03-10-2016
Role based access and security
Hello,
We are planning to setup a Role based access and security to our Linux servers. We can use mostly use sudo for providing the limited access to service and files.
My query is that how can we manage that members can edit/access only specific files (it would be 1 or multiple files or placed on multi location), This seems to be very hectic if can manage from sudo to add all the entries there.
Can you please let me know the better solution for this as we have a sub teams and that team would have multiple members working for various areas.
Is ACL would be a better option somehow ?
6 More Discussions You Might Find Interesting
1. Solaris
Hi,
The security auditor give a this statement , what to do ?
On my solaris system (S10)
"The User ID "root" should not be used on the system - the su and
the priviledged account should be used from each administrator for
accountability purposes"
What to do ? (3 Replies)
Discussion started by: falcon16
3 Replies
2. SuSE
Guys
i have 2 SUSE Linux Enterprise Server 10 SP1 (i586) boxes.if i take a look into /etc/security/access.conf ,i see following lines at the eof
# All other users should be denied to get access from all sources.
#- : ALL : ALL
- : myID : ALL
now earlier i had written scripts where files... (1 Reply)
Discussion started by: ak835
1 Replies
3. AIX
Hi ..
I need to assign role based permission to users... How to assign role based permission in aix...
Thanks.. (4 Replies)
Discussion started by: sumathi.k
4 Replies
4. Linux
Hi guys ;)
I'm new here. I had been reading a long time here on the forums but now I registered finally.
And got a question for you.
Since yesterday I've got successfully installed a X11-connection from my WinXP to a RedHat EL 5 - Box. Now there's a web portal needed.
So I have to make a... (2 Replies)
Discussion started by: supermaRiio
2 Replies
5. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
If you look at the permissions associated with a symbolic link, it has universal access. Does this lead to... (0 Replies)
Discussion started by: linux17
0 Replies
6. Red Hat
Hi, I'm pretty new to Linux and I want to download security patches and install them on RHEL 5.4.
I've searched the red hat web site but cant seem to find where the download link is. (5 Replies)
Discussion started by: Jardoo
5 Replies
LEARN ABOUT REDHAT
pam_stack
pam_stack(8) System Administrator's Manual pam_stack(8)
NAME
pam_stack - recurse into other PAM stacks
SYNOPSIS
auth required /lib/security/pam_stack.so service=foo
session optional /lib/security/pam_stack.so service=foo
password optional /lib/security/pam_stack.so service=foo
account optional /lib/security/pam_stack.so service=foo
DESCRIPTION
In a nutshell, pam_stack lets you "call", from inside of the stack for a particular service, the stack defined for any another service.
The intention is to allow multiple services to "include" a system-wide setup, so that when that setup needs to be changed, it need only be
changed in one place.
ARGUMENTS
debug turns on debugging via syslog(3).
service=name
tells pam_stack.so to execute the stack defined for the service name, which will usually be another file in /etc/pam.d.
EXAMPLE
/etc/pam.d/imap:
auth required /lib/security/pam_stack.so service=system-auth
auth required /lib/security/pam_shells.so
/etc/pam.d/system-auth:
auth sufficient /lib/security/pam_krb5.so
auth sufficient /lib/security/pam_unix.so shadow nullok
auth required /lib/security/pam_deny.so
CAVEAT
Because recursion is fully supported, there is potential to really break things by having a stack call itself either directly or via mutual
recursion.
BUGS
Let's hope not, but if you find any, please email the author.
AUTHOR
Nalin Dahyabhai <nalin@redhat.com>
Red Hat Linux 2001/01/30 pam_stack(8)