Sponsored Content
Full Discussion: Block any root Privilege
Operating Systems Linux Red Hat Block any root Privilege Post 303037916 by hicksd8 on Saturday 17th of August 2019 10:11:13 AM
Old 08-17-2019
In addition to which operating system you are dealing with (as asked by Neo), can you please tell us what problem you are trying to solve.

The basic concept of any operating system kernel includes security in that, upon a new installation, a single superuser ('root' on Unix/Linux and 'administrator' on Windows) has ultimate control. Unless the superuser "gives away" access rights nobody else can just take them. If rights are given away (e.g. via sudoers file) they can always be rescinded by the superuser. What are you trying to do here?
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Run non-root script as root with non-root environment

All, I want to run a non-root script as the root user with non-root environment variables with crontab. The non-root user would have environment variables for database access such as Oracle or Sybase. The root user does not have the Oracle or Sybase enviroment variables. I thought you could do... (2 Replies)
Discussion started by: bubba112557
2 Replies

2. Solaris

root privilege

Hello All, I need your help to know how i can give regular user ALL root privileges. If there is any way pleas help me :) Regards, Ahmad (7 Replies)
Discussion started by: ahmad_one
7 Replies

3. Solaris

Want to block ftp for root user

Hi Friends, I would like to block the root user for doing ftp. As I am aware that I need to put the entry for root in /etc/ftpusers.....am I right...??? But I am not able to edit the file & even more command is not working. #ls -l ftp* total 14 -rw-r--r-- 1 root sys 1249 Jun... (3 Replies)
Discussion started by: jumadhiya
3 Replies

4. Linux

shrinking root partition and using free space to create a block device

We are intending to protect a set of user specified files using LVM mirroring where the protected space on which the user files are stored is mirrored on an LV on a different disk. Our problem is that for a user with a custom layout has installed linux with 2 partitons for swap and / and there is... (0 Replies)
Discussion started by: kickdgrass
0 Replies

5. Solaris

Root privilege for user

Can anyone please tell how to give root privilege to a normal user in solaris 10? (5 Replies)
Discussion started by: nicktrix
5 Replies

6. Red Hat

How do I run my "SMTP" service as a root privilege ?

Friends , i want to run my smtp service as a root . let me know what r the changes i have to made to my machine . AVklinux (1 Reply)
Discussion started by: avklinux
1 Replies

7. UNIX for Dummies Questions & Answers

How to get the mouse wheel to work without root privilege

Hi, I use a nomachine terminal to access KDE desktop(redhat linux enterprise) on a server. Is there any way to get the mouse wheel to work without root privilege ? I have a usb mouse connected to a nomachine terminal,most likely the mouse wheel problem is not the problem of nomachine, but... (1 Reply)
Discussion started by: grossgermany
1 Replies

8. AIX

Block root user in system console - aix 5.3

How to block the root user login in system direct console. Users should login with non-root ids themselves and then use the su command to become root. Which configuration file i need to check and disable it. (5 Replies)
Discussion started by: kmvinay
5 Replies

9. UNIX for Advanced & Expert Users

For this process, do we need to block Root access???

Hi all, actually my scenario is we are running a webserver using apache-tomcat in that our client uploading resumes, so that particular space we are allowed to upload for that we are running java in root permission, so even we changed the particular folder permission also inside the Webapps but... (1 Reply)
Discussion started by: anishkumarv
1 Replies

10. Solaris

Migration of system having UFS root FS with zones root to ZFS root FS

Hi All After downloading ZFS documentation from oracle site, I am able to successfully migrate UFS root FS without zones to ZFS root FS. But in case of UFS root file system with zones , I am successfully able to migrate global zone to zfs root file system but zone are still in UFS root file... (2 Replies)
Discussion started by: sb200
2 Replies
asecure(1M)															       asecure(1M)

NAME
asecure - control access to Audio on a workstation (OBSOLETED) SYNOPSIS
[] [] [] [] [] [] [] [] [] DESCRIPTION
On Series 700 workstations, audio is secured so that only the user on the local workstation can access audio. You use the command to mod- ify audio security. This command does not apply to X stations; on an X station, access to audio is unrestricted. To modify audio security, become root on the local workstation where you want make a change. Then, use as follows: When prompted, enter any meaningful password. Issuing creates the Audio Security File (ASF). The ASF contains information that determines which hosts and users can access the Aserver, and which users (other than the superuser) can modify the ASF. If needed, you can allow unrestricted access to audio on this workstation. To remove audio security, issue this command: If instead, you wish to modify security, you use to make changes to the information in the ASF. (Because the ASF is a binary file, we do not recommend using an editor on this file.) You can use to make these types of changes: o Allow all clients from a remote host to access the server. o Allow specific users from all other hosts to access the server. o Allow a specific user from a specific host to access the server. o Disable access control, allowing complete unrestricted access to the server, but leaving the ASF intact. Every operation that creates, reinitializes, or changes the contents of the ASF is logged in the file, so that you can track any changes to the ASF. Options supports the following options: Add/delete hostname,username pair. You must be either superuser or a to do this. You can supply more than one hostname,username pair separated by blanks. To use either the or options, you MUST supply at least one hostname,username pair. This option will not work without a pair. Create a new ASF file, called the file. Access control default is enabled with no entries in the access list. Aserver can now be accessed only by local users on the host machine. If an file already exists, it is re-initialized. You must be superuser to execute this option. This option is mutually-exclusive of all other options. This option requires a password. This is an extra layer of protection for the contents of the ASF. It is designed to prevent surreptitious manipulation of the ASF. If you are creating a new ASF, you are prompted for a password and an encrypted copy of that password is stored in the new ASF. If the ASF already exists, you are prompted for the password. If your password matches the password stored in the ASF, the ASF is then re-initialized. Disable access control to the Aserver. This allows unrestricted access by all clients. Enable access control to the Aserver. This restricts access to clients listed in the ASF. Enabled is the default state. Add/delete hostnames for ALL users. You must be either superuser or a to do this. You can supply more than one hostname sepa- rated by blanks. List the contents of the ASF. This option shows a list of the hostnames and/or usernames that have access to the Aserver. Change password for file. You must be superuser to do this. You are prompted once for the old password, then prompted twice for the new password. Add/delete You must be superuser to do this and must enter the password given when the ASF was created (see option). To see a list of privileged users, you must be superuser and use the option. Add/delete usernames for ALL hosts. You must be either superuser or a to do this. You can supply more than one username sepa- rated by blanks. EXAMPLES
List entries in access list. Disable access control. This means anyone can connect to Aserver without restriction. Add host for all users to access list. Remove host for all users from access list. Add user for hosts and to access list. Add user to access list for all hosts. Remove users and from access list for all hosts. Create new access list. AUTHOR
was developed by HP. FILES
asecure log pathname ASF pathname SEE ALSO
attributes(1), convert(1), send_sound(1), asecure(1M), aserver(1M), audio(5). OBSOLETED asecure(1M)
All times are GMT -4. The time now is 06:25 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy