<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secure User in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-user/m-p/2674187#M51652</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Strictly speaking, I don't think you want to restrict the user to just only write files in /home/user.&lt;BR /&gt;&lt;BR /&gt;There are a lot of programs that require temporary files to be written especially in /tmp and /var/tmp (such as vi). &lt;BR /&gt;&lt;BR /&gt;If you remove the write access, then such programs are likely to encounter difficulties in running. You may have to perform quite a bit of reconfiguration as a result.&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
    <pubDate>Fri, 01 Mar 2002 10:27:47 GMT</pubDate>
    <dc:creator>Steven Sim Kok Leong</dc:creator>
    <dc:date>2002-03-01T10:27:47Z</dc:date>
    <item>
      <title>Secure User</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-user/m-p/2674185#M51650</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I have created a standard unix user with ksh shell.&lt;BR /&gt;Is there a way of only allowing the user to create files in his home directory ?&lt;BR /&gt;I have tried using /home/user/./ but doesn't work&lt;BR /&gt;&lt;BR /&gt;Cheers</description>
      <pubDate>Fri, 01 Mar 2002 10:08:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secure-user/m-p/2674185#M51650</guid>
      <dc:creator>Stephen Young_1</dc:creator>
      <dc:date>2002-03-01T10:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: Secure User</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-user/m-p/2674186#M51651</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;One way is to use chroot, so that the virtual root is /home/user&lt;BR /&gt;&lt;BR /&gt;The other way is to use restricted sam, force the user to run sam upon login in the /etc/profile or /etc/csh.login within traps.&lt;BR /&gt;&lt;BR /&gt;In your restricted sam, configure a script that prompts the user for a file to be created. This script sanitizes the input and removes any pathname attached ie. only taking the filename. &lt;BR /&gt;&lt;BR /&gt;In this way, the user can only create files in his home directory. You can also restrict the commands this user can perform using restricted sam.&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
      <pubDate>Fri, 01 Mar 2002 10:13:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secure-user/m-p/2674186#M51651</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-03-01T10:13:53Z</dc:date>
    </item>
    <item>
      <title>Re: Secure User</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-user/m-p/2674187#M51652</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Strictly speaking, I don't think you want to restrict the user to just only write files in /home/user.&lt;BR /&gt;&lt;BR /&gt;There are a lot of programs that require temporary files to be written especially in /tmp and /var/tmp (such as vi). &lt;BR /&gt;&lt;BR /&gt;If you remove the write access, then such programs are likely to encounter difficulties in running. You may have to perform quite a bit of reconfiguration as a result.&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
      <pubDate>Fri, 01 Mar 2002 10:27:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secure-user/m-p/2674187#M51652</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-03-01T10:27:47Z</dc:date>
    </item>
  </channel>
</rss>

