Sponsored Content
Full Discussion: Solaris 8 CDE Problem
Operating Systems Solaris Solaris 8 CDE Problem Post 302914394 by leosmith78 on Monday 25th of August 2014 12:58:30 PM
Old 08-25-2014
Solaris 8 CDE Problem

All,

I'm running Solaris 8 on a Sparcbook. One of my users, when logging in, defaults to Open Windows desktop rather than CDE. All other users get logged into CDE just fine. Is there a file or something that tells the system what default login is? I'm confused as to why it's just for this one user. It has worked in the past for this user...
 

10 More Discussions You Might Find Interesting

1. Cybersecurity

Solaris 8, RPC, and CDE need some help.

I just installed Solaris 8 on an Intel based PC and am in the process of securing it. When I disable RPC my CDE desktop does not show up. I get my mouse cursor and a black screen. Also, anyone know how to disable SMC on Solaris 8. Thanks (3 Replies)
Discussion started by: Beauford
3 Replies

2. UNIX for Dummies Questions & Answers

CDE problem

I created a general use account on my Sparc system. The problem is this: I did a "useradd -g general -G sysadmin -d /usr/home/sameer sameer" (after I made the directories) But it seems that no .profile or other files were written to this directory. Now what's happening is when I try to... (5 Replies)
Discussion started by: xyyz
5 Replies

3. UNIX for Advanced & Expert Users

doubt in Solaris CDE

Hi all, I have a couple of doubts with Solaris CDE(i use 2.6) 1. Is it possible to customize my mouse pointer in the CDE environment? im wondering how i can change the mouse pointer, say to a different bitmap or something like that.? 2. Is it possible to use a jpeg as a backdrop? Thanks... (5 Replies)
Discussion started by: kandanmv
5 Replies

4. UNIX for Dummies Questions & Answers

Solaris 8 CDE gone?

Help! I performed a sys-unconfig as suggested in one of the other threads to set up IP on hme0. Unfortunately after all is said and done, it no longer boots to the CDE but sits at a command prompt. Any ideas (I don't know Unix). Thanks in advance! Rob Cluett (3 Replies)
Discussion started by: cluettr
3 Replies

5. UNIX for Dummies Questions & Answers

CDE in Solaris

I was wondering, if I boot up a Solaris box and the CDE does not come up by default when I log in, does that mean that the box has a GUI at all? If that is the case, where can I download CDE from? I am accustomed to RedHat and Windows, so unfortunately Solaris throws me off a little bit. (1 Reply)
Discussion started by: Jody
1 Replies

6. UNIX for Advanced & Expert Users

Please Help with Tru64 CDE problem

When using the GUI we are unable to bring up the window for printer. We go through Applications/configuration/print this is the window that will not work all the other windows work ! Would anyone have any idea how to correct this and make the print window appear ???? (0 Replies)
Discussion started by: mlucas
0 Replies

7. Solaris

Solaris 10 CDE problem - The DT messaging system could not be started

A Google search with: +Solaris +"The DT messaging system could not be started" returns 138 hits. All of the relevant possible solutions are in this document. My apologies for such a long document but I thought I would try to minimize the resolution attempts that I've already tried. System... (1 Reply)
Discussion started by: rpollard001
1 Replies

8. UNIX for Dummies Questions & Answers

solaris 10 install now no cde

Hi : I installed solaris 10 on a sparc machine. now I get no cde desktop and do not know how to start it? Any ideas would be appriciated. Thanks Alan (0 Replies)
Discussion started by: alanj4
0 Replies

9. Solaris

CDE Issue In Solaris 10

Hi All, I have solaris 10 on X86 and I need to connect this through X-Manager or similar software. I have googled a lot and tried the following : root@sol10x86 # ps -ef |grep dtlogin root 1825 4718 0 13:38:50 pts/1 0:00 grep dtlogin root@sol10x86 # svcs cde-login STATE ... (2 Replies)
Discussion started by: pintu_asim
2 Replies

10. UNIX Desktop Questions & Answers

How to migrate Solaris 10 CDE config to HP-UX CDE.

Hello, Do you guys by any chance know what is the best (if any ) way to move CDE configuration from a SOLARIS 10 machine to HP-UX? Just the config (actions, text files etc). Thanks in advance! (0 Replies)
Discussion started by: binary0x01
0 Replies
exec_attr(4)							   File Formats 						      exec_attr(4)

NAME
exec_attr - execution profiles database SYNOPSIS
/etc/security/exec_attr DESCRIPTION
/etc/security/exec_attr is a local database that specifies the execution attributes associated with profiles. The exec_attr file can be used with other sources for execution profiles, including the exec_attr NIS map and NIS+ table. Programs use the getexecattr(3SECDB) rou- tines to access this information. The search order for multiple execution profile sources is specified in the /etc/nsswitch.conf file, as described in the nsswitch.conf(4) man page. The search order follows the entry for prof_attr(4). A profile is a logical grouping of authorizations and commands that is interpreted by a profile shell to form a secure execution environ- ment. The shells that interpret profiles are pfcsh, pfksh, and pfsh. See the pfsh(1) man page. Each user's account is assigned zero or more profiles in the user_attr(4) database file. Each entry in the exec_attr database consists of one line of text containing seven fields separated by colons (:). Line continuations using the backslash (fR) character are permitted. The basic format of each entry is: name:policy:type:res1:res2:id:attr name The name of the profile. Profile names are case-sensitive. policy The security policy that is associated with the profile entry. The valid policies are suser (standard Solaris superuser) and solaris. The solaris policy recognizes privileges (see privileges(5)); the suser policy does not. The solaris and suser policies can coexist in the same exec_attr database, so that Solaris releases prior to the current release can use the suser policy and the current Solaris release can use a solaris policy. solaris is a superset of suser; it allows you to specify privileges in addition to UIDs. Policies that are specific to the current release of Solaris or that contain privi- leges should use solaris. Policies that use UIDs only or that are not specific to the current Solaris release should use suser. type The type of object defined in the profile. There are two valid types: cmd and act. The cmd type specifies that the ID field is a command that would be executed by a shell. The act type is available only if the system is configured with Trusted Extensions. It specifies that the ID field is a CDE action that should be executed by the Trusted Extensions CDE action mechanism. res1 Reserved for future use. res2 Reserved for future use. id A string that uniquely identifies the object described by the profile. For a profile of type cmd, the id is either the full path to the command or the asterisk (*) symbol, which is used to allow all commands. An asterisk that replaces the filename component in a pathname indicates all files in a particular directory. To specify arguments, the pathname should point to a shell script that is written to execute the command with the desired argu- ment. In a Bourne shell, the effective UID is reset to the real UID of the process when the effective UID is less than 100 and not equal to the real UID. Depending on the euid and egid values, Bourne shell limitations might make other shells preferable. To prevent the effective UIDs from being reset to real UIDs, you can start the script with the -p option. #!/bin/sh -p If the Trusted Extensions feature is configured and the profile entry type is act, the id is either the fully qualified name of a CDE action, or an asterisk (*) representing a wildcard. A fully qualified CDE action is specified using the action name and four additional semicolon-separated fields. These fields can be empty but the semicolons are required. The fields in a CDE action are as follows: argclass Specifies the argument class (for example, FILE or SESSION.) Corresponds to ARG_CLASS for CDE actions. argtype Specifies the data type for the argument. Corresponds to ARG_TYPE for CDE actions. argmode Specifies the read or write mode for the argument. Corresponds to ARG_MODE for CDE actions. argcount Specifies the number of arguments that the action can accept. Corresponds to ARG_COUNT for CDE actions. attr An optional list of semicolon-separated (;) key-value pairs that describe the security attributes to apply to the object upon execution. Zero or more keys may be specified. The list of valid key words depends on the policy enforced. The following key words are valid: euid, uid, egid, gid, privs, and limitprivs. euid and uid contain a single user name or a numeric user ID. Commands designated with euid run with the effective UID indicated, which is similar to setting the setuid bit on an executable file. Commands designated with uid run with both the real and effec- tive UIDs. Setting uid may be more appropriate than setting the euid on privileged shell scripts. egid and gid contain a single group name or a numeric group ID. Commands designated with egid run with the effective GID indi- cated, which is similar to setting the setgid bit on a file. Commands designated with gid run with both the real and effective GIDs. Setting gid may be more appropriate than setting guid on privileged shell scripts. privs contains a privilege set which will be added to the inheritable set prior to running the command. limitprivs contains a privilege set which will be assigned to the limit set prior to running the command. privs and limitprivs are only valid for the solaris policy. EXAMPLES
Example 1 Using Effective User ID The following example shows the audit command specified in the Audit Control profile to execute with an effective user ID of root(0): Audit Control:suser:cmd:::/usr/sbin/audit:euid=0 FILES
/etc/nsswitch.conf /etc/user_attr /etc/security/exec_attr ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availibility |SUNWcsr | +-----------------------------+-----------------------------+ |Interface Stability |See below. | +-----------------------------+-----------------------------+ The command-line syntax is Committed. The output is Uncommitted. CAVEATS
When deciding which authorization source to use (see DESCRIPTION), keep in mind that NIS+ provides stronger authentication than NIS. Because the list of legal keys is likely to expand, any code that parses this database must be written to ignore unknown key-value pairs without error. When any new keywords are created, the names should be prefixed with a unique string, such as the company's stock symbol, to avoid potential naming conflicts. The following characters are used in describing the database format and must be escaped with a backslash if used as data: colon (:), semi- colon (;), equals (=), and backslash (fR). SEE ALSO
auths(1), dtaction(1), profiles(1), roles(1), sh(1), makedbm(1M), getauthattr(3SECDB), getauusernam(3BSM), getexecattr(3SECDB), getpro- fattr(3SECDB), getuserattr(3SECDB), kva_match(3SECDB), auth_attr(4), prof_attr(4), user_attr(4), attributes(5), privileges(5) SunOS 5.11 30 Mar 2006 exec_attr(4)
All times are GMT -4. The time now is 02:52 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy