Sponsored Content
Operating Systems Solaris Individual usernames for the same login account Post 302917016 by masy on Saturday 13th of September 2014 06:33:50 AM
Old 09-13-2014
Linux

The best way to handle this kind of situation is to implement SUDO or RBAC.

RBAC will need a considerable effort and study though i have not seen/worked on any RBAC implementations.

SUDO is the easiest of all and the logging can be customized and routed to a separate log file. sufficient restrictions can be built into the configurations too.

Providing a application account password to a multiple users is the most dangerous way of giving access. if one user is to be removed access then you would have to reset password and provide the new one to every other user.

Implementing these king of restrictions is easy with SUDO/RBAC.

Since the post is old, hope you might have found a way already.

Good Luck ! Smilie
 

10 More Discussions You Might Find Interesting

1. HP-UX

heads up unable tp login using ordinary account

Hi Mentors, I have a unix box HPC8000 HPUX 11.11 had just a problem loging in on CDE using ordinary account. The problem looks like this when an ordinary account will login to it will automatically closed and the login promtp will appear. If the root will login no problem at all. I tried... (0 Replies)
Discussion started by: eykyn17
0 Replies

2. UNIX for Dummies Questions & Answers

Setting an account to be a non-login account automatically?

Is there a way to easily change an account to be a non login account (NP in the shadow) file? I know I can just edit the file but that is not what we want to do. We use access control software and want to provide a way to set an account to be non-login using simple commands that can be mapped... (0 Replies)
Discussion started by: LordJezo
0 Replies

3. UNIX Desktop Questions & Answers

Does this forum offer a unix login account

How do you access a terminal and create a Unix user account. I am new to this form, so, is there a way to log on to a unix account that this forum offers to practice Unix. Is there a server available (somewhere) to users of this forum to access unix? So far the research I have found refers a person... (2 Replies)
Discussion started by: brendar
2 Replies

4. Post Here to Contact Site Administrators and Moderators

Can't login to my account

Moderator, I had to create a new user acct because my old one does not work. It will not allow me to login because of permissions problems. Can you please re-activate my old user id: gzs553 I think the email address for my old account is *****removed***** and once you reset my account,... (0 Replies)
Discussion started by: kflanigan
0 Replies

5. Linux

How to find remote Linux box login account without login in to that box?

Hi, How to find remote Linux box login account without login in to that box? I don't have login account at my remote Linux box. But I need who are all having login account. How do I findout? Thanks, --Muthu. (3 Replies)
Discussion started by: Muthuselvan
3 Replies

6. UNIX for Dummies Questions & Answers

User account with no login shell

Hi All, I was reading a tutorial for Installing Tomcat on Linux machine. (http://www.puschitz.com/InstallingTomcat.html) Here the author had mentioned that: For security reasons I created a user account with no login shell for running the Tomcat server. My question is: 1. What is a User... (6 Replies)
Discussion started by: jw_amp
6 Replies

7. AIX

AIX: Could not login using NIS Account?

Hi there, I am new to AIX environment, when I set up NIS Client for an AIX 5.3 Machine to connect to a Linux NIS Master, everything seems to be okie: /etc/passwd: +::0:0::: /etc/group: +: ps -ef | egrep "ypbind": /usr/lib/netsvc/yp/ypbind -ypsetme -ypsetme I can get all account... (0 Replies)
Discussion started by: quanba
0 Replies

8. AIX

User Account Login Login on your AIX server

I want to learn AIX. I would like to find someone who would be willing to give me a login to their AIX home lab server. My intent is to poke around and discover the similarities and differences of AIX compared to other *NIXs. I am a UNIX admin so I can think of what some immediate concerns may... (1 Reply)
Discussion started by: perl_in_my_shel
1 Replies

9. Forum Support Area for Unregistered Users & Account Problems

I cannot login to my account

my username is coolatt..thanks to do needful. (3 Replies)
Discussion started by: coolatt
3 Replies

10. UNIX for Beginners Questions & Answers

Understanding the difference between individual BASH login scripts

Hello... and thanks in advance for reading this or offering me any assistance I'm trying to understand specific differences between the various login scripts... I understand the differences between interactive vs non-interactive and login vs non-login shells... and that's not where my question... (4 Replies)
Discussion started by: bodisha
4 Replies
bup-margin(1)						      General Commands Manual						     bup-margin(1)

NAME
bup-margin - figure out your deduplication safety margin SYNOPSIS
bup margin [options...] DESCRIPTION
bup margin iterates through all objects in your bup repository, calculating the largest number of prefix bits shared between any two entries. This number, n, identifies the longest subset of SHA-1 you could use and still encounter a collision between your object ids. For example, one system that was tested had a collection of 11 million objects (70 GB), and bup margin returned 45. That means a 46-bit hash would be sufficient to avoid all collisions among that set of objects; each object in that repository could be uniquely identified by its first 46 bits. The number of bits needed seems to increase by about 1 or 2 for every doubling of the number of objects. Since SHA-1 hashes have 160 bits, that leaves 115 bits of margin. Of course, because SHA-1 hashes are essentially random, it's theoretically possible to use many more bits with far fewer objects. If you're paranoid about the possibility of SHA-1 collisions, you can monitor your repository by running bup margin occasionally to see if you're getting dangerously close to 160 bits. OPTIONS
--predict Guess the offset into each index file where a particular object will appear, and report the maximum deviation of the correct answer from the guess. This is potentially useful for tuning an interpolation search algorithm. --ignore-midx don't use .midx files, use only .idx files. This is only really useful when used with --predict. EXAMPLE
$ bup margin Reading indexes: 100.00% (1612581/1612581), done. 40 40 matching prefix bits 1.94 bits per doubling 120 bits (61.86 doublings) remaining 4.19338e+18 times larger is possible Everyone on earth could have 625878182 data sets like yours, all in one repository, and we would expect 1 object collision. $ bup margin --predict PackIdxList: using 1 index. Reading indexes: 100.00% (1612581/1612581), done. 915 of 1612581 (0.057%) SEE ALSO
bup-midx(1), bup-save(1) BUP
Part of the bup(1) suite. AUTHORS
Avery Pennarun <apenwarr@gmail.com>. Bup unknown- bup-margin(1)
All times are GMT -4. The time now is 10:39 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy