10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hello Gurus,
In solaris server, one folder say /appl/prod/usr/sendme get files those need to be processed. The script named checkFile.sh can process the each file.
This script checkFile.sh is not scheduled in crontab. But whenever file puts in sendme folder, the checkFile.sh is called and... (1 Reply)
Discussion started by: get_chandrakant
1 Replies
2. AIX
We encounted the following err msg
and then use
to fix this issue.
But before I finish the ipcrm cmd,the AIX systerm was restarted by using
.
After this,the cicscp cmd failed with the following:
I've tried execute it under debug mode,but got no useful information.
Who... (0 Replies)
Discussion started by: tiger_wen
0 Replies
3. Red Hat
Hi All,
Hope this is right area to ask this question.
I have a shell script (bash) "wrapper.sh", which contains few simple shell command
which executes a "server.sh" (conatins code to execute a java server) as a daemon.
Now what I want to kill this "server.sh" so that the server should... (2 Replies)
Discussion started by: jw_amp
2 Replies
4. UNIX for Dummies Questions & Answers
Hello guys and dolls, first post happening here...
Wanting to know where to start with Unix. Which Unix option/package is best for an absolute beginner and has a well documented, easy to grasp user guide(s).
I have dabbled in some programming (basic PHP) and I have an old desktop pc which I... (6 Replies)
Discussion started by: TheUltimateNoob
6 Replies
5. UNIX for Dummies Questions & Answers
hi world,
I am trying to learn how to program in c, I've gotten a few books and have been reading them, one even came with bloodshed dev-c compiler, it is not working, every time I build the hello world program it always comes back saying " G__~1.EXE: installation problem, cannot exec `cpp': No... (1 Reply)
Discussion started by: jsayres
1 Replies
6. UNIX for Dummies Questions & Answers
Hi im a 15 year old, interested in beggining things like this...my main inpiration came from this article...How To Become A Hacker
according to this my first language shouold be python...but i have ABSOLUTELY NO CLUE about where to dowload/learn it...is there anything else i should do along... (1 Reply)
Discussion started by: SonOfSparta
1 Replies
7. UNIX for Dummies Questions & Answers
Dear all,
I just found out that my company is thinking of installing a unix server and is considering either sun or ibm.
The thing is that i want to learn these two systems before they take a decision and maybe it will be a big career booster.
The problem is that i don't know anything about... (7 Replies)
Discussion started by: patslaiby
7 Replies
8. UNIX for Dummies Questions & Answers
hi, i had an applicatoin which is not running cos one of its daemon is not running.. i get the applicatoin to run by running the daemon first... its manual job... so quite cumbersome..
i have backups in the night, with the crontab -l entry with logs written. the logs indicated successful... (7 Replies)
Discussion started by: yls177
7 Replies
9. UNIX for Dummies Questions & Answers
I am new to all this UNIX thing and have a system with the following specs:
Pentium 1.7 GHz
128MB RAM
20 GB HDD
Windows ME
My questions are:
Can install and run UNIX in such a system?
Do I have to stop using Windows?
Is there a safe way to get the necessary software online?
... (5 Replies)
Discussion started by: ayalai
5 Replies
10. Shell Programming and Scripting
Can anyone tell me what the command Banner means or does
Gibby9 (4 Replies)
Discussion started by: Gibby9
4 Replies
evm.auth(4) Kernel Interfaces Manual evm.auth(4)
NAME
evm.auth - EVM authorization file
SYNOPSIS
DESCRIPTION
Authorization is control of the right to post, subscribe to, or retrieve an EVM event, or to execute services defined in the EVM daemon
configuration file.
The file is a text file that controls event authorization. Any portion of a line from an unquoted number sign to the end of line is a com-
ment. Blank lines are ignored. The following authorization controls are recognized:
The rights specified apply to event posting and subscription.
Class of events to which these rights apply.
An event_class is a string of one or more components that match the same set of components in an It is used to iden-
tify a family of events for purposes such as authorization. The more specific classes (those with more components)
override the rights indicated by the less specific (more generic) classes.
Users specified by the
rights_list are allowed or denied the right to post events of this event_class.
Users specified by the
rights_list are allowed or denied the right to subscribe to or retrieve from the log, events of this event_class.
rights_list A list of users or groups who have or are denied the specified right for this event or service class. Entries are
separated by commas.
A rights_list has the format:
In the previous rights_list, user is the login name of any user, and groupname is any group. The keyword may be
abbreviated to A leading plus character signifies that event or service rights are granted. A leading minus charac-
ter (-) signifies that rights are explicitly denied. User has implicit posting and access rights to all events, and
execute rights to all services, unless they are explicitly denied.
The first explicit entry for a user in a rights list takes precedence over any other explicit or group entries for
that user. If the user is not explicitly listed, but is a member of a group which denies access, access is denied
even if the user is also a member of a group for which access is granted.
A plus or minus sign with no associated name grants or denies rights to all users.
The rights_list must be enclosed in double quotes if it contains spaces.
The rights specified apply to services performed by the daemon for a
requesting client.
The service to which these rights apply.
The service_name is the name of a service defined in the file. User-defined services are not currently supported.
Users specified by the
rights_list are allowed or denied the right to request operation of this service.
The keywords described may be entered in a case-insensitive manner. The allowable strings and the minimum number of characters is shown in
the following table. A minimum of zero indicates that all characters are required.
Keyword Minimum
-------------------------
access 0
class 0
event_rights 7
execute 4
post 0
service 4
service_rights 9
Notes
1. If you add an entry to the authorization file, you must make sure there is a corresponding base event template in the template file
library. The base template must have a name whose components exactly match the corresponding components in the authorization file's
value. The template name can have fewer components than are present in the but it cannot have more. For example, if an group has a
value of and an event template with the name has been registered in an EVM template file, the template will be regarded as the base tem-
plate for the class.
Each time the daemon loads or reloads its configuration, it writes a warning message in its error file if no base template is registered
for a particular entry. Refer to the evmtemplate(4) manpage for information about registering event templates.
2. If you are concerned with allowing your file to be used on other systems that support EVM in the future, you should use the built-in
macro in place of the first two components of the name of any system event. This will make it unnecessary to change the file if the
other system uses a different event name prefix.
EXAMPLES
This example illustrates an entry in the authorization file with the following privileges: Only root may post events that have as the first
two components of the event name.
Events in this class may be accessed by root or by any user who is a member of the tech group.
FILES
Location of the EVM authorization file.
SEE ALSO
Commands
evmd(1M).
Files
evmdaemon.conf(4), evmtemplate(4).
Event Management
EVM(5).
evm.auth(4)