User Access Rights


 
Thread Tools Search this Thread
Top Forums UNIX for Dummies Questions & Answers User Access Rights
# 8  
Old 08-27-2009
Does the Cron run .profile before running a task?

---------- Post updated at 01:30 PM ---------- Previous update was at 01:11 PM ----------

Quote:
Originally Posted by scottn
Hi.

You should place the line in your .profile in your home direcoty.

Apparently the crontab does not call .profile before running tasks, so it needs to be manually called from the crontab as follows:

30 00 * * 1-5 . $HOME/.profile; other/scripts/or/commands args
 
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. Red Hat

How to check local accounts have root and user access rights ?

Hi, I have three servers,For 3 servers how i can take output,all the local accounts and details of whether the access is Root or User access. cheers (1 Reply)
Discussion started by: ranjithm
1 Replies

2. Homework & Coursework Questions

user rights

good evening .. I have a plea, who I can help me with a management application user rights on the files in a Unix / Linux I need for college .. .. and not told us no clue .. thank you (1 Reply)
Discussion started by: alex90
1 Replies

3. UNIX for Dummies Questions & Answers

User Add and Rights

Dears, I want to add a user and give him rights only for a spesific folder and take the files via ftp. The user shouldn't see the other files above or belov his folder. lets say I have "user". my directories: /a /b/d /c when I connect to the system I want this "user" to connect... (3 Replies)
Discussion started by: hubatuwang
3 Replies

4. Shell Programming and Scripting

Access rights for users - list

Hi, I would like to retrieve a list of user ids on an AIX server along with the access rights that each id has? Can someone please help me on how this can be achieved? Gayathri (3 Replies)
Discussion started by: ggayathri
3 Replies

5. Red Hat

Dansguardian Access rights

well hi to all The thing is I need to allow particular site to just one or 2 user not to everybody. Can anybody tell me how do i do it. If i put there ip in exception then whole Restriction would be bypassed which i dont want. Your Responses would be highly appreciated THANKS in ADVANCE (0 Replies)
Discussion started by: achtani_jeetu
0 Replies

6. UNIX for Dummies Questions & Answers

Access Rights

Hello Guru, I have very unique requirement , need some help. I have one folder created in one the server A. In this folder , the file getting uploaded from some java based page. then i am calling scp through key file, which works fine in another folder of server B. Currently , what i am... (2 Replies)
Discussion started by: u263066
2 Replies

7. UNIX for Advanced & Expert Users

FTP and access rights

Hello all, I am currently writing an application that besides other thing ,ftps files from remote machines (running linux and solaris). My problem is this: i am connecting to remote machines as a user other than root and i have found that there is a possibility that i will encounter folders with... (3 Replies)
Discussion started by: noam128
3 Replies

8. UNIX for Dummies Questions & Answers

file access rights?

Hi, I want to execute a customised process like rating engine using a shell script from a directory other than the directory where the customizes process is placed. I have tried it in the following way...and faced a issue when shell script is available in directory /dir1/ and customized... (1 Reply)
Discussion started by: vkishore.btw
1 Replies

9. UNIX for Dummies Questions & Answers

Unix access rights

Hi, Is it true that if I am not the root I can not select access permissions to a file that I own so that my friend (who also isn't the root) can access that file? And is it true that the only way to accomplish it is to ask the root to "put" my friend into "my" group? Then I could simply set... (1 Reply)
Discussion started by: rudo
1 Replies

10. HP-UX

User rights

I wan to create a user e.g. Tom. whenever a file is created by user Tom or FTP is done using user as Tom, the rights on the file should be 777 (by default). how can I achieve this. Please help. Its very urgent. (1 Reply)
Discussion started by: sharmavr
1 Replies
Login or Register to Ask a Question
wbemadmin(1M)						  System Administration Commands					     wbemadmin(1M)

NAME
wbemadmin - start Sun WBEM User Manager SYNOPSIS
/usr/sadm/bin/wbemadmin DESCRIPTION
The wbemadmin utility starts Sun WBEM User Manager, a graphical user interface that enables you to add and delete authorized WBEM users and to set their access privileges. Use this application to manage access to groups of managed resources, such as disks and installed software, in the Solaris operating environment. The wbemadmin utility allows you to perform the following tasks: Manage user access rights Use the wbemadmin utility to add, delete, or modify an individual user's access rights to a namespace on a WBEM-enabled system. Manage namespace access rights Use the wbemadmin utility to add, delete, or modify access rights for all users to a namespace. The Sun WBEM User Manager displays a Login dialog box. You must log in as root or a user with write access to the rootsecurity namespace to grant access rights to users. By default, Solaris users have guest privileges, which grants them read access to the default namespaces. Managed resources are described using a standard information model called Common Information Model (CIM). A CIM object is a computer repre- sentation, or model, of a managed resource, such as a printer, disk drive, or CPU. CIM objects can be shared by any WBEM-enabled system, device, or application. CIM objects are grouped into meaningful collections called schema. One or more schemas can be stored in directory- like structures called namespaces. All programming operations are performed within a namespace. Two namespaces are created by default during installation: o root o rootsecurity -- Contains the security classes used by the CIM Object Manager to represent access rights for users and namespaces. When a WBEM client application connects to the CIM Object Manager in a particular namespace, all subsequent operations occur within that namespace. When you connect to a namespace, you can access the classes and instances in that namespace (if they exist) and in any names- paces contained in that namespace. When a WBEM client application accesses CIM data, the WBEM system validates the user's login information on the current host. By default, a validated WBEM user is granted read access to the Common Information Model (CIM) Schema. The CIM Schema describes managed objects on your system in a standard format that all WBEM-enabled systems and applications can interpret. You can set access privileges on individual namespaces or for a user-namespace combination. When you add a user and select a namespace, by default the user is granted read access to CIM objects in the selected namespace. An effective way to combine user and namespace access rights is to first restrict access to a namespace. Then grant individual users read, read and write, or write access to that namespace. You cannot set access rights on individual managed objects. However you can set access rights for all managed objects in a namespace as well as on a per-user basis. If you log in to the root account, you can set the following types of access to CIM objects: o Read Only -- Allows read-only access to CIM Schema objects. Users with this privilege can retrieve instances and classes, but cannot create, delete, or modify CIM objects. o Read/Write -- Allows full read, write, and delete access to all CIM classes and instances. o Write -- Allows write and delete, but not read access to all CIM classes and instances. o None -- Allows no access to CIM classes and instances. Context help is displayed in the left side of the wbemadmin dialog boxes. When you click on a field, the help content changes to describe the selected field. No context help is available on the main User Manager window. The wbemadmin security administration tool updates the following Java classes in the rootsecurity namespace: o Solaris_UserAcl -- Updated when access rights are granted or changed for a user. o Solaris_namespaceAcl -- Updated when access rights are granted or changed for a namespace. USAGE
The wbemadmin utility is not the tool for a distributed environment. It is used for local administration on the machine on which the CIM Object Manager is running. EXIT STATUS
The wbemadmin utility terminates with exit status 0. WARNING
The rootsecurity namespace stores access privileges. If you grant other users access to the rootsecurity namespace, those users can grant themselves or other users rights to all other namespaces. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWwbcor | +-----------------------------+-----------------------------+ SEE ALSO
mofcomp(1M), wbemlogviewer(1M), init.wbem(1M), attributes(5) SunOS 5.10 7 Oct 1999 wbemadmin(1M)