02-12-2015
The user account that they connect with will have the permissions defined by the directories and files. If the connecting user is in group readgrp then you can make the directory & file permissions available read-only to that group, just as you would if the user were at the command line.
Robin
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi All,
If I don't want other user read my script, what can i do? :confused: (19 Replies)
Discussion started by: happyv
19 Replies
2. Ubuntu
I've been tearing my hair out over this: vsftp does not work on any of my RedHat Server 5.x systems - I keep getting a variation on 500 OOPS: vsftpd: cannot locate user specified in 'ftp_username':ftp or 500 OOPS: cannot locate user entry:nobody (different errors on different systems). I spent... (2 Replies)
Discussion started by: thomn8r
2 Replies
3. UNIX for Dummies Questions & Answers
If I have a number of users all in the same group. How do I give read only access to some of them on everyone elses home directory. Is it possible if they are all in the same group??
So
user1,2,3,4 can have read/execute on user1-5 home directory, but user5 can only read only have read... (1 Reply)
Discussion started by: sniff
1 Replies
4. Linux
I've been fighting this for about a year: vsftp does not work on any of my RedHat Server 5.x systems - I keep getting a variation on 500 OOPS: vsftpd: cannot locate user specified in 'ftp_username':ftp or 500 OOPS: cannot locate user entry:nobody (different errors on different systems). I spent... (0 Replies)
Discussion started by: thomn8r
0 Replies
5. UNIX for Dummies Questions & Answers
Is there a way i can only force SSL encryption if they connect from outside our network OR allow certain IP's to connect without using encryption? (0 Replies)
Discussion started by: mokachoka
0 Replies
6. Shell Programming and Scripting
Hi
I am new to writing script and want to use a Bash Piped while-read and read from user input.
if something happens on server.log then do while loop or if something happend on user input then do while loop.
Pseudocode something like:
tail -n 3 -f server.log | while read serverline || read... (8 Replies)
Discussion started by: MyMorris
8 Replies
7. UNIX for Dummies Questions & Answers
Hi,
I want to create a new user,and I want to give read permission to a folder which owned by root.
How can I do this?
thanks for your helps (4 Replies)
Discussion started by: sersoy
4 Replies
8. Shell Programming and Scripting
Hi,
I have one script for which I want that other user should not read the script file but can execute. Is there any method ?
I tried by giving 711 but it gives Permission denied to other users.
For Generic User id as a work around , I have created alias in .bashrc file and other user... (4 Replies)
Discussion started by: Amit Joshi
4 Replies
9. UNIX for Advanced & Expert Users
:rolleyes:I am trying to setup all certificate based client-server environment in Linux using vsftpd and curl with openssl.
I would like to make a user access with vsftpd certificate and user own client certificate (self-signed) with private/public key.
I don't see google posts about the my plan... (4 Replies)
Discussion started by: gogogo
4 Replies
10. Red Hat
I'm wondering if vsftpd supports user subcommand?
I found I can't switch user after ftp login.
Maybe someone can give me a certain answer.
I always got the message as below,
I enabled log_ftp_protocol=YES and checked the vsftpd.log,
it didn't help much actually. The log file only... (6 Replies)
Discussion started by: bestard
6 Replies
LEARN ABOUT CENTOS
gshadow
GSHADOW(5) File Formats and Conversions GSHADOW(5)
NAME
gshadow - shadowed group file
DESCRIPTION
/etc/gshadow contains the shadowed information for group accounts.
This file must not be readable by regular users if password security is to be maintained.
Each line of this file contains the following colon-separated fields:
group name
It must be a valid group name, which exist on the system.
encrypted password
Refer to crypt(3) for details on how this string is interpreted.
If the password field contains some string that is not a valid result of crypt(3), for instance ! or *, users will not be able to use a
unix password to access the group (but group members do not need the password).
The password is used when an user who is not a member of the group wants to gain the permissions of this group (see newgrp(1)).
This field may be empty, in which case only the group members can gain the group permissions.
A password field which starts with a exclamation mark means that the password is locked. The remaining characters on the line represent
the password field before the password was locked.
This password supersedes any password specified in /etc/group.
administrators
It must be a comma-separated list of user names.
Administrators can change the password or the members of the group.
Administrators also have the same permissions as the members (see below).
members
It must be a comma-separated list of user names.
Members can access the group without being prompted for a password.
You should use the same list of users as in /etc/group.
FILES
/etc/group
Group account information.
/etc/gshadow
Secure group account information.
SEE ALSO
gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1).
shadow-utils 4.1.5.1 05/25/2012 GSHADOW(5)