08-25-2011
This poses a HUGE security risk. If there is a requirement for another user to perform tasks as root, look at sudo.
My 2 cents.
10 More Discussions You Might Find Interesting
1. AIX
Currently, I have about 7 servers and the uid for a given person is different on each server. I want to make the uid's the same for a given username on each server. I know how to change the uid via smit, but when I do the previous uid number shows up as the owner for the files of that username.... (4 Replies)
Discussion started by: mcateriny
4 Replies
2. UNIX for Dummies Questions & Answers
Is it possible given a uid to determine information about the person with the uid? An example would be simple information regarding what group and the name of the person associated with that uid. It seems there is probably an easy staring me in the face but i cant seem to find it... (3 Replies)
Discussion started by: dreaming1
3 Replies
3. AIX
Hello
I want to find out how I can make sure in AIX that the UIDs cannot be reused Until after 6 Months after the user has left.
Thanks,
Noori (4 Replies)
Discussion started by: noori
4 Replies
4. Shell Programming and Scripting
How do i go about getting the uid of the user and verify ?
if
then
echo "You are not a superuser, please login as a superuser"
exit1;
fi
the above code doesn't work. can some guru please help me.
1. how to get the uid of the user ? i know by typing id but how to... (7 Replies)
Discussion started by: filthymonk
7 Replies
5. Shell Programming and Scripting
Hi Guys,
I'd like to ask your advice on the following, I've written this script to terminate a given process by name:
#!/bin/bash
echo 'Please enter the process you wish to terminate'
read process
pid=$(pidof $process)
kill -9 $pid
echo $2
to make it safer I want it to reject the... (4 Replies)
Discussion started by: Lora Graham
4 Replies
6. Shell Programming and Scripting
i need a script to process a password file and based on the UIDs in the password file, generate the new UID that is 1 greater than the highest uid.
i have some script logic but i dont really understand it. any help?
#!/usr/bin/perl
##########################################
#... (3 Replies)
Discussion started by: livewire06
3 Replies
7. Shell Programming and Scripting
is tty command opens a process in the system if yes then why process got the userid????? (5 Replies)
Discussion started by: Mac91
5 Replies
8. UNIX for Dummies Questions & Answers
Hi folks!
I need you help to discover what's the impact of a duplicated UID in an operating system. What's the meaning when someone put in different users the same UID? (3 Replies)
Discussion started by: phcostabh
3 Replies
9. Solaris
Hi,
I want to change user id gefadm ,uid=0(root) gid=0(root) to uid=16649(isaadmin) gid=16284(dstage),
how can i change this uid ,gid one value to another value.
Please provide the steps how can i change , uid=0(root) gid=0(root) to uid=16649(isaadmin) gid=16284(dstage).
Thanks in advance for... (2 Replies)
Discussion started by: sridhardwh
2 Replies
10. Solaris
Hi All,
I have to give permission to one of the groups called as "ABC" as like the permissions of the group "UNIXADM".
Could you please some one help on this issue ? (3 Replies)
Discussion started by: ramareddi16
3 Replies
LEARN ABOUT CENTOS
pam_rootok
PAM_ROOTOK(8) Linux-PAM Manual PAM_ROOTOK(8)
NAME
pam_rootok - Gain only root access
SYNOPSIS
pam_rootok.so [debug]
DESCRIPTION
pam_rootok is a PAM module that authenticates the user if their UID is 0. Applications that are created setuid-root generally retain the
UID of the user but run with the authority of an enhanced effective-UID. It is the real UID that is checked.
OPTIONS
debug
Print debug information.
MODULE TYPES PROVIDED
The auth, acct and password module types are provided.
RETURN VALUES
PAM_SUCCESS
The UID is 0.
PAM_AUTH_ERR
The UID is not0.
EXAMPLES
In the case of the su(1) application the historical usage is to permit the superuser to adopt the identity of a lesser user without the use
of a password. To obtain this behavior with PAM the following pair of lines are needed for the corresponding entry in the /etc/pam.d/su
configuration file:
# su authentication. Root is granted access by default.
auth sufficient pam_rootok.so
auth required pam_unix.so
SEE ALSO
su(1), pam.conf(5), pam.d(5), pam(8)
AUTHOR
pam_rootok was written by Andrew G. Morgan, <morgan@kernel.org>.
Linux-PAM Manual 09/19/2013 PAM_ROOTOK(8)