Sponsored Content
Full Discussion: Lock an User temperarily
Top Forums UNIX for Dummies Questions & Answers Lock an User temperarily Post 5847 by reddyb on Friday 24th of August 2001 02:26:17 PM
Old 08-24-2001
Lock an User temperarily

Hi all,
How can I lock an User account temperarily? but this account should be accessable to other users through sudo?

quick help is highly appriciated

thanks
reddy
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

how to lock keyboard without using lock command

how can I lock my keyboard while I'm away from the computer without using lock command. What other commands gives me the option to lock keyboard device? thanks (7 Replies)
Discussion started by: dianayun
7 Replies

2. HP-UX

How to Lock In HP-UX

Hi , How should i implemet a lock function Hp-ux . I want to a lock a file through fcntl in Hp-ux . But is not locking properly . Thanks Narendra (7 Replies)
Discussion started by: naren_chella
7 Replies

3. Solaris

lock user to directory in ftp

how can i lock a specific user to his home directory when he logs on to the computer with ftp? thanx! (3 Replies)
Discussion started by: eliraza6
3 Replies

4. Linux

Unable to Lock User

Hi, I am trying to lock a user by executing "passwd -l xxxx" but the system is returning following error: Locking password for user xxxx. passwd: Error (password not set?) I do see the passwd for this user encrypted in shadow file thou! Anyone have any ideas why am getting this error? ... (5 Replies)
Discussion started by: harjitsingh
5 Replies

5. Linux

Lock User in home directory in ftp prompt

Hi, I am using Red Hat Enterprise Linux ES release 4 (Nahant Update 5). Here I have created one user with /sbin/nologin shll such that login is not possible only ftp is possible. But I want to do another thing that the user can not roam around after ftp. I had tried one way. in... (4 Replies)
Discussion started by: kallol
4 Replies

6. UNIX for Advanced & Expert Users

file lock

I have an Essbase installation on Solaris 10 and need to get the backups configured. Unfortunately several key files are locked and Essbase (OLAP application) is not releasing the locks when the Essbase or the applications within stop running. It appears I can use chmod to unlock the files but I... (0 Replies)
Discussion started by: JavaBrian
0 Replies

7. Red Hat

Security Question: Lock after invalid login, Session Lock and Required Minimum Password Length

Hello all, If anyone has time, I have a few questions: How do I do the following in Linux. We are using Red Hat and Oracle Enterprise Linux, which is based on Red Hat too. 1. How to lock the account after a few (like 3) invalid password attempts? 2. How do you lock a screen after 30... (1 Reply)
Discussion started by: nstarz
1 Replies

8. UNIX for Advanced & Expert Users

Testing privileges -lock lockfile /var/lock/subsys/..- Permission denied

Hi all, I have to test some user priviliges. The goal is to be sure that an unauthorized user can't restart some modules (ssh, mysql etc...). I'm trying to automate it with a shell script but in same cases I got the syslog broadcast message. Is there any way to simply get a return code... (3 Replies)
Discussion started by: Dedalus
3 Replies

9. Shell Programming and Scripting

lock on files

Hi, I want to write a code where in the file once taken genrates a lock number and other developer/user cannot take the file to make any changes in it. He gets the file only as read only. (2 Replies)
Discussion started by: rac
2 Replies

10. UNIX for Dummies Questions & Answers

How to Lock the Script?

Hi All, Seeking for your assistance on how to lock the script if it's running? meaning anybody can't run my script while it's running. Please advise, Thanks, (8 Replies)
Discussion started by: nikki1200
8 Replies
profiles(1)						    BSD General Commands Manual 					       profiles(1)

NAME
profiles -- Profiles Tool SYNOPSIS
profiles [[-I | -R | -i] [-F file_path_to_profile]] [[-L] [-U username]] [[-r] [-p profile_id] [-u uuid] [-o output_file_path]] [-PHDdCchfvxVz] DESCRIPTION
profiles allows you to install, remove or list configuration profiles, or to install provisioning profiles. Some commands may only work with elevated privileges, or for the current user. -I Install a configuration profile for a particular user from a profile file. -i Install a provisioning profile from a profile file. -V Verify a provisioning profile from a profile file. -R Remove a configuration profile for a particular user from a profile file. -r Remove a provisioning profile given a identifier and uuid. -L List configuration profile information for a particular user, or the current user if no Username was specified. -F Specify the file path to the profile file. -U Specify the short username. Since you can only install profiles for the current user, this is only useful for validation. -H Returns whether configuration profiles are installed. -P List configuration profile information for everyone. -C List configuration profile information for the computer. -c List provisioning profile information. -p A profile identifier used to locate the configuration or provisioning profile. -u A uuid identifier used to locate the provisioning profile. The uuid must be in its canonical 36 character form. -z The profile removal password. If not specified and the profile requires a removal password, you will be prompted. -o The output file path for profile information (-L, -P, -C, -c) as a plist file. The path argument must be specified to use this option, Use 'stdout' to send this informaton to the console. File output will be written as an XML plist file. The toplevel key will contain the user name, or _computerLevel for device or provisioning profile information. -h Displays help information. -v Enables verbose mode. A 'pass' or 'fail' indicator may also be displayed based on the command return status to stdout. -x Displays tool version number. The version is in the format x.yy, where x will change if new or incompatible commands are added. The version initially starts at 2.00 -f Automatically confirm any questions, or when used with -s, will retry startup profiles at each startup until successfully installed. -D Deletes all existing configuration profiles. It will not update any existing managed preferences. (Requires root privileges) -d Deletes all existing provisioning profiles. (Requires root privileges) -s Sets profile for startup. (Requires root privileges) EXAMPLES
profiles -I -F /testfile.configprofile Installs the profile file 'testfile.mobileconfig' into current user. profiles -R -F /profiles/testfile2.configprofile Removes the profile file '/profiles/testfile2.mobileconfig' into the current user. profiles -H Returns whether or not configuration profiles are installed on the system. profiles -P Displays information on all installed configuration profiles on the system. profiles -L Displays information for installed profiles for the current user. profiles -L -o /outputfile Displays information for installed profiles for the current user and sends the output as a dictionary to /outputfile.plist. profiles -Lv Displays extended information for installed configuration profiles for the current user. profiles -D Removes all configuration profile inforamtion on the system. (see important caveat below) profiles -R -p com.example.profile1 -z pass Removes any installed profiles with the identifier com.example.profile1 in the current user and using a removal password of 'pass'. profiles -s -F /startupprofile.mobileconfig -f Sets up the profile as a startup profile to be triggered at the next system startup time. If the profile can't be installed, it will try again at next startup time. CAVEATS
Certain configuration profiles may be marked as a device profile (system) using the PayloadScope key. However, the profiles tool will ignore the PayloadScope key and install the profile based on how the profile is installed; either a user profile if installed from a user, or a device profile if installed from root (or sudo). Specific payload dictionary information is not available since it may contain sensitive information. Non-sensitive information can be viewed using the System Profiler report. Because this command line tool was not designed to ask for missing information, some profiles may fail to install properly. The only recourse is to insert the missing information before installing the configuration profile. The System Preferences application's Profiles pane is designed to handle the querying of missing information. Configuration profiles installed to the wrong user domain (user vs system) may not behave in the way you expect since the information may not be useful to that particular domain. For example, adding a Mail payload to the system domain will not do anything since Mail payloads must have a user account. Additionally, since profiles are stored by the user shortname and only stored on the local client, care should be taken to not install a profile that could be used by a same named local user. The profiles tool should only be used from the /usr/bin folder since certain operations are privileged and may fail if moved. The -D command removes all configuration profile information without regards for any services it may have set up. This may leave your system in a state that requires you to manually clean up any service (account) information the profile(s) had installed - for all users on that sys- tem. You should not use this command without considering its consequences. There is no way to undo this command. You will be prompted to confirm this command before it will execute. MacOSX March 04, 2013 MacOSX
All times are GMT -4. The time now is 10:17 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy