<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User Privileges in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/user-privileges/m-p/2920009#M109274</link>
    <description>use sudo or super&lt;BR /&gt;&lt;BR /&gt;sudo-1.6.6&lt;BR /&gt;A package to allow commands to be run as the superuser. Sudo determines who is an authorised user by consulting your /etc/sudoers database. The program prompts for a user's password to initiate a validation period of N minutes, here N is defined at installation time. N.B. There is no easy way to prevent a user from gaining a root shell if he has access to commands that are shell scripts or that allow shell escapes.&lt;BR /&gt;&lt;A href="http://hpux.cs.utah.edu/hppd/hpux/Sysadmin/sudo-1.6.6/" target="_blank"&gt;http://hpux.cs.utah.edu/hppd/hpux/Sysadmin/sudo-1.6.6/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;super-3.9.7&lt;BR /&gt;Super allows users to execute commands as a superuser. It can restrict which users on which hosts are allowed to execute setuid-root programs on a per-program and per-user basis. It is not restricted to running a program as root, it allows named users to execute programs as other users.&lt;BR /&gt;&lt;A href="http://hpux.cs.utah.edu/hppd/hpux/Sysadmin/super-3.9.7/" target="_blank"&gt;http://hpux.cs.utah.edu/hppd/hpux/Sysadmin/super-3.9.7/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Wed, 05 Mar 2003 17:26:06 GMT</pubDate>
    <dc:creator>Paul Sperry</dc:creator>
    <dc:date>2003-03-05T17:26:06Z</dc:date>
    <item>
      <title>User Privileges</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-privileges/m-p/2920008#M109273</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;May sound like a stupid question, but does anyone know of a safe and secure method of allowing a normal user to perform &lt;BR /&gt;administration tasks.  &lt;BR /&gt;&lt;BR /&gt;Tasks, such as creating/managing/deleting user accounts and printers.  &lt;BR /&gt;&lt;BR /&gt;We need to restrict root access to our hp-ux servers.&lt;BR /&gt;&lt;BR /&gt;Any help/suggestions/advice very much appreciated.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Oliver</description>
      <pubDate>Wed, 05 Mar 2003 17:22:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-privileges/m-p/2920008#M109273</guid>
      <dc:creator>Oliver McNamee_2</dc:creator>
      <dc:date>2003-03-05T17:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: User Privileges</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-privileges/m-p/2920009#M109274</link>
      <description>use sudo or super&lt;BR /&gt;&lt;BR /&gt;sudo-1.6.6&lt;BR /&gt;A package to allow commands to be run as the superuser. Sudo determines who is an authorised user by consulting your /etc/sudoers database. The program prompts for a user's password to initiate a validation period of N minutes, here N is defined at installation time. N.B. There is no easy way to prevent a user from gaining a root shell if he has access to commands that are shell scripts or that allow shell escapes.&lt;BR /&gt;&lt;A href="http://hpux.cs.utah.edu/hppd/hpux/Sysadmin/sudo-1.6.6/" target="_blank"&gt;http://hpux.cs.utah.edu/hppd/hpux/Sysadmin/sudo-1.6.6/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;super-3.9.7&lt;BR /&gt;Super allows users to execute commands as a superuser. It can restrict which users on which hosts are allowed to execute setuid-root programs on a per-program and per-user basis. It is not restricted to running a program as root, it allows named users to execute programs as other users.&lt;BR /&gt;&lt;A href="http://hpux.cs.utah.edu/hppd/hpux/Sysadmin/super-3.9.7/" target="_blank"&gt;http://hpux.cs.utah.edu/hppd/hpux/Sysadmin/super-3.9.7/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 05 Mar 2003 17:26:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-privileges/m-p/2920009#M109274</guid>
      <dc:creator>Paul Sperry</dc:creator>
      <dc:date>2003-03-05T17:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: User Privileges</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-privileges/m-p/2920010#M109275</link>
      <description>You need to take a look at sudo, available from the porting and archive center:&lt;BR /&gt;&lt;BR /&gt; &lt;A href="http://hpux.connect.org.uk/" target="_blank"&gt;http://hpux.connect.org.uk/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Pete</description>
      <pubDate>Wed, 05 Mar 2003 17:26:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-privileges/m-p/2920010#M109275</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2003-03-05T17:26:20Z</dc:date>
    </item>
    <item>
      <title>Re: User Privileges</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-privileges/m-p/2920011#M109276</link>
      <description>You could also look at restricted SAM (sam -r)&lt;BR /&gt;&lt;BR /&gt;Pete</description>
      <pubDate>Wed, 05 Mar 2003 17:27:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-privileges/m-p/2920011#M109276</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2003-03-05T17:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: User Privileges</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-privileges/m-p/2920012#M109277</link>
      <description>That's what SAM was made for, restricted root access for users that want to "BEROOT".</description>
      <pubDate>Wed, 05 Mar 2003 17:46:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-privileges/m-p/2920012#M109277</guid>
      <dc:creator>Michael Steele_2</dc:creator>
      <dc:date>2003-03-05T17:46:34Z</dc:date>
    </item>
  </channel>
</rss>

