Sponsored Content
Operating Systems AIX Unable to set ACLs on sulog - need to grant read permission to a normal user on AIX 6.1 Post 303040689 by zxmaus on Monday 4th of November 2019 11:35:35 AM
Old 11-04-2019
I have not worked with RBAC ever, so all is just guessing, but I think that is your issue here. Can you find out if the root user is actually allowed in RBAC to set ACLs? If he is not, add that permission.
I am wondering as well if it would not be easier to just somehow allow splunk via rbac to read these files?
This User Gave Thanks to zxmaus For This Post:
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Other than root user .Normal user is unable to create files

Hi all, I am using Sun Solaris 9 .In this system normal users unable to create files from the command line.I added these users in bin,adm and even root group i found them unable to create a file. (1 Reply)
Discussion started by: mallesh
1 Replies

2. AIX

To find RAM Size in AIX as normal user?

Hi, Am jus trying to find the Total RAM Size of a AIX m/c (in MB)..svmon works perfectly for a superuser...But i want to achive this as a normal user...Please help me out with correct command.. Best Regards, Muthukumaran.M (3 Replies)
Discussion started by: muthukumaran13
3 Replies

3. UNIX for Dummies Questions & Answers

MySQL GRANT permission.

Hi, I'm one of a server administrators. I've the linux root account but I don't know the root password of MySQL (Server version: 5.0.32). I want to GRANT ALL PRIVILEGES to my MySQL account without changing the MySQL's root password. How can I do so? (0 Replies)
Discussion started by: mjdousti
0 Replies

4. AIX

Normal User Unable to Login Through AIX CDE

When we as normal user try to login, the session startup terminates and we are presented with the login screen.The root user is able to login without any problem.I can log in to the Aix server as normal user through telnet & using xmanager but not directly through server terminal .The Aix version... (1 Reply)
Discussion started by: ranadeep
1 Replies

5. AIX

Unable to set remote printer in AIX

Hi all, I am a beginner in AIX. I am facing a problem with remote printing in AIX. HP laser jet 1320 printer is connected to a printer server (PCI Mini - 100U3), which is configured as remote printer from AIX server. But I am not able to print from the AIX server by using "lp -d... (0 Replies)
Discussion started by: Rainy
0 Replies

6. UNIX for Dummies Questions & Answers

unable to set user home dir

I created a new user and changed their home directory to /export/home/mydir/ I verified in the passwd file that the home directory is set to the above and that owner of that directory is the new user and yet when I log in as that user I get the following message: No directory! Logging in with... (14 Replies)
Discussion started by: some_one
14 Replies

7. UNIX for Dummies Questions & Answers

grant sudo permission

Hi all, I have to grant sudo permission to a user. I have searched online and find that /etc/sudoers file needs to be changed with visudo command. As i am new to linux, this is not clear to me. Can anybody take an example and show me how exactly this done. Thanks in advance! (2 Replies)
Discussion started by: lramsb4u
2 Replies

8. Shell Programming and Scripting

set only some command & scripts permission to a particular user

hi, i am new in unix.......i am using bash and i want to create a user which has only some command and scripts permission.........is it possible? thanx (1 Reply)
Discussion started by: rakeshtomar82
1 Replies

9. UNIX and Linux Applications

Permission ERROR: Unable to load the User's Hive

Hi all, Please help me solving the error that i get when i trigger the job from autosys. The job is failing after going to restart start and it is throwing an "exit code:128". Please help me understand whats this exit code and how to overcome this. And when i check the logs its giving me an... (4 Replies)
Discussion started by: Bharath V
4 Replies

10. AIX

Assign read write permission to the user for specific dir and it's sub dir and files in AIX

I have searched this quite a long time but couldn't find the right method for me to use. I need to assign read write permission to the user for specific directories and it's sub directories and files. I do not want to use ACL. I do not want to assign user the same group of that directories too.... (0 Replies)
Discussion started by: blinkingdan
0 Replies
authadm(1M)															       authadm(1M)

NAME
authadm - non-interactive command for administrating the authorization information in the RBAC databases SYNOPSIS
[object [comments]] [object] operation [object] subrole DESCRIPTION
is a non-interactive command that allows users with the appropriate privileges to modify and list authorization information in the and RBAC databases files. HP recommends using only the and commands to edit and view the RBAC databases -- do not edit the RBAC files without these commands. See rbac(5) for more information on these RBAC databases. Options With the exception of the option, all options recognize a default object. If the parameter is specified with a non-empty value in the security default file, then the value of this parameter will be the default object. However, if the parameter does not exist or is set to an empty value, then the default object will be set to a wild card (*). Here is how to specify a value to the parameter in For example: In sets the default object to If line is not present or is commented out, then the default object will be set to "*". recognizes the following options: Adds an authorization pair (operation, object) to the system list of valid authorizations by appending a line to the file. If object is not specified, then a default object will be assigned. The default object will either be a wild card (*) or the object specified in the security default configuration file, A comment may not be specified when adding an entry that refers to the default object in The only way to add a comment to an entry with the option is to specify the object explicitly. Deletes an authorization from the system list of valid authorizations. If object is not specified, then a default object will be assumed. The default object will either be a wild card (*) or the object specified in the security default configuration file, If the authorization exists in deletes the entry. If the specified authorization is assigned to any roles in will remove the autho- rization from the role. If the specified authorization exists in an entry in will remove the entire entry. If the authorization does not exist in returns an error message. See the section below for more information. Assigns an authorization pair to a role. verifies the role exists in before verifying the authorization pair exists in appends the authorization to the role to authorization mapping in if the role and authorization pair exists. If object is not specified, then a default object will be assigned. The default object will either be a wild card (*) or the object specified in the security default configuration file, Assigns a role to another different role. The role being assigned to the other different role is referred to as a A subrole is any valid role defined in the database. The option allows hierarchical role definition (one role can inherit other subrole). After assigning a subrole to another role, that role will also have all the authorizations of the subrole, and any of its subroles. More than one subrole can be assigned to other different role. verifies the role and subrole exist in It also verifies that there is no recursive definitions of the role and subrole. (If "role1" has a subrole of "role2", and if you try to "role1" to "role2", this will cause a recursive definition of both "role1" and "role2"). appends the subrole to the role to authorization mapping in Revokes an authorization from the specified role in If no authorization is specified, revokes all the authorizations for the given role. If object is not specified, then a default object will be assumed. The default object will either be a wild card (*) or the object specified in the security default configuration file, The file will be modified by the command. Revokes a subrole from the specified role in Note that the role specified as the subrole is not revoked from the database, just the subrole assignment is revoked. For instance, if these entries are in the database: will modify the line to: revokes specified the authorizations and/or subrole for the given role. Note: The file will be modified by the command. Invoking the list command without any parameters lists every entry in Specifying a role name lists all the authorizations and sub- roles assigned to that role name. Specifying an operation name lists all the roles witch have that operation name. Specifying a subrole name lists all the roles which have that subrole name. Specifying lists all the authorizations in the database. Authorizations In order to invoke the user must either be root, (running with effective uid of 0), or have the appropriate authorization(s). The follow- ing is a list of the required authorizations for running with particular options: Allows user to run with option. Allows user to run option. Allows user to run with or option. Allows user to run with or option. Allows user to run with option. EXTERNAL INFLUENCES
Environment Variables determines the language in which messages are displayed. International Code Set Support Single-byte character code set is supported. RETURN VALUE
Success. If is successful, it returns Failure. returns and prints an appropriate error message to stderr. EXAMPLES
The following commands each add an authorization (operation, object) entry in the database file: The following commands each delete an authorization (operation, object) entry from the database file: The following commands each assign an authorization (operation, object) pair to a role in database file: The following commands each assign a subrole to a role in database file: The following commands each revokes an operation for the specified operation from a role in the file: The following commands each revokes a subrole from the specified role in the database file: The following command lists all the authorizations for the role: The following command lists all the entries with operation The following command lists all the entries with object The following command lists all the roles with their authorizations in database: FILES
Database containing valid definitions of all roles. Database containing definitions of all valid authorizations. Database specifying the roles allowed for each specified user. Database defining the authorizations for each specified role. SEE ALSO
cmdprivadm(1M), privrun(1M), rbacdbchk(1M), roleadm(1M), rbac(5). authadm(1M)
All times are GMT -4. The time now is 07:52 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy