02-25-2012
Hi Admin_Xor,
I tried that way too but it did not helped and more over... let me say this.. if the user copies the /usr/bin/passwd binary file to other location... he can execute that password..change...
All I am looking is in any means he should not execute the password... but he should be able to execute the rest all commands.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hello!
Does anyone know if it's possible to restrict access to apache webserver with certificates?
What I want is that if a user has a certificate in his browser then he get's access, if not show error or another page.
I would be very happy if someone knew!
/D (2 Replies)
Discussion started by: Esaia
2 Replies
2. UNIX for Advanced & Expert Users
Hi All!
I would like to know if there is any specific way by which I can restrict access to apecific users (ip addresses).
OS : Red hat linux
Thanks!
nua7 (6 Replies)
Discussion started by: nua7
6 Replies
3. UNIX for Advanced & Expert Users
Hi
I have requirement to create 3 new users on my server but to restrict their access to a set of particular folders.
/export/home/kapil/shared,
/export/home/kapil/shared/Folder1
/export/home/kapil/shared/Folder2
These folders should be accessible to all the 3 users and to me too.... (1 Reply)
Discussion started by: kapilk
1 Replies
4. Linux
Hi Everybody,
If there is a general NFS share in the LAN and for example this share has three files - a, b, c is there any way to restrict file access to the root user of one particular host(falcon) in the same LAN environment while the normal users from the same host(falcon) should be able... (4 Replies)
Discussion started by: sudhirav
4 Replies
5. UNIX for Dummies Questions & Answers
Hi All,
How can we restrict a particular user access to a particular shell in solaris 10.
Thanks in Advance. (5 Replies)
Discussion started by: rama krishna
5 Replies
6. Red Hat
Hi there
I have an application user on my system that wants accesses to these file systems as such:
rwx:
/SAPO
/SAPS12
/R3_888
/R3_888B
/R3_888F
/R3_888R
r:
/usr/sap
these are the existing FS permissions:ownerships:
# ls -ld /SAPO (9 Replies)
Discussion started by: hedkandi
9 Replies
7. Shell Programming and Scripting
Hi,
How to restrict access to a .ksh script in such the way that the users can only execute the script, neither read nor write.
I tried the below code so that my user alone has the rwx and other users can only execute.
chmod 711 sample.ksh
But when I logged in as a different user... (26 Replies)
Discussion started by: machomaddy
26 Replies
8. Solaris
Hi Dears,
I have one requirement like this:
general user A can execute command C with root privilege by sudo configuration
some folders and files are created during the command C execution
user A cannot access those folders and files because the owner is root user, so I want the user A... (0 Replies)
Discussion started by: crest.boy
0 Replies
9. UNIX for Dummies Questions & Answers
I'm trying to use squid to restrict elinks' access to certain websites(only http traffic).
I have tried some configs in squid.conf but no luck. Hope someone has a bit of time to explain me how can you make these config's :)
---------- Post updated at 05:40 PM ---------- Previous update was at... (1 Reply)
Discussion started by: Birnbacher
1 Replies
10. Red Hat
Hi,
I wanted add a group to the sudoers file so they can run sudo commands and blocked su command but it seems they can just run sudo -i to switch to root which defeats my purpose.
Is it possible to block sudo -i with the help of sudoers file or any other way.
Please advise.
The below... (1 Reply)
Discussion started by: Jartan
1 Replies
LEARN ABOUT DEBIAN
pam_exec
PAM_EXEC(8) Linux-PAM Manual PAM_EXEC(8)
NAME
pam_exec - PAM module which calls an external command
SYNOPSIS
pam_exec.so [debug] [expose_authtok] [seteuid] [quiet] [log=file] command [...]
DESCRIPTION
pam_exec is a PAM module that can be used to run an external command.
The child's environment is set to the current PAM environment list, as returned by pam_getenvlist(3) In addition, the following PAM items
are exported as environment variables: PAM_RHOST, PAM_RUSER, PAM_SERVICE, PAM_TTY, PAM_USER and PAM_TYPE, which contains one of the module
types: account, auth, password, open_session and close_session.
Commands called by pam_exec need to be aware of that the user can have controll over the environment.
OPTIONS
debug
Print debug information.
expose_authtok
During authentication the calling command can read the password from stdin(3).
log=file
The output of the command is appended to file
quiet
Per default pam_exec.so will echo the exit status of the external command if it fails. Specifying this option will suppress the
message.
seteuid
Per default pam_exec.so will execute the external command with the real user ID of the calling process. Specifying this option means
the command is run with the effective user ID.
MODULE TYPES PROVIDED
All module types (auth, account, password and session) are provided.
RETURN VALUES
PAM_SUCCESS
The external command was run successfully.
PAM_SERVICE_ERR
No argument or a wrong number of arguments were given.
PAM_SYSTEM_ERR
A system error occurred or the command to execute failed.
PAM_IGNORE
pam_setcred was called, which does not execute the command.
EXAMPLES
Add the following line to /etc/pam.d/passwd to rebuild the NIS database after each local password change:
password optional pam_exec.so seteuid /usr/bin/make -C /var/yp
This will execute the command
make -C /var/yp
with effective user ID.
SEE ALSO
pam.conf(5), pam.d(5), pam(7)
AUTHOR
pam_exec was written by Thorsten Kukuk <kukuk@thkukuk.de>.
Linux-PAM Manual 06/04/2011 PAM_EXEC(8)