Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

polkit-is-privileged(1m) [opensolaris man page]

polkit-is-privileged(1M)				  System Administration Commands				  polkit-is-privileged(1M)

NAME
polkit-is-privileged - check PolicyKit privileges SYNOPSIS
polkit-is-privileged [-hvV] -u user -p privilege [-r resource] DESCRIPTION
The polkit-is-privileged command queries system policy to determine whether a user is allowed for a given privilege and resource. The resource name can be omitted. On the Solaris operating system, RBAC authorizations names should be used as privilege names. Currently, the only consumer of PolicyKit is hald(1M). OPTIONS
The following options are supported: -h, --help Display list of options and exit. -p privilege, --privilege privilege Name of privilege associated with user. Command tests for this privilege. -r resource, --resource resource Name of resource associated with user and privilege. Command tests for this resource. -u user, --user user User name or user id that is tested for. -v, --verbose Verbose mode. -V, --version Displays version number. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWhalr | +-----------------------------+-----------------------------+ |Interface Stability |Volatile | +-----------------------------+-----------------------------+ SEE ALSO
auths(1), profiles(1), hald(1M), getauthattr(3SECDB), auth_attr(4), policy.conf(4), prof_attr(4), user_attr(4), attributes(5) SunOS 5.11 22 Aug 2006 polkit-is-privileged(1M)

Check Out this Related Man Page

auths(1)                                                           User Commands                                                          auths(1)

NAME
auths - print authorizations granted to a user SYNOPSIS
auths [ user ...] DESCRIPTION
The auths command prints on standard output the authorizations that you or the optionally-specified user or role have been granted. Autho- rizations are rights that are checked by certain privileged programs to determine whether a user may execute restricted functionality. Each user may have zero or more authorizations. Authorizations are represented by fully-qualified names, which identify the organization that created the authorization and the functionality that it controls. Following the Java convention, the hierarchical components of an authorization are separated by dots (.), starting with the reverse order Internet domain name of the creating organization, and ending with the specific function within a class of authorizations. An asterisk (*) indicates all authorizations in a class. A user's authorizations are looked up in user_attr(4) and in the /etc/security/policy.conf file (see policy.conf(4)). Authorizations may be specified directly in user_attr(4) or indirectly through prof_attr(4). Authorizations may also be assigned to every user in the system directly as default authorizations or indirectly as default profiles in the /etc/security/policy.conf file. EXAMPLES
Example 1: Sample output The auths output has the following form: example% auths tester01 tester02 tester01 : solaris.system.date,solaris.jobs.admin tester02 : solaris.system.* example% Notice that there is no space after the comma separating the authorization names in tester01. EXIT STATUS
The following exit values are returned: 0 Successful completion. 1 An error occurred. FILES
/etc/user_attr /etc/security/auth_attr /etc/security/policy.conf /etc/security/prof_attr ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWcsu | +-----------------------------+-----------------------------+ SEE ALSO
profiles(1), roles(1), getauthattr(3SECDB), auth_attr(4), policy.conf(4), prof_attr(4), user_attr(4), attributes(5) SunOS 5.10 25 Mar 2004 auths(1)
Man Page