03-11-2019
We are not being obtuse, being overly literal, or blocking you. We're telling you that your question is nonsensical. You cannot stop root from being root. Period. Full stop. Any measures you use to stop them, they have full access to undo themselves, by definition.
For instance, useradd and userdel aren't magic -- they edit files. Block them and they can just edit the files by hand, or install something else for the purpose. Block access to the files and bad things will happen since the system needs these files.
You will have to approach the problem from another angle. Rather than 'limit what root can do', you will need to very precisely specify what they are actually allowed to do, and permit that in a non-root user via sudo.
These 5 Users Gave Thanks to Corona688 For This Post:
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I need to set up/modify a user account on one of our machines which will allow the user to stay on the system, but not use their user id and password to login to the machine. It is for the purposes of an ftp user, so that nobody can then login as ftp/passwd. Ta.:) (2 Replies)
Discussion started by: danhodges99
2 Replies
2. AIX
Hi all,
I am a newbe to aix 5.2. I want to specify the characters used by users while creating user in aix like specifying the length of the password
should i use some sript for that if it is then please let me know how to do this
if yes give me the link for the scripts.
Thanks in advance
... (2 Replies)
Discussion started by: Satya Mishra
2 Replies
3. UNIX for Dummies Questions & Answers
I created a user, i login as a root. I add him in the group where he can access and login as a root! I checked it in users' list and in group's list, he is there. My problem is this, I cant login using the username/account I just created! What should i do to use and login the user/account i've just... (5 Replies)
Discussion started by: jerome
5 Replies
4. Shell Programming and Scripting
Hi,
My requirement is that i am login from ROOT in a script but when any
command is coming which is logging to sqlplus then i have to run it with normal user as only normal user have permission to connect to sqlplus .
i tried making a script like this :
#! /bin/ksh
su -... (3 Replies)
Discussion started by: rawatds
3 Replies
5. Cybersecurity
Dears
I want to prevent users from doing spesific command "history -c" or "history" in general
How can I do ? (4 Replies)
Discussion started by: reaky
4 Replies
6. IP Networking
hi all,
i want to prevent users downloading files in the office as bandwidth becomes very low
and affects work.
one of my friend tried to close the connection using ethercap but this does not work.
i have a debian desktop while other users use MS W!ndows.
Please provide any help. Thanks (5 Replies)
Discussion started by: coolatt
5 Replies
7. Shell Programming and Scripting
Hi Every body,
I would need a shell script program to login as different user and perform some copy commands in the script.
example: Supppose ora_toms is the active user
ora_toms should be able to run a script where user: ftptomsp pass: XXX should login through and run the commands
... (9 Replies)
Discussion started by: ujjwal27
9 Replies
8. Shell Programming and Scripting
now i have logged in username : ramesh in unix
Now i have to created script file to login into another user and have run a command inside that user and after executing the command i have to exit from that user.
Inside script, i have to login into su - ram along with password : haihow and have to... (4 Replies)
Discussion started by: rammm
4 Replies
9. Shell Programming and Scripting
Hi could some let me know how to prevent user from changing his home directory.......
Thanks in advance.... (1 Reply)
Discussion started by: Revanth547
1 Replies
10. Shell Programming and Scripting
Hi could some let me know how to prevent user from changing his home directory.......
Thanks in advance.... (6 Replies)
Discussion started by: rahul547
6 Replies
chsh(1) General Commands Manual chsh(1)
NAME
chsh - change default login shell
SYNOPSIS
login-name [shell]
login-name [shell]
login-name [shell]
login-name [shell]
DESCRIPTION
The command changes the login-shell for a user's login name in the repository (see passwd(1)).
The DCE repository is only available if Integrated Login has been configured; see auth.adm(1M). If Integrated Login has been configured,
other considerations apply. A user with appropriate DCE privileges is capable of modifying a user's shell; this is not dependent upon
superuser privileges.
If the repository is not specified (as in [login-name]), the login shell is changed in the file only.
Run after running to make sure the information was processed correctly.
Notes
The command is a hard link to the command. When is executed, actually the command gets executed with appropriate arguments to change the
user login shell in the repository specified in command line. If no repository is specified, the login shell is changed in the file.
Arguments
login-name A login name of a user.
shell The absolute path name of a shell. If the file exists, the new login shell must be listed in that file. Otherwise, you
can specify one of the standard shells listed in the getusershell(3C) manual entry. If shell is omitted, it defaults to
the POSIX shell,
Options
The following option is recognized:
Specify the repository to which the operation is to be applied.
Supported repositories include and
Security Restrictions
You must have appropriate privileges to use the optional login-name argument to change another user's login shell.
NETWORKING FEATURES
NFS
File can be implemented as a Network Information Service (NIS) database.
EXAMPLES
To change the login shell for user to the default:
To change the login shell for user to the C shell:
To change the login shell for user to the Korn shell in the DCE registry:
WARNINGS
If two or more users try to write the file at the same time, a passwd locking mechanism was devised. If this locking fails after subse-
quent retrying, terminates.
AUTHOR
was developed by HP and the University of California, Berkeley.
FILES
SEE ALSO
chfn(1), csh(1), ksh(1), passwd(1), sh(1), sh-posix(1), getusershell(3C), pam(3), passwd(4), shells(4).
chsh(1)