<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic user capabilities (restricting commands) in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194428#M165342</link>
    <description>I need to create a user that has a lot of restrictions.  I want this user to not be able to do commands like "ls".&lt;BR /&gt;&lt;BR /&gt;umask in the dot profile does seem to set the capabilities for this user to have have write permissions on files this user creates and I used SAM to create this user with the rsh as there shell but I do not the talent to go further.&lt;BR /&gt;&lt;BR /&gt;help,&lt;BR /&gt;Steve</description>
    <pubDate>Tue, 17 Feb 2004 13:34:05 GMT</pubDate>
    <dc:creator>Stephen Badgett</dc:creator>
    <dc:date>2004-02-17T13:34:05Z</dc:date>
    <item>
      <title>user capabilities (restricting commands)</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194428#M165342</link>
      <description>I need to create a user that has a lot of restrictions.  I want this user to not be able to do commands like "ls".&lt;BR /&gt;&lt;BR /&gt;umask in the dot profile does seem to set the capabilities for this user to have have write permissions on files this user creates and I used SAM to create this user with the rsh as there shell but I do not the talent to go further.&lt;BR /&gt;&lt;BR /&gt;help,&lt;BR /&gt;Steve</description>
      <pubDate>Tue, 17 Feb 2004 13:34:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194428#M165342</guid>
      <dc:creator>Stephen Badgett</dc:creator>
      <dc:date>2004-02-17T13:34:05Z</dc:date>
    </item>
    <item>
      <title>Re: user capabilities (restricting commands)</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194429#M165343</link>
      <description>ls is a pretty basic command but:&lt;BR /&gt;&lt;BR /&gt;put the user in a special group.&lt;BR /&gt;&lt;BR /&gt;whence ls &lt;BR /&gt;&lt;BR /&gt;gives you the lcoation of ls&lt;BR /&gt;&lt;BR /&gt;chmod o-x ls  &lt;WITH full="" path=""&gt;&lt;BR /&gt;&lt;BR /&gt;No users outside the root group will not be able to use ls.&lt;BR /&gt;&lt;BR /&gt;For a finer level of control you;ll need ACL&lt;BR /&gt;&lt;BR /&gt;OR:&lt;BR /&gt;&lt;BR /&gt;rsh shell&lt;BR /&gt;&lt;BR /&gt;That user will only get the commands you give  and can not cd up the directory tree. They are in a chroot jail&lt;BR /&gt;&lt;BR /&gt;create a chroot user. Less restrictive shell but same basic concept, can't get out of choot jail, can only get commmands you give.&lt;BR /&gt;&lt;BR /&gt;I'd copy the commands into /home/username/bin for example.&lt;BR /&gt;&lt;BR /&gt;SEP&lt;BR /&gt;&lt;BR /&gt;&lt;/WITH&gt;</description>
      <pubDate>Tue, 17 Feb 2004 13:38:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194429#M165343</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-02-17T13:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: user capabilities (restricting commands)</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194430#M165344</link>
      <description>Hi Steve,&lt;BR /&gt;&lt;BR /&gt;You an use '/usr/bin/rsh' the restricted shell that can be customized to allow the user to do |not to do what you want.&lt;BR /&gt;&lt;BR /&gt;Configure the user with the shell /usr/bin/rsh. Create a profile for this user with only the following statement.&lt;BR /&gt;&lt;BR /&gt;PATH=/usr/restrict/bin&lt;BR /&gt;&lt;BR /&gt;Change the ownership of the .profile to root:root with 400 permissions.&lt;BR /&gt;&lt;BR /&gt;Now copy only the executables that you want the user to run in /usr/restrict/bin. For ex., if you want the user to run only ftp then 'cp /usr/bin/ftp /usr/restrict/bin/ftp'. With this configuration the user can only run ftp on the system.&lt;BR /&gt;&lt;BR /&gt;Rest is upto your choice.&lt;BR /&gt;&lt;BR /&gt;-Sri</description>
      <pubDate>Tue, 17 Feb 2004 13:47:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194430#M165344</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2004-02-17T13:47:40Z</dc:date>
    </item>
    <item>
      <title>Re: user capabilities (restricting commands)</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194431#M165345</link>
      <description>thank you for your reply Sri&lt;BR /&gt;&lt;BR /&gt;I gave the user 'usr/bin/rsh' and created the .profile with the PATH=/usr/restrict/bin and copied what I want this user to exec into a /usr/restrict/bin and login as that user fine.  But, this users is still able to do commands like ls.  I echo'd the PATH from the command line and the PATH was long like a regular user.  I though by create a .profile with a PATH statement would replace the PATH with the new one.  &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 17 Feb 2004 14:39:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194431#M165345</guid>
      <dc:creator>Stephen Badgett</dc:creator>
      <dc:date>2004-02-17T14:39:28Z</dc:date>
    </item>
    <item>
      <title>Re: user capabilities (restricting commands)</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194432#M165346</link>
      <description>Steven &lt;BR /&gt;&lt;BR /&gt;I am also looking at you reply too.&lt;BR /&gt;&lt;BR /&gt;Steve</description>
      <pubDate>Tue, 17 Feb 2004 15:04:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194432#M165346</guid>
      <dc:creator>Stephen Badgett</dc:creator>
      <dc:date>2004-02-17T15:04:05Z</dc:date>
    </item>
    <item>
      <title>Re: user capabilities (restricting commands)</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194433#M165347</link>
      <description>I started over again and it seem that I got the PATH statement to show just the new PATH.&lt;BR /&gt;&lt;BR /&gt;Thanks for you help&lt;BR /&gt;Steve</description>
      <pubDate>Tue, 17 Feb 2004 17:12:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194433#M165347</guid>
      <dc:creator>Stephen Badgett</dc:creator>
      <dc:date>2004-02-17T17:12:01Z</dc:date>
    </item>
    <item>
      <title>Re: user capabilities (restricting commands)</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194434#M165348</link>
      <description>You could install and configure sudo, then put the user in its own group, and give it the fewest possible privileges (as outlined above).&lt;BR /&gt;&lt;BR /&gt;Now you could setup very specific jobs in sudo, perhaps via a shell-script menu. Its not foolproof but will greatly restrict what this user can do, whilst providing an audit trail.&lt;BR /&gt;</description>
      <pubDate>Wed, 18 Feb 2004 03:35:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194434#M165348</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2004-02-18T03:35:28Z</dc:date>
    </item>
    <item>
      <title>Re: user capabilities (restricting commands)</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194435#M165349</link>
      <description>sudo can give you finer level of control for what you need. &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.courtesan.com/sudo" target="_blank"&gt;www.courtesan.com/sudo&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;-Karthik S S</description>
      <pubDate>Wed, 18 Feb 2004 03:42:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194435#M165349</guid>
      <dc:creator>Karthik S S</dc:creator>
      <dc:date>2004-02-18T03:42:30Z</dc:date>
    </item>
    <item>
      <title>Re: user capabilities (restricting commands)</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194436#M165350</link>
      <description>thank you Andrew and Karthik,&lt;BR /&gt;&lt;BR /&gt;Thank you both, I will also look into what sudo is and can do.&lt;BR /&gt;&lt;BR /&gt;Steve</description>
      <pubDate>Wed, 18 Feb 2004 11:44:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-capabilities-restricting-commands/m-p/3194436#M165350</guid>
      <dc:creator>Stephen Badgett</dc:creator>
      <dc:date>2004-02-18T11:44:50Z</dc:date>
    </item>
  </channel>
</rss>

