redhat 2. Trying su another user by root, the error will be su: warning: cannot change directory to /home/user: permission denied su: /bin/bash: permission denied 3. I have checked the permission of the folder given and even... (2 Replies)
Discussion started by: jc0616
2 Replies
gsscred(1M)						  System Administration Commands					       gsscred(1M)

NAME
gsscred - add, remove and list gsscred table entries SYNOPSIS
gsscred [ -n user [-o oid] [-u uid]] [-c comment] -m mech -a gsscred [ -n user [-o oid]] [-u uid] [-m mech] -r gsscred [ -n user [-o oid]] [-u uid] [-m mech] -l DESCRIPTION
The gsscred utility is used to create and maintain a mapping between a security principal name and a local UNIX uid. The format of the user name is assumed to be GSS_C_NT_USER_NAME. You can use the -o option to specify the object identifier of the name type. The OID must be specified in dot-separated notation, for example: 1.2.3.45464.3.1 The gsscred table is used on server machines to lookup the uid of incoming clients connected using RPCSEC_GSS. When adding users, if no user name is specified, an entry is created in the table for each user from the passwd table. If no comment is specified, the gsscred utility inserts a comment that specifies the user name as an ASCII string and the GSS-APIsecurity mechanism that applies to it. The security mechanism will be in string representation as defined in the /etc/gss/mech file. The parameters are interpreted the same way by the gsscred utility to delete users as they are to create users. At least one of the follow- ing options must be specified: -n, -u, or -m. If no security mechanism is specified, then all entries will be deleted for the user identi- fied by either the uid or user name. If only the security mechanism is specified, then all user entries for that security mechanism will be deleted. Again, the parameters are interpreted the same way by the gsscred utility to search for users as they are to create users. If no options are specified, then the entire table is returned. If the user name or uid is specified, then all entries for that user are returned. If a security mechanism is specified, then all user entries for that security mechanism are returned. OPTIONS
-a Add a table entry. -c comment Insert comment about this table entry. -l Search table for entry. -m mech Specify the mechanism for which this name is to be translated. -n user Specify the optional principal name. -o oid Specify the OID indicating the name type of the user. -r Remove the entry from the table. -u uid Specify the uid for the user if the user is not local. EXAMPLES
Example 1: Creating a gsscred Table for the Kerberos v5 Security Mechanism The following shows how to create a gsscred table for the kerberos v5 security mechanism. gsscred obtains user names and uid's from the passwd table to populate the table. example% gsscred -m kerberos_v5 -a Example 2: Adding an Entry for root/host1 for the Kerberos v5 Security Mechanism The following shows how to add an entry for root/host1 with a specified uid of 0 for the kerberos v5 security mechanism. example% gsscred -m kerberos_v5 -n root/host1 -u 0 -a Example 3: Listing All User Mappings for the Kerberos v5 Security Mechanism The following lists all user mappings for the kerberos v5 security mechanism. example% gsscred -m kerberos_v5 -l Example 4: Listing All Mappings for All Security Mechanism for a Specified User The following lists all mappings for all security mechanisms for the user bsimpson. example% gsscred -n bsimpson -l EXIT STATUS
The following exit values are returned: 0 Successful completion. >0 An error occurred. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWgss | +-----------------------------+-----------------------------+ |Interface Stability |Evolving | +-----------------------------+-----------------------------+ SEE ALSO
gssd(1m), See gsscred.conf(4), attributes(5) NOTES
Some GSS mechanisms, such as kerberos_v5, provide their own authenticated-name-to-local-name (uid) mapping and thus do not usually have to be mapped using gsscred. See gsscred.conf(4) for more information. SunOS 5.10 11 Feb 2004 gsscred(1M)
All times are GMT -4. The time now is 04:42 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy