Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

privileged(9r) [osf1 man page]

privileged(9r)															    privileged(9r)

NAME
privileged - General: Checks for proper privileges SYNOPSIS
int privileged( int privilege, int error_code ); ARGUMENTS
Specifies the privilege to check against. This privilege must be one of the constants defined in /usr/sys/include/sys/security.h. For exam- ple, you would specify SEC_FILESYS for disk drivers that must manipulate partition tables on disk drives. Specifies the value used to con- trol auditing. You can pass one of the system's error codes or one of the following values: -1, 0, 1. An example of an error code is the constant EPERM. DESCRIPTION
The privileged routine checks for an appropriate privilege when the security feature is enabled. Use privileged with a privilege number and with the error_code argument set to the constant EPERM to emulate the traditional behavior of the suser routine. Set error_code to a value of 0 (zero) if you want to check the privilege but not fail the operation if the user does not have the proper privilege. A value of -1 turns off all auditing as well. RETURN VALUES
The privileged routine returns the value 0 (zero) if the process does not have privilege. It returns the value 1 if the process does have privilege. FILES
SEE ALSO
Routines: suser(9r) privileged(9r)

Check Out this Related Man Page

getaudid(2)							System Calls Manual						       getaudid(2)

NAME
getaudid() - get the audit ID (aid) for the current process SYNOPSIS
Remarks This function is provided purely for backward compatibility. HP recommends that new applications use instead. See getauduser(3). DESCRIPTION
returns the audit ID (aid) for the current process. This call is restricted to users with the privilege. Security Restrictions Some or all of the actions associated with this system call require the privilege. Processes owned by the superuser have this privilege. Processes owned by other users may have this privilege, depending on system configuration. See privileges(5) for more information about privileged access on systems that support fine-grained privileges. RETURN VALUE
Upon successful completion, the audit ID is returned; otherwise, a is returned. ERRORS
fails if the following is true: The caller does not have the privilege. AUTHOR
was developed by HP. SEE ALSO
setaudid(2), getauduser(3), setauduser(3), privileges(5). TO BE OBSOLETED getaudid(2)
Man Page

11 More Discussions You Might Find Interesting

1. AIX

[Help] Give privilege to an ordinary user

I'm trying to give a non-root user the right to start IBM HTTP Server, the web server is listening on port 80, but for AIX, ports under 1024 are privilege ports which can be used only by root. /usr/IBMIHS/bin# ./apachectl start (13)Permission denied: make_sock: could not bind to address :::80... (1 Reply)
Discussion started by: ibmer414
1 Replies

2. Solaris

how to enable file auditing

Hi expert , Can you show me the steps to enable file auditing ? Thanks . (2 Replies)
Discussion started by: skully
2 Replies

3. Solaris

Non-root user access to privileged ports-Solaris 8

Please let me know how to setup a non-root user to be able to access a privileged port (<1024) on Solaris 8. I am currently running tomcat as "tomcat" user and I get the following error during to start up: SEVERE: Error initializing endpoint java.net.BindException: Permission denied<null>:443 (5 Replies)
Discussion started by: pingmeback
5 Replies

4. UNIX for Dummies Questions & Answers

what does the x privilege mean?

what does x(in rwx) privilege mean? just text files or shell script files? that's so confusing. (3 Replies)
Discussion started by: kang
3 Replies

5. Solaris

Unix file, folder permissions, security auditing tools.

I want to periodically check if ASCII password/config files on Unix have 400 or 600 access. Folders and files are owned by designated group and user. Folders and Files do not have world write access. Are there any tools/scripts available for this kind of auditing that I can use on Solaris? (7 Replies)
Discussion started by: kchinnam
7 Replies

6. AIX

AIX auditing

can some give some tips, most common security issues or and kind of advice about auditing aix system? regards (2 Replies)
Discussion started by: bongo
2 Replies

7. AIX

sudo - User privilege specification

I am planning to implement sudo for users. Under , it looks I have to put the users who need to have sudo access: What are the recommended for users? I don't think I need to give the ALL privilege (i.e ) to AIX users. I'd like to know the commonly used privilege specification for sudo... (9 Replies)
Discussion started by: Daniel Gate
9 Replies

8. Cybersecurity

sudo - AIX - User privilege specification

I am planning to implement sudo for users. Under , it looks I have to put the users who need to have sudo access: What are the recommended for users? I don't think I need to give the ALL privilege (i.e ) to AIX users. I'd like to know the commonly used privilege specification for sudo... (1 Reply)
Discussion started by: Daniel Gate
1 Replies

9. AIX

User auditing from AIX server

I am trying to find out the information of my local desktop when i use putty to login to an AIX server. This is what I do: 1. login to my PC 2. take a putty session to an AIX server Can i get information of my local desktop from the AIX server ? Is there a command available ? Thanks (8 Replies)
Discussion started by: Nagesh_1985
8 Replies

10. Shell Programming and Scripting

Create user with different privilege

Hi , I want to create 3 different user with below privilege in Solaris and Linux. 1) Read Only 2)Read and Write Only 3) Admin user Can you guys help me on this . (3 Replies)
Discussion started by: Naveen Pathak
3 Replies

11. Solaris

Assigning proc_owner privilege to particular user in RBAC

Hi I need to assign proc_owner privilege to particular user through RBAC. How can I assign this privilege to user, I need help on this. Further I need to understand if I give this proc_owner privilege to particular user, what kind of control user will get on other user or system processes... (7 Replies)
Discussion started by: sb200
7 Replies