Sponsored Content
Operating Systems AIX To find the user who has created the file Post 302955420 by MichaelFelt on Thursday 17th of September 2015 07:46:31 AM
Old 09-17-2015
Another way would be to use RBAC - because then you get additional privileges, but you do not change your userid.
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

I want to get the file which created the error when the find command was run

I want to get the file which created the error when the find command was run ? I am wrote a script to mail a list of files whose file size is ge than 0 and returns 0 but wen it finds a folder with only empty files it exits as 1. i need to modify it so that the return for this is also 0 (but it... (1 Reply)
Discussion started by: guhas
1 Replies

2. Shell Programming and Scripting

Need to find created date of file in UNIX

I need to write a script which has to list all the files which are created before six months from now. kindly help on this ... (7 Replies)
Discussion started by: amirthraj_12
7 Replies

3. UNIX for Dummies Questions & Answers

Find all files created by a specified user in a directory and its subdirectories

Is there a command or shell script which can be used for Finding all files created by a specified userid in a directory and its subdirectories. Say, I want to find all such files in directory /abc as well as in all the subdirectories such as /abc/xyz or /abc/xyz/pqr aqnd so on which was created... (5 Replies)
Discussion started by: abhilashnair
5 Replies

4. Shell Programming and Scripting

How remove the file which was created by another user?

When I try to remove the file which was created by another user through super user, I am getting the "override protection 644 " meesage. Could you please anyone help me how will I delete the file without prmpting the override protection. I have also given the permission (rwx) to the group as... (3 Replies)
Discussion started by: kandi.reddy
3 Replies

5. Shell Programming and Scripting

Find first created file date in YYYYMMDD format

Hi All, We are copying all the files into ARCHIVE directory after we process them. We are doing this process from last 2 years, now we have a lot of files in ARCHIVE directory. Now I need to find when the first file is copied into this directory? If I Issue, ls -l /ARCHIVE/*.* | tail -1... (3 Replies)
Discussion started by: Raamc
3 Replies

6. UNIX for Dummies Questions & Answers

How to find out when a file was created?

Hi All I use solaris 9 and just realised my opt volume has grown to 99%. How can I find out which file was created on the opt volume for it to have grown to 99%? Which command should I use since I can't go through each individual file to look at the date the files were created. Regard (3 Replies)
Discussion started by: rahmantanko
3 Replies

7. Shell Programming and Scripting

Changing file permissions of a file created by another user

Hi, I have used expdp for datapump. The .dmp file is created by the "oracle" user. my requirement is to make a zipped file of this .dmp file. What i am trying to do is change the permissions of this .dmp file from 0640 to 0644 and then do a gzip and zip it. Is there any way i can change... (3 Replies)
Discussion started by: qwertyu
3 Replies

8. HP-UX

How to find a file created in UNIX every monday.???

Hi All Any one please suggest me... I have one directory every monday one file will be created in that directory. so if the file is created on monday or not i need check first. How can write a script??? if the file is not created i want to quit from script. Thanks K.Srinivas (5 Replies)
Discussion started by: k_s_rao7
5 Replies

9. Shell Programming and Scripting

Find the file created on current date

Hi All, I'm trying to find a file which is created on current day.... I searched in unix.com and i found, below command. find /land/ -mtime -1 -type f -print | grep "FF_Member_STG.dat" The command checks if the file with name "FF_Member_STG.dat" is created today then exit else proceed. ... (3 Replies)
Discussion started by: ace_friends22
3 Replies

10. Shell Programming and Scripting

How I can find the last file created and move it to a directory?

I have this situation /u03/app/banjobs> ls -ltr icg* 82 Jun 12 10:37 iicgorldi_2419186.log 56810484 Jun 17 10:35 icgorldi_2421592.xml 2859 Jun 17 10:35 icgorldi_2421592.lis - 125 Jun 17 10:35 icgorldi_2421592.log 82 Jun 12 10:37 iicgorldi_2419187.log ... (8 Replies)
Discussion started by: Bernardo Jarami
8 Replies
authadm(1M)															       authadm(1M)

NAME
authadm - non-interactive command for administrating the authorization information in the RBAC databases SYNOPSIS
[object [comments]] [object] operation [object] subrole DESCRIPTION
is a non-interactive command that allows users with the appropriate privileges to modify and list authorization information in the and RBAC databases files. HP recommends using only the and commands to edit and view the RBAC databases -- do not edit the RBAC files without these commands. See rbac(5) for more information on these RBAC databases. Options With the exception of the option, all options recognize a default object. If the parameter is specified with a non-empty value in the security default file, then the value of this parameter will be the default object. However, if the parameter does not exist or is set to an empty value, then the default object will be set to a wild card (*). Here is how to specify a value to the parameter in For example: In sets the default object to If line is not present or is commented out, then the default object will be set to "*". recognizes the following options: Adds an authorization pair (operation, object) to the system list of valid authorizations by appending a line to the file. If object is not specified, then a default object will be assigned. The default object will either be a wild card (*) or the object specified in the security default configuration file, A comment may not be specified when adding an entry that refers to the default object in The only way to add a comment to an entry with the option is to specify the object explicitly. Deletes an authorization from the system list of valid authorizations. If object is not specified, then a default object will be assumed. The default object will either be a wild card (*) or the object specified in the security default configuration file, If the authorization exists in deletes the entry. If the specified authorization is assigned to any roles in will remove the autho- rization from the role. If the specified authorization exists in an entry in will remove the entire entry. If the authorization does not exist in returns an error message. See the section below for more information. Assigns an authorization pair to a role. verifies the role exists in before verifying the authorization pair exists in appends the authorization to the role to authorization mapping in if the role and authorization pair exists. If object is not specified, then a default object will be assigned. The default object will either be a wild card (*) or the object specified in the security default configuration file, Assigns a role to another different role. The role being assigned to the other different role is referred to as a A subrole is any valid role defined in the database. The option allows hierarchical role definition (one role can inherit other subrole). After assigning a subrole to another role, that role will also have all the authorizations of the subrole, and any of its subroles. More than one subrole can be assigned to other different role. verifies the role and subrole exist in It also verifies that there is no recursive definitions of the role and subrole. (If "role1" has a subrole of "role2", and if you try to "role1" to "role2", this will cause a recursive definition of both "role1" and "role2"). appends the subrole to the role to authorization mapping in Revokes an authorization from the specified role in If no authorization is specified, revokes all the authorizations for the given role. If object is not specified, then a default object will be assumed. The default object will either be a wild card (*) or the object specified in the security default configuration file, The file will be modified by the command. Revokes a subrole from the specified role in Note that the role specified as the subrole is not revoked from the database, just the subrole assignment is revoked. For instance, if these entries are in the database: will modify the line to: revokes specified the authorizations and/or subrole for the given role. Note: The file will be modified by the command. Invoking the list command without any parameters lists every entry in Specifying a role name lists all the authorizations and sub- roles assigned to that role name. Specifying an operation name lists all the roles witch have that operation name. Specifying a subrole name lists all the roles which have that subrole name. Specifying lists all the authorizations in the database. Authorizations In order to invoke the user must either be root, (running with effective uid of 0), or have the appropriate authorization(s). The follow- ing is a list of the required authorizations for running with particular options: Allows user to run with option. Allows user to run option. Allows user to run with or option. Allows user to run with or option. Allows user to run with option. EXTERNAL INFLUENCES
Environment Variables determines the language in which messages are displayed. International Code Set Support Single-byte character code set is supported. RETURN VALUE
Success. If is successful, it returns Failure. returns and prints an appropriate error message to stderr. EXAMPLES
The following commands each add an authorization (operation, object) entry in the database file: The following commands each delete an authorization (operation, object) entry from the database file: The following commands each assign an authorization (operation, object) pair to a role in database file: The following commands each assign a subrole to a role in database file: The following commands each revokes an operation for the specified operation from a role in the file: The following commands each revokes a subrole from the specified role in the database file: The following command lists all the authorizations for the role: The following command lists all the entries with operation The following command lists all the entries with object The following command lists all the roles with their authorizations in database: FILES
Database containing valid definitions of all roles. Database containing definitions of all valid authorizations. Database specifying the roles allowed for each specified user. Database defining the authorizations for each specified role. SEE ALSO
cmdprivadm(1M), privrun(1M), rbacdbchk(1M), roleadm(1M), rbac(5). authadm(1M)
All times are GMT -4. The time now is 03:38 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy