<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User Access Restriction in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442151#M7952</link>
    <description>You should be able to set up restricted SAM access for these users so they can do a specific task only and nothing else.  See the man pages on sam or the online help.</description>
    <pubDate>Fri, 01 Sep 2000 14:56:38 GMT</pubDate>
    <dc:creator>Tom Danzig</dc:creator>
    <dc:date>2000-09-01T14:56:38Z</dc:date>
    <item>
      <title>User Access Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442149#M7950</link>
      <description>Using HP-UX 10.20, what is the best way to allow help desk workers to have access to only change passwords. I do not want them to have any other access (Unix prompt, SAM, etc....). My boss wants them to only be able to reset/change passwords. We use Exceed, Go-Global and wIntegrate.</description>
      <pubDate>Fri, 01 Sep 2000 14:48:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442149#M7950</guid>
      <dc:creator>David Goza</dc:creator>
      <dc:date>2000-09-01T14:48:37Z</dc:date>
    </item>
    <item>
      <title>Re: User Access Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442150#M7951</link>
      <description>sudo is a good package for this. Will keep logs of who did what and when.&lt;BR /&gt;&lt;BR /&gt;Can be obtained from the porting archieve or from &lt;A href="http://www.courtesan.com" target="_blank"&gt;http://www.courtesan.com&lt;/A&gt;</description>
      <pubDate>Fri, 01 Sep 2000 14:54:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442150#M7951</guid>
      <dc:creator>Rick Garland</dc:creator>
      <dc:date>2000-09-01T14:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: User Access Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442151#M7952</link>
      <description>You should be able to set up restricted SAM access for these users so they can do a specific task only and nothing else.  See the man pages on sam or the online help.</description>
      <pubDate>Fri, 01 Sep 2000 14:56:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442151#M7952</guid>
      <dc:creator>Tom Danzig</dc:creator>
      <dc:date>2000-09-01T14:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: User Access Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442152#M7953</link>
      <description>You could let them use RESTRICTED SAM&lt;BR /&gt;which you have configured only to let them change user passwd</description>
      <pubDate>Fri, 01 Sep 2000 14:57:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442152#M7953</guid>
      <dc:creator>Victor BERRIDGE</dc:creator>
      <dc:date>2000-09-01T14:57:49Z</dc:date>
    </item>
    <item>
      <title>Re: User Access Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442153#M7954</link>
      <description>Hi:&lt;BR /&gt;&lt;BR /&gt;Look at "restricted" SAM.&lt;BR /&gt;&lt;BR /&gt;...JRF...</description>
      <pubDate>Fri, 01 Sep 2000 14:59:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442153#M7954</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2000-09-01T14:59:28Z</dc:date>
    </item>
    <item>
      <title>Re: User Access Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442154#M7955</link>
      <description>the only other safe alternative would be as Rick mentionned: use sudo</description>
      <pubDate>Fri, 01 Sep 2000 14:59:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442154#M7955</guid>
      <dc:creator>Victor BERRIDGE</dc:creator>
      <dc:date>2000-09-01T14:59:34Z</dc:date>
    </item>
    <item>
      <title>Re: User Access Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442155#M7956</link>
      <description>Restricted SAM is a good option.&lt;BR /&gt;As root you can set this up for the person(s) you want to have certain functions.&lt;BR /&gt;Just enter 'sam -r'&lt;BR /&gt;It's fairly straightforward....you should be able to set them up for only the functions you want them to have access too.&lt;BR /&gt;&lt;BR /&gt;Regards,</description>
      <pubDate>Fri, 01 Sep 2000 16:25:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442155#M7956</guid>
      <dc:creator>Rita C Workman</dc:creator>
      <dc:date>2000-09-01T16:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: User Access Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442156#M7957</link>
      <description>Restrictiv SAM (sam -r) for changing password give FULLY rights to the system! Give the right to change the root password as well! &lt;BR /&gt;If I was you, I better create a script under root ownership that replace the password field from /etc/password with a standard one (ex. encryption of password). Create a user that has the default shell this script and give permission to Help desk to execute it for normal user (not root, no bin, lp, and so one)...</description>
      <pubDate>Sat, 02 Sep 2000 05:23:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442156#M7957</guid>
      <dc:creator>Antoanetta Naghiu</dc:creator>
      <dc:date>2000-09-02T05:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: User Access Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442157#M7958</link>
      <description>restricted SAM also can be configured to disallow changing certain users (root, lp, bin...).  So the issue of giving restricted SAM should not be an issue for these.  I have given restricted SAM to our Help Desk technicians and it works very well.</description>
      <pubDate>Sat, 02 Sep 2000 10:46:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442157#M7958</guid>
      <dc:creator>Richard Mertz</dc:creator>
      <dc:date>2000-09-02T10:46:07Z</dc:date>
    </item>
    <item>
      <title>Re: User Access Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442158#M7959</link>
      <description>User Restricted "sam -r". Also disallow password change for users like(root, daemon, bin, adm, lp ...) by your help desk users.&lt;BR /&gt;Create a script with suid bit and put the script path in the helpdesk users shell instead of normal shells like(/usr/sbin/sh, /usr/bin/ksh ....etc), thereby they can run the script/menu and wont have access to prompt nor to shell.</description>
      <pubDate>Sun, 03 Sep 2000 07:04:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442158#M7959</guid>
      <dc:creator>Vincente Fernandes</dc:creator>
      <dc:date>2000-09-03T07:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: User Access Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442159#M7960</link>
      <description>&lt;BR /&gt;In the /etc/passwd file, instead of giving a shell program for your help desk staffs to work with just change that to the /sbin/passwd, so everytime they logged in then only the passwd command will be triggered.&lt;BR /&gt;</description>
      <pubDate>Mon, 04 Sep 2000 08:51:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442159#M7960</guid>
      <dc:creator>Philip Chan_1</dc:creator>
      <dc:date>2000-09-04T08:51:11Z</dc:date>
    </item>
    <item>
      <title>Re: User Access Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442160#M7961</link>
      <description>you can write a simple shell program in which it shows a menu with two options passowrd and quit. and make this shell program as a default shell. So when a user logs in he gets this menu. If he wants he can change the password OR else he can quit the script which will logoff the user.&lt;BR /&gt;may be when the requirement changes, you can alter this shell program to add more options.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 05 Sep 2000 05:29:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/user-access-restriction/m-p/2442160#M7961</guid>
      <dc:creator>Manju Kampli</dc:creator>
      <dc:date>2000-09-05T05:29:00Z</dc:date>
    </item>
  </channel>
</rss>

