Unix Account


 
Thread Tools Search this Thread
Top Forums UNIX for Dummies Questions & Answers Unix Account
# 1  
Old 07-21-2008
Unix Account

What is the command if i want to view the script of the user being executed.
 
Login or Register to Ask a Question

Previous Thread | Next Thread

7 More Discussions You Might Find Interesting

1. Post Here to Contact Site Administrators and Moderators

Cant close UNIX.com account

Hi, Can someone point me in the direction of the "close account" or "delete account" page, as i no longer want my account. I have sent 2 messages to the webmaster who has just ignored my message, and there is no advice in the faq and googling brings no answer. I want to remove my account... (1 Reply)
Discussion started by: Fanny Zoddar
1 Replies

2. UNIX for Dummies Questions & Answers

Create a unix account

Hi, Please could some advise how to create a unix account, from the root account. thanks you (2 Replies)
Discussion started by: venhart
2 Replies

3. UNIX for Dummies Questions & Answers

How to enable a disabled Unix account on HP-UX

I am very new to Unix. We have a Unix user account that was disabled due to multiple tries with an invalid password. How to enable the account? (1 Reply)
Discussion started by: kajap
1 Replies

4. UNIX for Dummies Questions & Answers

How to create an account on UNIX-server

How can i create an account on my UNIX-server? 1. The files, can't be deleted by that person. (or better: he can only delete his own upped files, or can delete files, but can't see mine) 2. He can upload files. 3. I can delete and see everything. Hope you guys can help me. B.T.W. nice... (1 Reply)
Discussion started by: SEC
1 Replies

5. UNIX for Dummies Questions & Answers

Forwarding Mail from Unix account

I have a simple question. i have an e-mail account with an ISP on a Solaris box. I want to forward all the mail that comes to "only" me to another POP3 account. I used to have the commands written down on how to forward all but I have lost them. Is there a way to forward only e-mails that... (2 Replies)
Discussion started by: jsillers
2 Replies

6. UNIX for Dummies Questions & Answers

purchasing a unix account

i just want to know if there is any place that i can purchase a unix account to use for life. i don't like the hassle of changing my email address every time i enter a new university/workplace, and i'd like some place to store files that i can access around the world. thanks! (2 Replies)
Discussion started by: 1515
2 Replies

7. UNIX for Dummies Questions & Answers

unix shell account

i purchased a unix shell account and got myself into a bit of trouble with my providers heh i got 3 automated emails telling me i had 3 background processes running, and my limit is two, which i knew. after a couple of emails between myself and a human being, he suggested i look up... (2 Replies)
Discussion started by: turf
2 Replies
Login or Register to Ask a Question
krb5_auth_rules(5)					Standards, Environments, and Macros					krb5_auth_rules(5)

NAME
krb5_auth_rules - overview of Kerberos V5 authorization DESCRIPTION
When kerberized versions of the ftp, rdist, rcp, rlogin, rsh, telnet, or ssh clients are used to connect to a server, the identity of the originating user must be authenticated to the Kerberos V5 authentication system. Account access can then be authorized if appropriate entries exist in the ~/.k5login file, the gsscred table, or if the default GSS/Kerberos authentication rules successfully map the Kerberos principal name to Unix login name. To avoid security problems, the ~/.k5login file must be owned by the remote user on the server the client is attempting to access. The file should contain a private authorization list comprised of Kerberos principal names of the form principal/instance@realm. The /instance vari- able is optional in Kerberos principal names. For example, different principal names such as jdb@ENG.ACME.COM and jdb/happy.eng.acme.com@ENG.ACME.COM would each be legal, though not equivalent, Kerberos principals. The client is granted access if the ~/.k5login file is located in the login directory of the remote user account and if the originating user can be authenticated to one of the principals named in the file. See gkadmin(1M) and kadm5.acl(4) for more information on Kerberos principal names. When no ~/.k5login file is found in the remote user's login account, the Kerberos V5 principal name associated with the originating user is checked against the gsscred table. If a gsscred table exists and the principal name is matched in the table, access is granted if the Unix user ID listed in the table corresponds to the user account the client is attempting to access. If the Unix user ID does not match, access is denied. See gsscred(1M). For example, an originating user listed in the gsscred table with the principal name jdb@ENG.ACME.COM and the uid 23154 is granted access to the jdb-user account if 23154 is also the uid of jdb-user listed in the user account database. See passwd(4). Finally, if there is no ~/.k5login file and the Kerberos V5 identity of the originating user is not in the gsscred table, or if the gsscred table does not exist, the client is granted access to the account under the following conditions (default GSS/Kerberos auth rules): o The user part of the authenticated principal name is the same as the Unix account name specified by the client. o The realm part of the client and server are the same, unless the krb5.conf(4) auth_to_local_realm parameter is used to create equivalence. o The Unix account name exists on the server. For example, if the originating user has the principal name jdb@ENG.ACME.COM and if the server is in realm SALES.ACME.COM, the client would be denied access even if jdb is a valid account name on the server. This is because the realms SALES.ACME.COM and ENG.ACME.COM differ. The krb5.conf(4) auth_to_local_realm parameter also affects authorization. Non-default realms can be equated with the default realm for authenticated name-to-local name mapping. FILES
~/.k5login Per user-account authorization file. /etc/passwd System account file. This information may also be in a directory service. See passwd(4). ATTRIBUTES
See attributes(5) for a description of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Interface Stability |Evolving | +-----------------------------+-----------------------------+ SEE ALSO
ftp(1), rcp(1), rdist(1), rlogin(1), rsh(1), telnet(1), gkadmin(1M), gsscred(1M), kadm5.acl(4), krb5.conf(4), passwd(4), attributes(5), gss_auth_rules(5) SunOS 5.11 07 Apr 2006 krb5_auth_rules(5)