Sponsored Content
Operating Systems AIX Procedure to restrict direct access as root Post 302975514 by dio34 on Tuesday 14th of June 2016 04:00:34 PM
Old 06-14-2016
Thanks for the response. I've tried it, worked. can only accessed from HMC. But I wanted to check If i missed anything, just in case. Thank you.
 

10 More Discussions You Might Find Interesting

1. Programming

Direct disk access

Is there any way to write to disk sector by sector, without any files, filesystems etc. I did that in DOS, but that was DOS. (3 Replies)
Discussion started by: Lopatonosec
3 Replies

2. Linux

ssh - disable direct root login

Hi Guys.... I am a newbie to unix. I have a requirement. I have a server. I have to configure ssh to disable direct root login and then add a user with sudo access to this server.Then change the ssh port to 22315 and the server should permit the ssh only from my local machine ip.I also have to... (1 Reply)
Discussion started by: mahesh_raghu
1 Replies

3. Solaris

Direct/scsu access to unix account

Hey Is there any way to differentiate if a user is logged directly into a UNIX functional account or if they have scsu'ed into the functional account? Cheers Paul (2 Replies)
Discussion started by: runnerpaul
2 Replies

4. Linux

Restrict NFS access to root

Hi Everybody, If there is a general NFS share in the LAN and for example this share has three files - a, b, c is there any way to restrict file access to the root user of one particular host(falcon) in the same LAN environment while the normal users from the same host(falcon) should be able... (4 Replies)
Discussion started by: sudhirav
4 Replies

5. UNIX for Dummies Questions & Answers

Restrict user access.

Hi All, How can we restrict a particular user access to a particular shell in solaris 10. Thanks in Advance. (5 Replies)
Discussion started by: rama krishna
5 Replies

6. Red Hat

Restrict user access

Hi there I have an application user on my system that wants accesses to these file systems as such: rwx: /SAPO /SAPS12 /R3_888 /R3_888B /R3_888F /R3_888R r: /usr/sap these are the existing FS permissions:ownerships: # ls -ld /SAPO (9 Replies)
Discussion started by: hedkandi
9 Replies

7. Ubuntu

Restrict SUDO Access

Linux ubuntu 3.0.0-12-generic #20-Ubuntu SMP Fri Oct 7 14:56:25 UTC 2011 x86_64 x86_64 x86_64 GNU/Linux Hi Folks, Please help me. I am bit struck here. Here is the OS info. Linux ubuntu 3.0.0-12-generic #20-Ubuntu SMP Fri Oct 7 14:56:25 UTC 2011 x86_64 x86_64 x86_64 GNU/Linux I have a... (17 Replies)
Discussion started by: explorer007
17 Replies

8. UNIX for Dummies Questions & Answers

Restrict access

I'm trying to use squid to restrict elinks' access to certain websites(only http traffic). I have tried some configs in squid.conf but no luck. Hope someone has a bit of time to explain me how can you make these config's :) ---------- Post updated at 05:40 PM ---------- Previous update was at... (1 Reply)
Discussion started by: Birnbacher
1 Replies

9. AIX

Disabling SSH direct access for an AIX user

Hello everyone, Can anyone help me please. I want to disable SSH direct access for an AIX user. For example, if I have USER1 and USER2. I want to disactivate direct access for USER2. The user must enter his login (USER1) and his password and then he can do su - USER2 . Thanks, (3 Replies)
Discussion started by: adilyos
3 Replies

10. UNIX for Advanced & Expert Users

Restrict service account from direct interactive sessions

Environment: CentOS 7 I would like to have a solution where a service account can access a server in only these ways: ssh non-interactively via password or ssh key; that is, run commands or scripts (but running anything in /etc/shells will not be allowed) not ssh interactively regular... (2 Replies)
Discussion started by: bgstack15
2 Replies
Ns_ConnReturnStatus(3aolserver) 			   AOLserver Library Procedures 			   Ns_ConnReturnStatus(3aolserver)

__________________________________________________________________________________________________________________________________________________

NAME
Ns_ConnReturnBadRequest, Ns_ConnReturnForbidden, Ns_ConnReturnInternalError, Ns_ConnReturnNoResponse, Ns_ConnReturnNotFound, Ns_ConnReturn- NotImplemented, Ns_ConnReturnNotModified, Ns_ConnReturnOk, Ns_ConnReturnStatus, Ns_ConnReturnUnauthorized, Ns_RegisterRedirect - Routines to return simple standard responses SYNOPSIS
#include "ns.h" int Ns_ConnReturnBadRequest(conn, msg) int Ns_ConnReturnForbidden(conn) int Ns_ConnReturnInternalError(conn) int Ns_ConnReturnNoResponse(conn) int Ns_ConnReturnNotFound(conn) int Ns_ConnReturnNotImplemented(conn) int Ns_ConnReturnNotModified(conn) int Ns_ConnReturnOk(conn) int Ns_ConnReturnStatus(conn, status) int Ns_ConnReturnUnauthorized(conn) void Ns_RegisterRedirect(server, status, url) ARGUMENTS
Ns_Conn conn (in) Pointer to open connection. char *msg (in) String with additional message text. int status (in) Integer HTTP status code. char *url (in) String which specifies internal redirection url. char *server(in) Virtual server. _________________________________________________________________ DESCRIPTION
These routines are used to generate complete responses, including headers, approriate status codes, content types, and possibly short HTML content messages for the most common HTTP error or status responses. They each coorespond to a particular HTTP status code, for example, Ns_ConnReturnNotFound generates an HTTP 404 "Not Found" response. They all return NS_OK if the response was sent or NS_ERROR if an under- lying routine failed. The default behavior is to return an internal, server generated response possibly with a short English language message, for example "The requested URL cannot be accessed by this server". This behavior can be modified by calling the Ns_RegisterRedirect to redirect responses internally for the cooresponding HTTP status code to another URL on the server. The "redirects" server config section can be used to map these redirects at startup int Ns_ConnReturnBadRequest(conn, msg) Returns an HTTP 400 response with the short HTML message "Invalid Request: The HTTP request presented by your browser is invalid." The optional msg string, if present, is also included in the message body. int Ns_ConnReturnForbidden(conn) Returns an HTTP 403 response with the short HTML message "Forbidden: The requested URL cannot be accessed by this server." int Ns_ConnReturnInternalError(conn) Returns an HTTP 500 response with the short HTML message "Server Error: The requested URL cannot be accessed due to a system error on this server." int Ns_ConnReturnNoResponse(conn) Equivalent to Ns_ConnReturnStatus(conn, 204). int Ns_ConnReturnNotFound(conn) Returns an HTTP 404 response with the short HTML message "Not Found: The requested URL was not found on this server." int Ns_ConnReturnNotImplemented(conn) Returns an HTTP 404 response with the short HTML message "Not Implemented: The requested URL or method is not implemented by this server." int Ns_ConnReturnNotModified(conn) Equivalent to Ns_ConnReturnStatus(conn, 304). int Ns_ConnReturnOk(conn) Equivalent to Ns_ConnReturnStatus(conn, 200). int Ns_ConnReturnStatus(conn, status) Generates a response with the given HTTP status with no content. int Ns_ConnReturnUnauthorized(conn) Returns an HTTP 401 response with the short HTML message "Access Denied: The requested URL cannot be accessed because a valid user- name and password are required." As "WWW-Authenticate: Basic realm=server realm" header is also included in the response. void Ns_RegisterRedirect(server, status, url) Redirect the above responses from the given server for the given status code from the simple internal messages described above to the given internal url. The redirect is performed using Ns_ConnRedirect. SEE ALSO
Ns_ConnFlush(3), Ns_ConnRedirect(3), Ns_ConnSetRequiredHeaders(3), Ns_ConnQueueHeaders(3), ns_return(n) KEYWORDS
connnection, response AOLserver 4.0 Ns_ConnReturnStatus(3aolserver)
All times are GMT -4. The time now is 11:07 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy