Sponsored Content
Operating Systems Solaris snmp trap for passwd file deltas in solaris Post 302548435 by prince2010 on Thursday 18th of August 2011 11:22:01 AM
Old 08-18-2011
snmp trap for passwd file deltas in solaris

Hello

I am trying to monitor when a user account gets added to my solaris server.

Does anyone know how I can set up an snmptrap for changes in the /etc/passwd file ?
 

10 More Discussions You Might Find Interesting

1. IP Networking

snmp trap generator

Hi, I am writing a program in java to simulate a trap being sent from a device. I came to know that rawsocket cant be opened in java. Is there a provision to do in java? My requirement is: I am writing the java program in the machine 1.1.1.1 I want to simulate the trap being sent from a... (0 Replies)
Discussion started by: kkrish7
0 Replies

2. Solaris

Creating SNMP Strings To Trap ALOM Console Messages

Greetings To All! I am trying to accomplish the following: Using a public SNMP string, create a trap which will trap ALOM console messages on a Solaris Sunfire T-1000 ALOM console. The platform is Solaris 10. These newly created traps need to be configured in such a way that they will send... (0 Replies)
Discussion started by: RobSand
0 Replies

3. IP Networking

Send A Snmp Trap

Hi, do you know the syntax to send a snmp trap to a server ? Many htanks. (2 Replies)
Discussion started by: big123456
2 Replies

4. Shell Programming and Scripting

Cntl+z Trap is not detecting ??? Help required to add a trap detection ???

Hi folks, I have tried to add some trap detection in the below script....this script is used to monitor database activities...in a rather awkward way :rolleyes:.... The idea behind adding trap is that....this script creates lots of temporary files in the running folder to store the count... (1 Reply)
Discussion started by: frozensmilz
1 Replies

5. Infrastructure Monitoring

linux snmp trap relay

Hi all, I'm after a linux utility that can relay all incoming traffic on a certain port to another server. Can anyone recommend a good program? I've taken a look at snmptrapd, but it's not obvious how this can be configured for my requirements. Many thanks. (1 Reply)
Discussion started by: badoshi
1 Replies

6. Infrastructure Monitoring

Allow specific hosts for snmp trap

I want to receive snmp traps only from specifis ip's or host. I tried to get help from VACM , but it's complicated. Can any one please suggest me simple way to do it (0 Replies)
Discussion started by: nrbhole
0 Replies

7. Infrastructure Monitoring

SNMP Trap on Solaris...HELP!

Hi all, I am currently doing a project regarding traps and would like to help me in this issue. I am knew to the trap world :confused::) and thought that by posting this thread helps me move forward in this project. First of all I will begin exactly from the very beginning, i.e. the net-snmp... (0 Replies)
Discussion started by: Wizard_1979
0 Replies

8. UNIX for Dummies Questions & Answers

Need to transfer all kernel logs (var/log/messages) to the snmp listener as snmp trap

i am working with embedded system -Dell DCS management sub system. my question is as below: currently we are using linux kernel 2.6.30 build and we have a kernel logs stored to the /var/log/messages path. now we have to transfer all this logs to the specified SNMP target as a part of SNMP... (4 Replies)
Discussion started by: vipul_prajapati
4 Replies

9. UNIX for Advanced & Expert Users

Snmp trap command for Solaris 5.10

I am using the following command to successfully send snmp traps on Linux but I cant get it to work on Solaris , can someone give me the syntax plz? Linux: /usr/sbin/snmptrap -v 2c -c org 10.100.10.211 \'\' 1.3.6.1.4.1.791.2.9.2 1.3.6.1.4.1.791.2.9.2 s \"$1 \" Solaris:... (5 Replies)
Discussion started by: aliyesami
5 Replies

10. Red Hat

Snmp [xx] Got trap from peer in Red Hat Linux

hi I get below error from console and message log in red hat linux snmp Got trap from peer on fd 13 . Any idea why there is error and how to fix it ?? Please use CODE tags as required by forum rules! (0 Replies)
Discussion started by: chuikingman
0 Replies
krb5_auth_rules(5)					Standards, Environments, and Macros					krb5_auth_rules(5)

NAME
krb5_auth_rules - Overview of Kerberos V5 authorization DESCRIPTION
When a user uses kerberized versions of the ftp, rdist, rcp, rlogin, rsh, or telnet clients to connect to a server, even if the user's claimed Kerberos V5 identity is authenticated, the user is not necessarily authorized. Authentication merely proves that the user is "who he says he is" to the Kerberos V5 authentication system. Authorization also needs to be done, since it determines if that Kerberos identity is permitted to access the Solaris user account that the client wants to access. Each user may have a private authorization list in a file ~/.k5login in his login directory (on the server). Each line in this file should contain a Kerberos principal name of the form principal/instance@realm. If the server finds a ~/.k5login file, then access is granted to the account if and only if the originating user is authenticated to one of the principals named in the ~/.k5login file. If there is no ~/.k5login file, the originating user will then be checked against the gsscred table (see gsscred(1M)). If the originating user's Kerberos V5 identity is in the gsscred table, and if the UNIX user id in the gsscred table corresponds to the user account the client is trying access, then the originating user is granted access to the account on the server. If the UNIX user id does not match, then the originating user is denied access. For example, suppose the originating user has a principal name of jdb@ENG.ACME.COM and the target account is jdb-user. If jdb@ENG.ACME.COM appears in the gsscred table with uid 23154 and if jdb-user appears in the user account database (see passwd(4)) with uid 23154, then access to account jdb-user is granted. Of course, normally, the target account name in this example would be jdb and not jdb-user. Finally, if there is no ~/.k5login file and if the originating user's Kerberos V5 identity is not in the gsscred table, then the user will be granted access to the account if and only if all of the following are true: o The user part of the authenticated principal name is the same as the target account name specified by the client. o The realm part of the client and server are the same. o The target account name exists on the server. For example, if the originating user has a principal name of jdb@ENG.ACME.COM and if the server is in realm SALES.ACME.COM, then even if jdb is a valid account name on the server, the client would be denied access. This is because the realms SALES.ACME.COM and ENG.ACME.COM differ. FILES
~/.k5login Per user-account authorization file. /etc/passwd System account file. This information may also be in a directory service. See passwd(4). ATTRIBUTES
See attributes(5) for a description of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Interface Stability |Evolving | +-----------------------------+-----------------------------+ SEE ALSO
ftp(1), rcp(1), rdist(1), rlogin(1), rsh(1), telnet(1), gsscred(1M), passwd(4), attributes(5), gss_auth_rules(5) NOTES
To avoid security problems, the ~/.k5login file must be owned by the remote user. SunOS 5.10 13 Apr 2004 krb5_auth_rules(5)
All times are GMT -4. The time now is 03:33 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy