9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Oracle Linux 6.5
oracle user's primary group is oinstall and its secondary group is dba,asmdba,asmoper.
For the below created directory, I want the users belonging to dba,asmdba,asmoper to be able create, read and execute files but not delete them. How can I achieve that.
If I use 775 as... (5 Replies)
Discussion started by: kraljic
5 Replies
2. AIX
Hello experts, I canīt remove the vg vgnet after Storage removal (hdisk10)
AIX 7.1 TL 3
/ HOMOLOG > lsvg
rootvg
datavg ... (3 Replies)
Discussion started by: artur_dietrich
3 Replies
3. Shell Programming and Scripting
OS: SUNOS 5.10 i386
Hello guys I wrote a shell script in bash shell to delete the files less than 30 days old. The following is the script.
=======================================
#!/bin/bash
for dirs in `/clu04/oracle/directory_list.lst`
do
find $dirs -type f -mtime -30 -exec rm {} \;... (3 Replies)
Discussion started by: zacsparrow
3 Replies
4. Shell Programming and Scripting
/etc/group
tiadm::345:mk789,po312,jo343,ju454,ko453,yx879,iy345,hn453
bin::2:root,daemon
sys::3:root,bin,adm
adm::4:root,daemon
uucp::5:root
/etc/passwd
mk789:x:234:1::/export/home/dummy:/bin/sh
po312:x:234:1::/export/home/dummy:/bin/sh
ju454:x:234:1::/export/home/dummy:/bin/sh... (6 Replies)
Discussion started by: chidori
6 Replies
5. UNIX for Dummies Questions & Answers
Hi,
please let me know the commands to create new group/delete existing group in unix and assigning users to newly created group.
Thank you in advance. (2 Replies)
Discussion started by: kancherla.sree
2 Replies
6. Shell Programming and Scripting
Hello,
I have a group of text files with many lines in each file.
I need to delete all the lines in each and only leave 2 lines in each file. (3 Replies)
Discussion started by: script_op2a
3 Replies
7. Shell Programming and Scripting
Hi All
I do have a file like this with 6 columns. Groups of data merge together and the group number is indicated above each group.
1
1 12 26 289 3.2e-027 GCGTATGGCGGC
2 12 26 215 6.7e+006 TTCCACCTTTTG
3 9 26 175 ... (1 Reply)
Discussion started by: Lucky Ali
1 Replies
8. AIX
I have a rather large file that needs lines deleted periodically. How may I accomplish this task? Should I run into an error message "not enough disk space" AIX 5.3
Thanks (2 Replies)
Discussion started by: tfort73
2 Replies
9. Shell Programming and Scripting
I have a file in the following format. Groups of data merge together and the group number is indicated above each group.
1
adrf
dfgr
dfg
2
dfgr
dfgr
3
dfef
dfr
fd
4
fgrt
fgr
fgg
5
fgrt
fgr (3 Replies)
Discussion started by: Lucky Ali
3 Replies
smf_security(5) Standards, Environments, and Macros smf_security(5)
NAME
smf_security - service management facility security behavior
DESCRIPTION
The configuration subsystem for the service management facility, smf(5), requires privilege to modify the configuration of a service. Priv-
ileges are granted to a user by associating the authorizations described below to the user through user_attr(4) and prof_attr(4). See
rbac(5).
The following authorization is used to manipulate services and service instances.
solaris.smf.modify Authorized to add, delete, or modify services, service instances, or their properties.
Property Group Authorizations
The smf(5) configuration subsystem associates properties with each service and service instance. Related properties are grouped. Groups may
represent an execution method, credential information, application data, or restarter state. The ability to create or modify property
groups can cause smf(5) components to perform actions that may require operating system privilege. Accordingly, the framework requires
appropriate authorization to manipulate property groups.
Each property group has a type corresponding to its purpose. The core property group types are method, dependency, application, and frame-
work. Additional property group types can be introduced, provided they conform to the extended naming convention in smf(5). The following
basic authorizations, however, apply only to the core property group types:
solaris.smf.modify.method
Authorized to change values or create, delete, or modify a property group of type method.
solaris.smf.modify.dependency
Authorized to change values or create, delete, or modify a property group of type dependency.
solaris.smf.modify.application
Authorized to change values or create, delete, or modify a property group of type application.
solaris.smf.modify.framework
Authorized to change values or create, delete, or modify a property group of type framework.
solaris.smf.modify
Authorized to add, delete, or modify services, service instances, or their properties.
Property group-specific authorization can be specified by properties contained in the property group.
modify_authorization Authorizations allow the addition, deletion, or modification of properties within the property group.
value_authorization Authorizations allow changing the values of any property of the property group except modify_authorization.
The above authorization properties are only used if they have type astring. If an instance property group does not have one of the proper-
ties, but the instance's service has a property group of the same name with the property, its values are used.
Service Action Authorization
Certain actions on service instances may result in service interruption or deactivation. These actions require an authorization to ensure
that any denial of service is a deliberate administrative action. Such actions include a request for execution of the refresh or restart
methods, or placement of a service instance in the maintenance or other non-operational state. The following authorization allows such
actions to be requested:
solaris.smf.manage Authorized to request restart, refresh, or other state modification of any service instance.
In addition, the general/action_authorization property can specify additional authorizations that permit service actions to be requested
for that service instance. The solaris.smf.manage authorization is required to modify this property.
Defined Rights Profiles
Two rights profiles are included that offer grouped authorizations for manipulating typical smf(5) operations.
Service Management
A service manager can manipulate any service in the repository in any way. It corresponds to the solaris.smf.manage and
solaris.smf.modify authorizations.
The service management profile is the minimum required to use the pkgadd(1M) or pkgrm(1M) commands to add or remove software packages
that contain an inventory of services in its service manifest.
Service Operator
A service operator has the ability to enable or disable any service instance on the system, as well as request that its restart or
refresh method be executed. It corresponds to the solaris.smf.manage and solaris.smf.modify.framework authorizations.
Sites can define additional rights profiles customized to their needs.
Remote Repository Modification
Remote repository servers may deny modification attempts due to additional privilege checks. See NOTES.
SEE ALSO
auths(1), profiles(1), pkgadd(1M), pkgrm(1M), prof_attr(4), user_attr(4), rbac(5), smf(5)
NOTES
The present version of smf(5) does not support remote repositories.
SunOS 5.10 2 Dec 04 smf_security(5)