<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restricting root in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615119#M37352</link>
    <description>You should be able to set up SAM so that the user has restricted access (see the -r option for SAM), i.e. is able to set passwords.&lt;BR /&gt;&lt;BR /&gt;-Santosh</description>
    <pubDate>Fri, 16 Nov 2001 02:28:49 GMT</pubDate>
    <dc:creator>Santosh Nair_1</dc:creator>
    <dc:date>2001-11-16T02:28:49Z</dc:date>
    <item>
      <title>Restricting root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615117#M37350</link>
      <description>Is there a way to give a user access to just reset another user's password and nothing else?  If there is such a way, would this user be able to change root's password?</description>
      <pubDate>Fri, 16 Nov 2001 02:02:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615117#M37350</guid>
      <dc:creator>Global Server Operation</dc:creator>
      <dc:date>2001-11-16T02:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615118#M37351</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I guess if you give a user rstricted access to change the password he should be able to change the password for root also.&lt;BR /&gt;&lt;BR /&gt;Hope this helps.&lt;BR /&gt;&lt;BR /&gt;Regds&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Nov 2001 02:12:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615118#M37351</guid>
      <dc:creator>Sanjay_6</dc:creator>
      <dc:date>2001-11-16T02:12:49Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615119#M37352</link>
      <description>You should be able to set up SAM so that the user has restricted access (see the -r option for SAM), i.e. is able to set passwords.&lt;BR /&gt;&lt;BR /&gt;-Santosh</description>
      <pubDate>Fri, 16 Nov 2001 02:28:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615119#M37352</guid>
      <dc:creator>Santosh Nair_1</dc:creator>
      <dc:date>2001-11-16T02:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615120#M37353</link>
      <description>I'm not too sure if this is a safe thing to do, but if I had to, I'd write a small wrapper to log the details of the user who invoked it, the time, and the id whose password is attempted to be changed.&lt;BR /&gt;&lt;BR /&gt;Please be aware that providing a facility like this could potentially lead to chaos.&lt;BR /&gt;Never underestimate the creativity of your users.&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Nov 2001 02:37:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615120#M37353</guid>
      <dc:creator>Deepak Extross</dc:creator>
      <dc:date>2001-11-16T02:37:34Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615121#M37354</link>
      <description>If you use sam builder&lt;BR /&gt;&lt;BR /&gt;/usr/sbin/sam -r&lt;BR /&gt;&lt;BR /&gt;you can set up a restricted version of sam for a user or a group. &lt;BR /&gt;&lt;BR /&gt;Using a restricted version of sam does not allow you to change the root password, but does allow you to change other passwords (oracle for example). &lt;BR /&gt;&lt;BR /&gt;What I have seen done is a script that uses the passwd command and sudo. This is messy, but it does work. If you use the script option you can have a list of users who are untouchable:&lt;BR /&gt;&lt;BR /&gt;DATE=$(date '+%a %b %d %Y')&lt;BR /&gt;FULLDTE=`date`&lt;BR /&gt;HOSTNAME=`hostname`&lt;BR /&gt;PATH=/bin:/usr/sbin:/opt/sudo/bin:/usr/bin&lt;BR /&gt;BOLD=$(tput smso)&lt;BR /&gt;NORM=$(tput rmso)&lt;BR /&gt;UNTOUCHABLE=/opt/helpdesk/donottouchlist&lt;BR /&gt;LOG=/var/adm/helpdesk.log&lt;BR /&gt;USERFILE=/etc/passwd&lt;BR /&gt;&lt;BR /&gt;change_pass()&lt;BR /&gt;{&lt;BR /&gt;        read user?"Please enter a username: "&lt;BR /&gt;        if grep -q $user $UNTOUCHABLE ; then&lt;BR /&gt;          echo "This user: ${BOLD}$user${NORM} cannot have their password changed."&lt;BR /&gt;          echo "$FULLDTE \t $LOGNAME \t Illegal ACTION!!!! password change for $user" &amp;gt;&amp;gt; $LOG&lt;BR /&gt;          echo ; echo&lt;BR /&gt;          read waiting?"PRESS RETURN TO CONTINUE"&lt;BR /&gt;        else&lt;BR /&gt;          sudo -u root /bin/passwd $user&lt;BR /&gt;          sudo -u root /bin/passwd -f $user&lt;BR /&gt;          echo "$FULLDTE \t $LOGNAME \t changed password for $user" &amp;gt;&amp;gt; $LOG&lt;BR /&gt;        fi&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;This does work quite well, but it's a bit messy and requires sudo to be installed.&lt;BR /&gt;&lt;BR /&gt;Scott.&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Nov 2001 02:48:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615121#M37354</guid>
      <dc:creator>Scott Van Kalken</dc:creator>
      <dc:date>2001-11-16T02:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615122#M37355</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;That is a very dangerous operation. You can try to achieve what you want by using 'sudo'. Sudo is an intelligent suid wrapper. You could wrap 'passwd' and forbid 'passwd root'. However, it's like someone else said: Never underestimate the creativity of your users...&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Paga&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Nov 2001 02:48:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615122#M37355</guid>
      <dc:creator>Marco Paganini</dc:creator>
      <dc:date>2001-11-16T02:48:36Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615123#M37356</link>
      <description>i know you can use restricting sam, but the user will be able to add, delete, and modify users.  The customer is requesting just to reset passwd. Looks like sudo is a good option, but I worry about the vulnerability of root's shell.  If user is creative.....</description>
      <pubDate>Fri, 16 Nov 2001 02:59:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615123#M37356</guid>
      <dc:creator>Global Server Operation</dc:creator>
      <dc:date>2001-11-16T02:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615124#M37357</link>
      <description>Hello again,&lt;BR /&gt;&lt;BR /&gt;I checked here my /etc/sudoers manpage. You can definitely do what you want. You may allow certain users to user certain commands based on regular expressions. This way, you may allow your users to do 'passwd user' as long as 'user' is not root. You can also block in such a way that no other 'passwd' options will be allowed. Coul d be the solution to your problem.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Paga&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Nov 2001 03:13:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615124#M37357</guid>
      <dc:creator>Marco Paganini</dc:creator>
      <dc:date>2001-11-16T03:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615125#M37358</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;I also believe restricted SAM isn't restrictive enough for this instance.  I'd go with sudo though you might try a well written, tightly locked down suid script or program.  Just be careful because passwd with root priviledges is a powerful tool.&lt;BR /&gt;&lt;BR /&gt;Darrell</description>
      <pubDate>Fri, 16 Nov 2001 03:13:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-root/m-p/2615125#M37358</guid>
      <dc:creator>Darrell Allen</dc:creator>
      <dc:date>2001-11-16T03:13:34Z</dc:date>
    </item>
  </channel>
</rss>

