Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Pop the users one by one in sudo cat /etc/security/user Post 302578782 by starter2011 on Friday 2nd of December 2011 09:51:28 AM
Old 12-02-2011
Pop the users one by one in sudo cat /etc/security/user

Hi Everyone,
When I runthe query in ssh shell sudo cat /etc/security/user , I see half of the users cut down from the display screen. what I want to do is using the somthing like "pop" that when I hit the enter key every time the screen should move to the next user? does some one has any idea how to do it???Smilie
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

user prompt doesn't pop up with rsh command

Hello All, I'm trying to run some script on other host by using rsh command. This script asking for user id which follows by password requisition. The problem which I faced is that the user requisition prompt never appear. It look like the script is running and wait for the user id to be... (1 Reply)
Discussion started by: ronenalalush
1 Replies

2. Shell Programming and Scripting

pop out screen with user input

is it possible to have a small screen pop out on text-unix (no gui unix) and wait for user input? i have an EOD process that i need to execute, the problem is the developer needs to be properly remove from the system. the problem is, the developer is the boss, you can't force them out of the... (5 Replies)
Discussion started by: venerayan
5 Replies

3. UNIX for Dummies Questions & Answers

Can I export the users environment using sudo?

I want the user to be able to commands as another user.. but when they do that.. I need them to have the environment variables of the other user. is this possible with sudo? sudo -H -u user env 'env' is giving me the environment of the current user, not the user I want to run commands as. ... (1 Reply)
Discussion started by: julesdiane
1 Replies

4. UNIX for Dummies Questions & Answers

Is there a way to find users who have sudo permissions for non root?

I want to check if in a host a set of persons have sudo access or not and I dont have root access to the host. (1 Reply)
Discussion started by: pristine
1 Replies

5. Solaris

sudo for users

Hello gurus, Is there a flag or switch that you can added to sudoers file to always have users type 'sudo' prior to running a command? (5 Replies)
Discussion started by: em23
5 Replies

6. UNIX and Linux Applications

how to block imap/pop user's login

Is this possible to block particular user's email-client configuration on basis of pop/imap settings in linux ,dovecot.conf or anywhere ?As you know when acl is defined in /etc/squid/squid.conf file according to its http_access users are able to access internet. Before (1 Reply)
Discussion started by: sandeepvson
1 Replies

7. UNIX for Advanced & Expert Users

How can I get sudo -u <username> to load that users profile on HP-UX

I am running a serverapplication on a HP-UX machine where I need to handle some of the commands as a specified user called "druser". When I log on as this user with the command; sudo -u druser -sit starts an instance of the shell as that user. However, it doesn't load that users .profile from... (1 Reply)
Discussion started by: ukiome
1 Replies

8. Shell Programming and Scripting

How to sudo to multiple users?

Hi all, I have to create SSH public key for multiple users. Iam creating a script in which, through root, I have to switch to multiple accounts to create SSH keys and then transfer it to the respective servers. First I tried with single user id and everything worked fine. When I try to sudo... (1 Reply)
Discussion started by: deepakwins
1 Replies

9. Red Hat

How to disable sudo -i in sudoers file for users?

All, I need to disable "sudo -i" and "su - " for all servers in our environment, We want to make sure no one run commands or delete files across environment using switching to root account. can you guys please lets me know if this is achievable. Thanks and Regards shekar (2 Replies)
Discussion started by: shekar777
2 Replies

10. Solaris

How to check sudo access of other users?

Hi, I always use "sudo -U user -l" as root and it gives me list of sudo access, that person have. But on one Solaris server, I can't run it. recently only I installed latest patchset on this server. Not sure, if that changed something on this. However, sudo package is showing old one. # id -a... (1 Reply)
Discussion started by: ron323232
1 Replies
SYSTEMD-ASK-PASSWORD(1) 				       systemd-ask-password					   SYSTEMD-ASK-PASSWORD(1)

NAME
systemd-ask-password - Query the user for a system password SYNOPSIS
systemd-ask-password [OPTIONS...] [MESSAGE] DESCRIPTION
systemd-ask-password may be used to query a system password or passphrase from the user, using a question message specified on the command line. When run from a TTY it will query a password on the TTY and print it to standard output. When run with no TTY or with --no-tty it will use the system-wide query mechanism, which allows active users to respond via several agents, listed below. The purpose of this tool is to query system-wide passwords -- that is passwords not attached to a specific user account. Examples include: unlocking encrypted hard disks when they are plugged in or at boot, entering an SSL certificate passphrase for web and VPN servers. Existing agents are: o A boot-time password agent asking the user for passwords using plymouth(8), o A boot-time password agent querying the user directly on the console -- systemd-ask-password-console.service(8), o An agent requesting password input via a wall(1) message -- systemd-ask-password-wall.service(8), o A TTY agent that is temporarily spawned during systemctl(1) invocations, o A command line agent which can be started temporarily to process queued password requests -- systemd-tty-ask-password-agent --query. Answering system-wide password queries is a privileged operation, hence all the agents listed above (except for the last one), run as privileged system services. The last one also needs elevated privileges, so should be run through sudo(8) or similar. Additional password agents may be implemented according to the systemd Password Agent Specification[1]. If a password is queried on a TTY, the user may press TAB to hide the asterisks normally shown for each character typed. Pressing Backspace as first key achieves the same effect. OPTIONS
The following options are understood: --icon= Specify an icon name alongside the password query, which may be used in all agents supporting graphical display. The icon name should follow the XDG Icon Naming Specification[2]. --id= Specify an identifier for this password query. This identifier is freely choosable and allows recognition of queries by involved agents. It should include the subsystem doing the query and the specific object the query is done for. Example: "--id=cryptsetup:/dev/sda5". --keyname= Configure a kernel keyring key name to use as cache for the password. If set, then the tool will try to push any collected passwords into the kernel keyring of the root user, as a key of the specified name. If combined with --accept-cached, it will also try to retrieve such cached passwords from the key in the kernel keyring instead of querying the user right away. By using this option, the kernel keyring may be used as effective cache to avoid repeatedly asking users for passwords, if there are multiple objects that may be unlocked with the same password. The cached key will have a timeout of 2.5min set, after which it will be purged from the kernel keyring. Note that it is possible to cache multiple passwords under the same keyname, in which case they will be stored as NUL-separated list of passwords. Use keyctl(1) to access the cached key via the kernel keyring directly. Example: "--keyname=cryptsetup" --timeout= Specify the query timeout in seconds. Defaults to 90s. A timeout of 0 waits indefinitely. --echo Echo the user input instead of masking it. This is useful when using systemd-ask-password to query for usernames. --no-tty Never ask for password on current TTY even if one is available. Always use agent system. --accept-cached If passed, accept cached passwords, i.e. passwords previously entered. --multiple When used in conjunction with --accept-cached accept multiple passwords. This will output one password per line. --no-output Do not print passwords to standard output. This is useful if you want to store a password in kernel keyring with --keyname but do not want it to show up on screen or in logs. -h, --help Print a short help text and exit. EXIT STATUS
On success, 0 is returned, a non-zero failure code otherwise. SEE ALSO
systemd(1), systemd-ask-password-console.service(8), systemd-tty-ask-password-agent(1), keyctl(1), plymouth(8), wall(1) NOTES
1. systemd Password Agent Specification https://www.freedesktop.org/wiki/Software/systemd/PasswordAgents 2. XDG Icon Naming Specification http://standards.freedesktop.org/icon-naming-spec/icon-naming-spec-latest.html systemd 237 SYSTEMD-ASK-PASSWORD(1)
All times are GMT -4. The time now is 10:19 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy