Sponsored Content
Operating Systems AIX Do not allow bypassing users .profile Post 302937350 by rbatte1 on Thursday 5th of March 2015 07:01:15 AM
Old 03-05-2015
Three things I have learned by painful experience:-
  • Try to close security holes and some users will always try to find a way around it. Best to give no access except what is needed.
  • Try to make an application easy to use and someone will be unable. There are no limits to stupidity.
  • Give users the ability to do something dangerous by mistake and eventually one of them will.
    So, yes we had a function to delete old data and eventually someone ran it from the top level of the database schema.
The list goes on, but these are applicable to your concerns.



Robin
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

users with same .profile

guys i have a unix user (say "x") which is also an application owner ..thru this user i manage most (90 %) of my tasks related to application i.e application down/up,processes stop/start etc..in short i manage my "tuxedo" via this user.. now i want a new user to be created (on my name) which... (7 Replies)
Discussion started by: abhijeetkul
7 Replies

2. AIX

"ksh -" as login shell bypassing .profile

Hi all, I am currently trying to tell /bin/ksh to behave like a login shell. I am invoking it from an interactive shell. In the documentation is stated, that calling it with exec ksh - it should behave like a login shell, work 1st on /etc/profile, ~/.profile and so on. I tried that with... (0 Replies)
Discussion started by: zaxxon
0 Replies

3. UNIX for Advanced & Expert Users

How can I get sudo -u <username> to load that users profile on HP-UX

I am running a serverapplication on a HP-UX machine where I need to handle some of the commands as a specified user called "druser". When I log on as this user with the command; sudo -u druser -sit starts an instance of the shell as that user. However, it doesn't load that users .profile from... (1 Reply)
Discussion started by: ukiome
1 Replies

4. AIX

SSH and a users .profile

How do I get a command like "ssh Theuser@host date" to execute the /home/Theuser/.profile before executing the "date" command? (5 Replies)
Discussion started by: IL-Malti
5 Replies

5. Shell Programming and Scripting

sourcing .profile for other users

Hi Team, Thank you for your time. i have a situation where the user IDs of the applicatio users have been locked down to Read only. Hence I am writing a script to invoke their old .profile every time they login. My problem is : when i run . $userpath/.profile from within the ksh script... (9 Replies)
Discussion started by: anitha111
9 Replies

6. UNIX for Advanced & Expert Users

Bypassing blocking of websites...

So my workplace uses websense to block certain websites. I read while researching firesheep, that you can somehow bypass that by creating a proxy, and thus: #1 protect yourself from people using firesheep (if using unsecure hot-spot) and #2 or visit un-approved websites at work. I... (1 Reply)
Discussion started by: zixzix01
1 Replies

7. Shell Programming and Scripting

Users who desire to have their .profile executed must explicitly do so in the crontab entry. Why?

The .profile file should be read when the user logs in. So, there should be no need to execute .profile file again in a cron job (since the cron job is run after the user logs in). Doesn't the cron require login from the user. Then, from where does the cron execute? Please help!! (1 Reply)
Discussion started by: thulasidharan2k
1 Replies

8. IP Networking

Bypassing My Company Firewall!

Hi! My organization has put a Firewall which eat up a lot of important data access. So I came to know about SSH Tunneling to bypass the Firewall. I will have to setup a free access SSH server to tunnel data access through PUTTY or OpenSSH. The problem is that I don't know about any free... (1 Reply)
Discussion started by: nixhead
1 Replies

9. Solaris

Remove a given profile from a users account

Hi Guys, I was studying RBAC and I gave a profile to a user . I have not seen anywhere that shows how to remove the profile from the users account. Can anyone show me how to remove a given profile from a users account? Thanks alot guys. (2 Replies)
Discussion started by: cjashu
2 Replies

10. HP-UX

Create a new user from using existing users profile

Hello, Just wanting to know if it is possible. Also I am new to command line. I am running 5.1b, if that matters. Thanks in advance (10 Replies)
Discussion started by: bcha
10 Replies
eurephiadm adminaccess(7)												 eurephiadm adminaccess(7)

NAME
eurephiadm-adminaccess - Access control for eurephia administration features DESCRIPTION
The eurephiadm adminaccess is used to grant eurephia users access to the different administration modules in eurephia. Available modes for the adminaccess command are: -G | --grant Grant a specific access level to a user -R | --revoke Revoke access levels -l | --list List all granted accesses -h | --help <mode> Help about a specific mode LIST MODE
The list mode will show the granted user access levels -i | --uid User account ID -u | --username User name -I | --interface Which interfaces to show (default "C") -a | --access-level Which access level to show GRANT MODE
The grant mode will grant a user access to a specified access level. -i | --uid User account ID -I | --interface Grant access through which interface (default "C") -a | --access-level Which access level to grant access to REVOKE MODE
The revoke mode will remove an access from the desired user accounts. -i | --uid User account ID -I | --interface Revoke access from interface (default "C") -a | --access-level Which access level to revoke access from ACCESS LEVELS
attempts This access level grants access to the eurephiadm attempts command. The attempts command can list, reset or delete login attempts records in the database. blacklist This is similar to the attempts access. It provides access to the eurphiadm blacklist command, where you can list, add or delete blacklisted usernames, certificate digests or IP addresses. certadmin This level is needed to use the eurephiadm certs command. This commands provides you access to list, add or delete certificate information which the eurephia plug-in will use during the authentication process. config This level grants access to the eurephiadm config and eurephiadm show-config commands. The latter command will list out both the eurephiadm config file and all configuration parameters in the database. The config command is used to set or delete configuration parameters in the database. fwprofiles This access level is needed to list, add or delete firewall profiles eurephia which may use. useradmin This provides access to the eurephiadm users and eurephiadm usercerts commands, which is used to create or delete user accounts and link the user accounts together with a certificate and a firewall access profile. SEE ALSO
eurephiadm(7) AUTHOR
Copyright (C) 2008-2010 David Sommerseth <dazo@users.sourceforge.net> David Sommerseth July 2010 eurephiadm adminaccess(7)
All times are GMT -4. The time now is 05:10 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy