Off the top of mu head, this seems contradictory. If you have read, write, and execute on any file, that means new user creation is possible. If you employ ACL's and block this special user from accessing files then what happens when the user employs setfacl (or whatever tool) to undo your change to the ACL?
Absolutely! If someone is allowed to do "everything" then everything it is - no less!
I remember a former customer took away root privileges for a certain system from us system administrators but because we were still supposed to edit a certain file owned by root (!) they created a sudo rule for us:
They wondered why we still became root whenever we needed to and probably still are wondering, LOL!
Quote:
Originally Posted by jim mcnamara
Note: Linux system roles are beginning to receive support, I think the concept was demonstrated well in Solaris 10. I do not know how robust the support of roles using Ansible is in your version of RH.
I don't know Solaris too well but RBAC (Role Based Access Control) is available in AIX for about 10-15 years. I would strongly prefer jumping out of the next available window to using it, though. It makes the administration of a system practically impossible (yes, i know all the "but"s - i still stand by what i said). My advice: stay away as far as you can. If you can't do it with standard UNIX privileges it isn't worth doing and/or your model is plain wrong.
I need to set up/modify a user account on one of our machines which will allow the user to stay on the system, but not use their user id and password to login to the machine. It is for the purposes of an ftp user, so that nobody can then login as ftp/passwd. Ta.:) (2 Replies)
Hi all,
I am a newbe to aix 5.2. I want to specify the characters used by users while creating user in aix like specifying the length of the password
should i use some sript for that if it is then please let me know how to do this
if yes give me the link for the scripts.
Thanks in advance
... (2 Replies)
I created a user, i login as a root. I add him in the group where he can access and login as a root! I checked it in users' list and in group's list, he is there. My problem is this, I cant login using the username/account I just created! What should i do to use and login the user/account i've just... (5 Replies)
Hi,
My requirement is that i am login from ROOT in a script but when any
command is coming which is logging to sqlplus then i have to run it with normal user as only normal user have permission to connect to sqlplus .
i tried making a script like this :
#! /bin/ksh
su -... (3 Replies)
hi all,
i want to prevent users downloading files in the office as bandwidth becomes very low
and affects work.
one of my friend tried to close the connection using ethercap but this does not work.
i have a debian desktop while other users use MS W!ndows.
Please provide any help. Thanks (5 Replies)
Hi Every body,
I would need a shell script program to login as different user and perform some copy commands in the script.
example: Supppose ora_toms is the active user
ora_toms should be able to run a script where user: ftptomsp pass: XXX should login through and run the commands
... (9 Replies)
now i have logged in username : ramesh in unix
Now i have to created script file to login into another user and have run a command inside that user and after executing the command i have to exit from that user.
Inside script, i have to login into su - ram along with password : haihow and have to... (4 Replies)
Hi could some let me know how to prevent user from changing his home directory.......
Thanks in advance.... (6 Replies)
Discussion started by: rahul547
6 Replies
LEARN ABOUT SUSE
chsh
chsh(1) General Commands Manual chsh(1)NAME
chsh - change login shell
SYNOPSIS
chsh [-D binddn] [-P path] [-s shell] [-l] [-q] [-u] [-v] [user]
DESCRIPTION
chsh is used to change the user login shell. A normal user may only change the login shell for their own account, the super user may
change the login shell for any account.
If a shell is not given on the command line, chsh operates in an interactive fashion, prompting the user with the current login shell.
Enter the new value to change the field, or leave the line blank to use the current value. Enter none to remove the current value. The
current value is displayed between a pair of [ ] marks.
The only restrictions placed on the login shell is that the command name must be listed in /etc/shells, unless the invoker is the super-
user, and then any value may be added. An account with a restricted login shell may not change their login shell.
This version of chsh is able to change the shell of local, NIS, NIS+ and LDAP accounts , if the permissions allow it.
OPTIONS -D, --binddn binddn
Use the Distinguished Name binddn to bind to the LDAP directory. The user will be prompted for a password for simple authentica-
tion.
-P, --path path
The passwd file is located below the specified directory path. chsh will use this files, not /etc/passwd. This is useful for exam-
ple on NIS master servers, where you do not want to give all users in the NIS database automatic access to your NIS server and the
NIS map is build from special files.
-s, --shell
Specify your login shell.
-l, --list-shells
Print the list of shells listed in /etc/shells and exit.
-q, --quite
Don't be verbose.
-u, --usage
Print a usage message and exit.
--help
Print a more verbose help text and exit.
-v, --version
Print version information and exit.
FILES
/etc/passwd - user account information
/etc/shells - list of valid login shells
SEE ALSO chfn(1), passwd(5), shells(5)AUTHOR
Thorsten Kukuk <kukuk@suse.de>
pwdutils February 2004 chsh(1)