01-24-2014
Sorry, a little.
The usual way to do something like that on Unix is to use 'sudo' to grant a list of capabilities to a user.
By definition "root" can do anything and it is very difficult to impose a limitation.
So, could you give me any solution for my question?
Thanks,
10 More Discussions You Might Find Interesting
1. Programming
Hi ,
I want to create a new user using c program not with unix adduser command .
is it possible to write a cprogram to create a new user account , it should accept username , grouid , group name and all other privilages .
i can use system calls inside c program to do this .
i will... (5 Replies)
Discussion started by: naren_chella
5 Replies
2. Solaris
Hi All,
I'm using solaris 2.8, and I want create a new ftp user account with the following restrictions:
- Have only ftp access, no telnet or rlogin
- Have restricted access to its home directory example /export/home/newuser
- Deny access to any other directory.
Thanks for your help,
... (6 Replies)
Discussion started by: Jeremy3
6 Replies
3. UNIX for Dummies Questions & Answers
i want to create unix user account (usera) for outsider so that they can run program that exist in /application/xxx/.
The account have their own home directory (/home/usera).
But on the same time the user cannot run any application/command either than in /application/xxx/.
User can only... (1 Reply)
Discussion started by: golden_shooter
1 Replies
4. UNIX for Advanced & Expert Users
i want to create unix user account (usera) for outsider so that they can run program that exist in /application/xxx/.
The account have their own home directory (/home/usera).
But on the same time the user cannot run any application/command either than in /application/xxx/.
User can only... (1 Reply)
Discussion started by: golden_shooter
1 Replies
5. Shell Programming and Scripting
Is there any way to create user with default password by shell script withoud manual intervantion and from a text file having user's information and default password.
Thanks (6 Replies)
Discussion started by: wenay
6 Replies
6. UNIX for Dummies Questions & Answers
Hi all,
I wish to create some users, I can do that using the following command.
useradd
I wonder If i could create Uers as a clone of Root. I mean different users but having the same provileages as Root user. Can be ablle to access the Root Dir and so on ..
Please help me out Is this... (6 Replies)
Discussion started by: Asteroid
6 Replies
7. UNIX for Dummies Questions & Answers
hi
how to create new user in unix
plz explain me (3 Replies)
Discussion started by: arulkumar
3 Replies
8. Solaris
Hi,
I tried to search, but could not find answer for this really:
Is it possible to create a user that would have access only to a defined list of files? I would like to create a user that can access a set of files that are located behind different path. This user should not have access to... (1 Reply)
Discussion started by: Juha
1 Replies
9. UNIX for Dummies Questions & Answers
dear guys,
sorry for asking a noob :p question, tried to search the forum for an answer but couldn't find one, i am running solaris 10 and i would like to create a user with limited access to view only one directory, the directory already exist, is this possible:confused:?
thanks and regards (4 Replies)
Discussion started by: q8devilish
4 Replies
10. Ubuntu
Hello folks,
I pretend install Lubuntu 16.04 LTS in pc for any employer use this pc! I think create an user with, only, permission to read and write, 770.
This is the best scenario?
I think create this user through terminal, because I pretend create a script, and I don't where wizard has... (0 Replies)
Discussion started by: enodev
0 Replies
LEARN ABOUT CENTOS
captest
CAPTEST:(8) System Administration Utilities CAPTEST:(8)
NAME
captest - a program to demonstrate capabilities
SYNOPSIS
captest [ --drop-all | --drop-caps | --id ] [ --lock ] [ --text ]
DESCRIPTION
captest is a program that demonstrates and prints out the current process capabilities. Each option prints the same report. It will output
current capabilities. then it will try to access /etc/shadow directly to show if that can be done. Then it creates a child process that
attempts to read /etc/shadow and outputs the results of that. Then it outputs the capabilities that a child process would have.
You can also apply file system capabilities to this program to study how they work. For example, filecap /usr/bin/captest chown. Then run
captest as a normal user. Another interesting test is to make captest suid root so that you can see what the interaction is between root's
credentials and capabilities. For example, chmod 4755 /usr/bin/captest. When run as a normal user, the program will see if privilege esca-
lation is possible. But do not leave this app setuid root after you are don testing so that an attacker cannot take advantage of it.
OPTIONS
--drop-all
This drops all capabilities and clears the bounding set.
--drop-caps
This drops just traditional capabilities.
--id This changes to uid and gid 99, drops supplemental groups, and clears the bounding set.
--text This option outputs the effective capabilities in text rather than numerically.
--lock This prevents the ability for child processes to regain privileges if the uid is 0.
SEE ALSO
filecap(8), capabilities(7)
AUTHOR
Steve Grubb
Red Hat June 2009 CAPTEST:(8)