11-08-2016
there is no /etc/ auth.log. so all I get is Windows Auditing which shows cyg_server failed.. doesnt really tell me who...
Do I need to touch it??
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have a SCO R5 Open Server Box running at a remote location, and from time to time it seems to "spontaneously" re-boot itself. Is there a specific log file that I can examine to see why the machine is doing this ? Any suggestions gratefully appreciated (1 Reply)
Discussion started by: pcs7088
1 Replies
2. Shell Programming and Scripting
G'day
Just wondering if anyone out there knows how to log files, using the example I provided in the earlier message / question earlier today:
:confused:
If I was to backup a file, how could I setup a log file to record the filename, date (This one I've got figured), and that the file was... (4 Replies)
Discussion started by: Aussie_Bloke
4 Replies
3. Cybersecurity
is there a log/ how do i make a log that logs every packet inbound or outbound through my server?
I want every packet or packet fragment to be logged that comes to my server. (5 Replies)
Discussion started by: The Fridgerator
5 Replies
4. UNIX for Dummies Questions & Answers
Is there a file that captures info whenever someone logs to su? i know it comes across as standard output on the server, but is it saved anywhere? Time and date info included??
thanks, kym (1 Reply)
Discussion started by: kymberm
1 Replies
5. UNIX for Dummies Questions & Answers
Hi, just wriiten a sh script and as my script will try to log into another server to delete some files but when i run , it keeps on saying that my files do not exist. It seems to refer to my local directory instead. Below is my script :
FTP_HOST=ip_number
FTP_USER="user password"
... (1 Reply)
Discussion started by: blueberry80
1 Replies
6. UNIX for Dummies Questions & Answers
Hi all!
On our current Solaris 8 machine we only have "standard" logging configured, and now i need to put on more. What i specificly need is time in the logfiles. Ex. When a user is logging in,
when a user makes it self SU. etc.
Regards...
dOzY (3 Replies)
Discussion started by: dozy
3 Replies
7. Programming
Hi
How to manage logging in an application.
Actually I am developing a Client-Server application in c/c++ and want to manage an optional logging in my application, but since prior I have never done ths activity.
Plz guide me.
thanks. (2 Replies)
Discussion started by: sumsin
2 Replies
8. Post Here to Contact Site Administrators and Moderators
Hi Everyone. First, I want to thank all of you for letting me participate in this great group.
I am having a bit of a problem.
After I get an email from a responder, I login to make my reply.
In the mean time I get another response by email from another member, I go to reply to them and I... (6 Replies)
Discussion started by: Ccccc
6 Replies
9. Linux
When unlocking a Linux server's console there's no event indicating successful logging
Is there a way I can fix this ?
I have the following in my rsyslog.conf
auth.info /var/log/secure
authpriv.info /var/log/secure (1 Reply)
Discussion started by: walterthered
1 Replies
10. Windows & DOS: Issues & Discussions
I've installed cygwin_openssh on Windows 2012 R2 and it's working great. My issue is when a file is uploaded say from a different timezone, when it is uploaded, it doesnt pick up the sftp servers time.. Is there a way to fix that?
i.e. When someone in PST uploads a file to this server in EST,... (0 Replies)
Discussion started by: MikeAdkins
0 Replies
LEARN ABOUT OSF1
cfgmgr.auth
cfgmgr.auth(4) Kernel Interfaces Manual cfgmgr.auth(4)
NAME
cfgmgr.auth - Configuration management server authorization database
SYNOPSIS
/etc/cfgmgr.auth
DESCRIPTION
The cfgmgr.auth file lists the remote systems that are authorized to modify the local system's kernel subsystem configuration. Using the
sysconfig command, system administrators can maintain the kernel subsystem configuration on local and remote hosts. To secure access to
the kernel subsystem configuration, the local configuration management server (cfgmgr) answers requests from remote systems only when the
remote system is listed in the cfgmgr.auth file.
Each entry in the file has the following form:
host-name
Where host-name specifies the full domain name of the remote host. You must list each remote host on a separate line and only the first
128 characters of each line are read and processed. Lines beginning with the pound sign (#) are comments.
If the cfgmgr.auth file does not exist, the configuration management server assumes no remote system administrators are allowed to config-
ure, reconfigure, or unconfigure any kernel subsystem on the local host.
EXAMPLES
The following shows entries in the cfgmgr.auth file on a host named buster:
salmon.zk3.dec.com
trout.zk3.dec.com
bluefish.zk3.dec.com
This cfgmgr.auth file allows system administrators on the salmon, trout, and bluefish hosts to configure, reconfigure, and unconfigure sub-
systems on buster.
RELATED INFORMATION
Commands: cfgmgr(8), sysconfig(8), sysconfigdb(8), kloadsrv(8)
Files: /etc/sysconfigtab(4)
System Administration delim off
cfgmgr.auth(4)