01-09-2017
Probably that you login as an administrator of some sort to do this, perhaps root, though I think Solaris allows more finely controlled roles than "ordinary user" and "root".
These 2 Users Gave Thanks to Corona688 For This Post:
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Good Morning People,
I wanted to help on users we have that apparently on their desktop their word wrap is automatic. I have looked on their openwin-menu and haven't found anything with word wrap. Would anybody know where to look to change a user's word wrap capability?
Let me know, any... (0 Replies)
Discussion started by: Sarccastik Dude
0 Replies
2. UNIX for Advanced & Expert Users
I have a problem with solaris 10 desktop resolution.
My resolution is 1680x1050.
I want to boot in troubleshooting mode to change this resolution for the root user. Or all users. What is the configuration script.
ex: .dtconfig/Xconfig (3 Replies)
Discussion started by: simquest
3 Replies
3. Cybersecurity
Hello,
I´m searching a antivirus solution for Solaris Desktop
PC´s (Intel).
Can anyone tell me more about some producer??
Thanks
Volker (6 Replies)
Discussion started by: kingossi
6 Replies
4. Programming
Hi! everyone
I need to install petsc with MPI on my desktop.
I followed the instructions of petsc home page. But, whenever I ran make, I saw messabe "error", also I can't work for complie and execution.
Install cygwin.
download petsc-2.3.3.-p15.tar.gz
cd /home/myhome/soft... (0 Replies)
Discussion started by: kdh1971
0 Replies
5. BSD
;)Hello everyone,I'm a new FreeBSD user,I don't know how to intall the BSD on desktop,please help me ~~ Thanks~~:D (11 Replies)
Discussion started by: johnney
11 Replies
6. Red Hat
I want to install Red Hat Linux Desktop version 4. Please tell me the step-by-step installation and which file system will be best for this O/S?
Like in windows, we have NTFS file system(which has very security features).
Is there any such file system in Linux?
Which file system should i use? (2 Replies)
Discussion started by: Anna Hussie
2 Replies
7. Red Hat
I want to install Red Hat Linux Desktop version 4. Please tell me the step-by-step installation and which file system will be best for this O/S?
Like in windows, we have NTFS file system(which has very security features).
Is there any such file system in Linux?
Which file system should i use?... (0 Replies)
Discussion started by: Anna Hussie
0 Replies
8. Solaris
I am trying to build a Sun Ultra 10 with solaris 10. This computer is one of a collection that was donated to the non-profic company I work for. All media was wiped before I recieved them, so I am starting from stratch.
I downloaded the Solaris 10 ISO and burned a DVD. The computer came with a... (4 Replies)
Discussion started by: gwillhight
4 Replies
9. HP-UX
Hi, I have a HP UX C8000 box , have installed 11.11i from 4 x cds numerous times to try to get a functioning Network or to try and get rid of this error on start up, after new install and 1st startup I get an error
"The desktop messaging system could not be started" and then advice about... (12 Replies)
Discussion started by: C8000
12 Replies
roles(1) User Commands roles(1)
NAME
roles - print roles granted to a user
SYNOPSIS
roles [ user ...]
DESCRIPTION
The command roles prints on standard output the roles that you or the optionally-specified user have been granted. Roles are special
accounts that correspond to a functional responsibility rather than to an actual person (referred to as a normal user).
Each user may have zero or more roles. Roles have most of the attributes of normal users and are identified like normal users in passwd(4)
and shadow(4). Each role must have an entry in the user_attr(4) file that identifies it as a role. Roles can have their own authorizations
and profiles. See auths(1) and profiles(1).
Roles are not allowed to log into a system as a primary user. Instead, a user must log in as him-- or herself and assume the role. The
actions of a role are attributable to the normal user. When auditing is enabled, the audited events of the role contain the audit ID of the
original user who assumed the role.
A role may not assume itself or any other role. Roles are not hierarchical. However, rights profiles (see prof_attr(4)) are hierarchical
and can be used to achieve the same effect as hierarchical roles.
Roles must have valid passwords and one of the shells that interprets profiles: either pfcsh, pfksh, or pfsh. See pfexec(1).
Role assumption may be performed using su(1M), rlogin(1), or some other service that supports the PAM_RUSER variable. Successful assumption
requires knowledge of the role's password and membership in the role. Role assignments are specified in user_attr(4).
EXAMPLES
Example 1: Sample output
The output of the roles command has the following form:
example% roles tester01 tester02
tester01 : admin
tester02 : secadmin, root
example%
EXIT STATUS
The following exit values are returned:
0 Successful completion.
1 An error occurred.
FILES
/etc/user_attr
/etc/security/auth_attr
/etc/security/prof_attr
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
SEE ALSO
auths(1), pfexec(1), profiles(1), rlogin(1), su(1M), getauusernam(3BSM), auth_attr(4), passwd(4), prof_attr(4), shadow(4), user_attr(4),
attributes(5)
SunOS 5.10 14 Feb 2001 roles(1)