<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: /etc/sudoers.local in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-sudoers-local/m-p/2987657#M123697</link>
    <description>By default, sudo requires that a user authenticate him or herself before running a command. This behavior can be modified via the NOPASSWD tag. Like a Runas_Spec, the NOPASSWD tag sets a default for the commands that follow it in the Cmnd_Spec_List. Conversely, the PASSWD tag can be used to reverse things. For example: &lt;BR /&gt;&lt;BR /&gt;ray rushmore = &lt;BR /&gt;NOPASSWD: /bin/kill, /bin/ls, /usr/bin/lprm &lt;BR /&gt;&lt;BR /&gt;would allow the user ray to run /bin/kill, /bin/ls, and /usr/bin/lprm &lt;BR /&gt;as root on the machine rushmore as root without authenticating &lt;BR /&gt;himself. If we only want ray to be able to run /bin/kill without a &lt;BR /&gt;password the entry would be: &lt;BR /&gt;&lt;BR /&gt;ray rushmore = NOPASSWD: /bin/kill, PASSWD: /bin/ls, /usr/bin/lprm &lt;BR /&gt;</description>
    <pubDate>Tue, 03 Jun 2003 16:46:09 GMT</pubDate>
    <dc:creator>Paul Sperry</dc:creator>
    <dc:date>2003-06-03T16:46:09Z</dc:date>
    <item>
      <title>/etc/sudoers.local</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-sudoers-local/m-p/2987656#M123696</link>
      <description>I've setup /etc/sudoers.local to execute /apps/autosys_np3/install/auto_install&lt;BR /&gt;on our N-class server np3. The purpose of this is to re-install the Autosys software. &lt;BR /&gt;&lt;BR /&gt;My question is - What further step(s) must be taken to activate this local config change so that the autosys auto_install script gets executed? &lt;BR /&gt;&lt;BR /&gt;I wouldn't think that a reboot would be necessary, but, i've had little experience with this /etc/sudoers.local setup.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks in advance for any suggestions/advice/answers&lt;BR /&gt;&lt;BR /&gt;Phillip Boone&lt;BR /&gt;HP Unix/SMG Admin</description>
      <pubDate>Tue, 03 Jun 2003 14:46:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/etc-sudoers-local/m-p/2987656#M123696</guid>
      <dc:creator>Phil Boone</dc:creator>
      <dc:date>2003-06-03T14:46:57Z</dc:date>
    </item>
    <item>
      <title>Re: /etc/sudoers.local</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/etc-sudoers-local/m-p/2987657#M123697</link>
      <description>By default, sudo requires that a user authenticate him or herself before running a command. This behavior can be modified via the NOPASSWD tag. Like a Runas_Spec, the NOPASSWD tag sets a default for the commands that follow it in the Cmnd_Spec_List. Conversely, the PASSWD tag can be used to reverse things. For example: &lt;BR /&gt;&lt;BR /&gt;ray rushmore = &lt;BR /&gt;NOPASSWD: /bin/kill, /bin/ls, /usr/bin/lprm &lt;BR /&gt;&lt;BR /&gt;would allow the user ray to run /bin/kill, /bin/ls, and /usr/bin/lprm &lt;BR /&gt;as root on the machine rushmore as root without authenticating &lt;BR /&gt;himself. If we only want ray to be able to run /bin/kill without a &lt;BR /&gt;password the entry would be: &lt;BR /&gt;&lt;BR /&gt;ray rushmore = NOPASSWD: /bin/kill, PASSWD: /bin/ls, /usr/bin/lprm &lt;BR /&gt;</description>
      <pubDate>Tue, 03 Jun 2003 16:46:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/etc-sudoers-local/m-p/2987657#M123697</guid>
      <dc:creator>Paul Sperry</dc:creator>
      <dc:date>2003-06-03T16:46:09Z</dc:date>
    </item>
  </channel>
</rss>

