Sponsored Content
Operating Systems AIX List of AIX commands that can be run by ROOT user ONLY Post 302783021 by dukessd on Tuesday 19th of March 2013 08:04:24 PM
Old 03-19-2013
Isn't that a bit like asking who can drive my car?

It depends on who you have given the keys too, or if you are out and left the keys at home, or work, who knows which drawer you keep them in, and who has access to your home or office...

Who can, or has, changed the permissions on any file or directory...

Who has access to the system and what permissions they might have to enable then to gain access...

The list is endless depending on your configuration...

If you are asking from a default AIX install perspective then it will probably also depend on the exact level, what is installed, who or what has access via various different methods - Tivoli Access Manager, HMC commands via RMC, Etc.

I don't think you'll ever find a definitive list.

HTH
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Capture of all commands issued by the user “root”

I have to write a script (not C based) that allows to capture of all commands issued by the user “root”. First, I tried to monitor the .bash_history but the commands are written in chunk after the .bash_history is closed. How can I capture the commands in Real-Time without waiting root to... (4 Replies)
Discussion started by: elieifrah@gmail
4 Replies

2. HP-UX

user commands without root access

Hi I have been asked to find out how to 1) create users 2) reset passwords 3) kill processes that may require root privileges without having root password, sudo rights or rights to passwd command Any ideas? Thanks in advance (1 Reply)
Discussion started by: emealogistics
1 Replies

3. Shell Programming and Scripting

How a normal user run a script including root privileaged commands

Dear all Ihave written a script in Hpux9.0, the ecript is working fine if I run it from root command prompt But when I am running it thru /etc/profile or /user/.profile and login as a normal user, the owner of the process running the script is the normal user & hence cant run a root privileaged... (7 Replies)
Discussion started by: initin
7 Replies

4. AIX

Crontab cannot run by non-root user

Good morning everybody. I have just receiedv a complaint from our DBA saying that if he create a scripts to run some Oracle performance scripts using crontab and the scheduling part is ok but the job is failed when I checked on /var/adm/cron/log. I have tried his scripts using Oracle id directly... (4 Replies)
Discussion started by: kwliew999
4 Replies

5. UNIX for Dummies Questions & Answers

How to allow access to some commands having root privleges to be run bu non root user

hi i am new to unix and i have abig task. i have to \run particular commands having root privileges from a non root user. i know sudo is one of the way but i need sum other approach kindly help Thanks (5 Replies)
Discussion started by: suryashikha
5 Replies

6. Shell Programming and Scripting

Need to run a bash script that logs on as a non-root user and runs script as root

So I have a script that runs as a non-root user, lets say the username is 'xymon' . This script needs to log on to a remote system as a non-root user also and call up a bash script that runs another bash script as root. in short: user xymon on system A needs to run a file as root user and have... (2 Replies)
Discussion started by: damang111
2 Replies

7. SuSE

Allow multiple users to run several root commands

I am using SUSE Linux Enterprise Server 10 SP2 (i586) and I had earlier ammended my sudoers file to allow users to become root user with "sudo su - " command Now I am trying to add multiple users to the sudoers file to run several commands such as restarting the server, restarting the nagios... (9 Replies)
Discussion started by: hedkandi
9 Replies

8. Shell Programming and Scripting

How to restrict root user from running some commands

is it possible that we can restrict the root user if he runs some commands?? e.g i want if root runs command 'rm etc/passwd', he shoudn't be able to run command and throws error :confused: (3 Replies)
Discussion started by: sheelsadan
3 Replies

9. AIX

track commands run as root after sudo

I'm looking for a way to track commands that are run as root after a user runs sudo su - root. I have a profile set up for root that will track the commands by userid but if we change the shell it only stores it in that shells history file. (2 Replies)
Discussion started by: toor13
2 Replies

10. Shell Programming and Scripting

Script to run commands as root user

Hello I have a script which is working fine so far to generate HTML file. Now i am wondering how do i include a syntax where it can change itself to root user and execute a specific commands as root user. Please help, Thanks in advance. -Siddhesh (2 Replies)
Discussion started by: Siddheshk
2 Replies
access(2)							System Calls Manual							 access(2)

NAME
access() - determine accessibility of a file SYNOPSIS
DESCRIPTION
The system call checks the file pointed to by path for accessibility according to the bit pattern contained in amode. uses the real user ID, not the effective user ID, and the real group ID, not the effective group ID. The value of amode is either the bit-wise inclusive OR of the access permissions to be checked, or the existence test. You can use the following symbolic constants, defined in to test for permissions: Read access Write access Execute (search) access Check existence of file The owner of a file has permission checked with respect to the "user" read, write, and execute mode bits. Members of the file's group other than the owner have permissions checked with respect to the "group" mode bits. All others have permissions checked with respect to the "other" mode bits. If a file is currently open for execution, reports that it is not writable, regardless of the setting of its mode. Access Control Lists - HFS File Systems Only Read, write, and execute/search permissions are checked against the file's access control list (ACL). Each mode is checked separately since different ACL entries can grant different permissions. The real user ID is combined with the process's real group ID and each group in its supplementary groups list, and the access control list is searched for a match. Search proceeds in order of specificity and ends when one or more matching entries are found at a specific level. More than one or entry can match a user if that user has a nonnull sup- plementary groups list. If any matching entry has the appropriate permission bit set, access is permitted. Access Control Lists - JFS File Systems Only Read, write, and execute/search permissions are checked against the file's access control list (ACL). The real user ID is combined with the process's real group ID and each group in its supplementary groups list, and the access control list is searched for a match. Search proceeds in order of ACL entries and ends when the first entry matching the user ID or any of the group IDs is encountered. If a shared text file is currently open for execution, reports that it is not writable, regardless of its access control list. However, does not report that a shared text file open for writing is not executable, since the check is not easily done. It also reports that a file on a read-only file system is not writable. Security Restrictions If the path is valid and the real user ID is superuser or a user with and privileges, always returns except when amode includes the path is not a directory, and none of the execute bits are set in the file's mode. See privileges(5) for more information about privileged access on systems that support fine-grained privileges. RETURN VALUE
returns the following values: Successful completion. The requested access is permitted. Failure. is set to indicate the error. ERRORS
If fails, is set to one of the following values. Search permission is denied on a component of the path prefix. The access control list does not permit the requested access and the real user ID is not a user with or privileges. path points outside the allocated address space for the process. The reliable detection of this error is implementation dependent. Too many symbolic links were encountered in translating the path name. The length of the specified path name exceeds bytes, or the length of a component of the path name exceeds bytes while is in effect. Read, write, or execute (search) permission is requested for a null path name. The named file does not exist. A component of the path prefix is not a directory. Write access is requested for a file on a read-only file system. Write access is requested for a pure procedure (shared text) file that is being executed. SEE ALSO
acl(2), chmod(2), stat(2), setacl(2), acl(5), aclv(5), privileges(5), unistd(5). STANDARDS CONFORMANCE
access(2)
All times are GMT -4. The time now is 05:44 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy