Sponsored Content
Top Forums Shell Programming and Scripting Id command does not return correct username Post 303041757 by foad on Wednesday 4th of December 2019 02:33:22 AM
Old 12-04-2019
Quote:
Originally Posted by mohtashims
If so, how can i get the user id of a running process that works on all OS types ? Below is what i have been using so far:

Code:
Id -nu `cat \proc\pid\loginuid`

When you don't even know how to write a correct path you shouldn't be allowed to have a shell login, save for the sandbox to learn. When you ask your systems administrator how to do it tell him to remove your other user accounts. You are probably endangering the continuous operation of your corporate network.
 

10 More Discussions You Might Find Interesting

1. IP Networking

pine username return address

hello all I am happily using pine but unhappily sending email as username@where.my.mail.works instead of ****@my.college.edu well, my username on my computer is one thing, but my username on my college account (**** here) is different. what I'm trying to do is use the college server for... (1 Reply)
Discussion started by: plusran
1 Replies

2. UNIX for Dummies Questions & Answers

to pick up the Return Code ( RC) from the mailx command and return it to SAS uisng 's

Hi All, Can anyone please let me know the syntax / how to pick up the Return Code ( RC) from the mailx command and return it to SAS uisng 'system()' function and '${?}'. I am in a process to send the mail automatically with an attachment to bulk users. I have used 'Mailx' and 'Unencode'... (0 Replies)
Discussion started by: manas6
0 Replies

3. UNIX for Dummies Questions & Answers

Is this grep command correct?

Hi I need to know if I have got the following grep command correct. I wanted to find from myfile.txt all signed real numbers (e.g. +5.0, -78, but not 5.0, 5 are not). I have thought about it and decided it was this: grep '' myfile.txt but I was wondering if this was correct. If... (2 Replies)
Discussion started by: rushhour
2 Replies

4. Shell Programming and Scripting

::select statement return value with correct field size::

Hi Everyone, I am facing a problem regarding the select from sybase, the return with the incorrect size. For example, field is NAME(20). After i selected from sybase, the result is nicky. after i assign it to another declaration variable, it will be in actual name "nicky" , what i need... (10 Replies)
Discussion started by: ryanW
10 Replies

5. Shell Programming and Scripting

FTP command line username and password passing

Dear All, I am new to unix and I am trying to build a shell script which will connect to a different server by passing username and password from a file or command line but not manually... In short I dont want to connect to a diff server via ftp interactively. Any suggestion...looking... (8 Replies)
Discussion started by: Pratik4891
8 Replies

6. UNIX for Advanced & Expert Users

I was trying this command...am I going correct? other there is better way

I was trying to copy all debs from apt cache to some storage location and I was taking this approach... /var/cache/apt/archives# ls -1 | grep -v jdownloader | fgrep .deb | xargs cp /media/eshant/L-STORE/Softwares/openjdk/an error bla_bla.deb is a not directory stalled me Suggestions please... (9 Replies)
Discussion started by: ezee
9 Replies

7. Shell Programming and Scripting

Need output of script on screen and file with correct return status of the called script.

Hi, I am trying to capture logs of the script in the file as well as on the screen. I have used exec and tee command for this. While using exec command I am getting the correct output in the file but, script output is not getting displayed on the screen as it get executed. Below is my sample... (14 Replies)
Discussion started by: Prathmesh
14 Replies

8. Shell Programming and Scripting

Wget and correct zip for command

If there were 3 files put in a folder on /Desktop/Test then transferred to a site. would gzip -r /Desktop/Test zip them so that wget --http-user cmccabe --http -passwd xxxx*** https://something.sharefile.com/login.aspx -O - | tar -zxf - could be used to connect to the site, login,... (6 Replies)
Discussion started by: cmccabe
6 Replies

9. Shell Programming and Scripting

LS command does not list the correct file

Hi, I am logged into as root & inside the home directory of another user. ls -a # ls -laq total 44 drwx------ 4 user1 adm 4096 Nov 23 05:10 . drwxr-xr-x. 12 root root 4096 Nov 22 13:05 .. -rw-r--r-- 1 user1 adm 18 Nov 22 13:05 .bash_logout -rw-r--r-- 1 user1 adm 193 Nov... (2 Replies)
Discussion started by: mohtashims
2 Replies

10. Shell Programming and Scripting

How to auto correct a failing command?

If a command is not found, e.g. nawk, this is how I fix the problem ] && NAWK=/usr/bin/gawk ] && NAWK=/usr/bin/nawk ] && NAWK=/usr/bin/awkI use $NAWK an the set the appropriate value based on the system it runs. How can I implement a similar fix for a command found but illegal argument.... (6 Replies)
Discussion started by: mohtashims
6 Replies
su(1)							      General Commands Manual							     su(1)

NAME
su - switch user SYNOPSIS
[username [arguments]] [username] DESCRIPTION
The (set user or superuser) command allows one user to become another user without logging out. username is the name of a user defined in the file (see passwd(4)). The default name is (that is, superuser). To use the appropriate password must be supplied unless the current user is superuser and is not using the option. If a valid password is entered, executes a new shell with the real and effective user ID, real and effective group ID, and group access list set to that of the specified user. The new shell is the one specified in the shell field of the new user's entry in the password file, The arguments are passed along to the new shell for execution, permitting the user to run shell procedures with the new user's privileges. When exiting from the new shell, the previous username and environment are restored. All attempts to become another user are logged in including failures. Successful attempts are flagged with failures, with They are also logged with (see syslog(3C)). Options recognizes the following options: If the option is specified, the new shell starts up as if the new user had initiated a new login session. If the option is omit- ted, the new shell starts as if a subshell was invoked. See more details below. If DCE (Distributed Computing Environment) is being used as the authentication mechanism, the option must be specified. With this option, even superuser will be prompted for the user's password. The reason for this is because DCE credentials for a user cannot be obtained without that user's pass- word. This option cannot be used with shell arguments. If the option is specified, the new shell starts up as if the new user had initiated a new login session. Exceptions are as follows: o The variable is reset to the new user's home directory. o If the new user name is the path and prompt variables are reset: For other user names: o The variable is retained. o The rest of the environment is deleted and reset to the login state. However, the login files are normally executed anyway, usually restoring the expected value of and other variables. If the option is omitted, the new shell starts as if a subshell was invoked. Exceptions are as follows: o If the new user name is the path and prompt variables are reset: o The previously defined and environment variables are removed. o The rest of the environment is retained. If the shell specified in is sets the value of parameter in the new shell (referenced as to If the option of the command is specified, sets parameter to If the shell specified in is not sets the value of parameter in the new shell to shellname. If the option of the command is specified, sets parameter to For example, if the Korn shell is invoked, the value of shellname will be either or By comparison, the command always sets parameter to HP-UX Smart Card Login If the user account is configured to use a Smart Card, the user password is stored in the card. This password has characteristics identi- cal to a normal password stored on the system. In order to using a Smart Card account, the Smart Card from the destination user account must be inserted into the Smart Card reader. The user is prompted for a PIN instead of a password during authentication. The password is retrieved automatically from the Smart Card when a valid PIN is entered. Therefore, it is not necessary to know the pass- word, only the PIN. The card is locked if an incorrect PIN is entered three consecutive times. It may be unlocked only by the card issuer. SECURITY FEATURES
Except for user users cannot use to change to an account that has been locked because of expired passwords or other access restrictions. Refer to the file in the security(4) manual page for detailed information on configurable parameters that affect the behavior of this com- mand. Currently, the supported parameters for the command are: EXTERNAL INFLUENCES
Environment Variables User's home directory The language in which messages are displayed. If is not specified or is null, it defaults to (see lang(5)). If any internationalization variable contains an invalid set- ting, all internationalization variables default to (see environ(5)). User's login name Command name search path Default prompt Name of the user's shell International Code Set Support Characters in the 7-bit US-ASCII code sets are supported in login names (see ascii(5)). EXAMPLES
Become user while retaining the previously exported environment: Become user but change the environment to what would be expected if had originally logged in: Execute the command, using the temporary environment and permissions of user In this example, user bin's shell is invoked with the argu- ments Become user in the DCE environment: WARNINGS
After a valid password is supplied, uses information from and to determine the user's group ID and group access list. If is linked to and group membership for the user trying to log in is managed by the Network Information Service (NIS), and no NIS server is able to respond, waits until a server does respond. DEPENDENCIES
Pluggable Authentication Modules (PAM) PAM is an Open Group standard for user authentication, password modification, and account validation. In particular, is invoked to perform all functions related to This includes password retrieval, account validation, and error message displays. FILES
User's profile System's default group access list file System's password file System's profile Log of all attempts Security defaults configuration file SEE ALSO
env(1), login(1), sh(1), initgroups(3C), syslog(3C), group(4), passwd(4), profile(4), security(4), environ(5). Pluggable Authentication Modules (PAM) pam_acct_mgmt(3), pam_authenticate(3). HP-UX Smart Card Login scpin(1). STANDARDS CONFORMANCE
su(1)
All times are GMT -4. The time now is 07:22 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy