Solaris Customization i.e settings depending on  Login ID

Posted on 2002-03-22
Last Modified: 2013-12-27
I am using Solaris 8 on Intel and SUN platforms (OCT 2001 Edition). I have developed a graphical application in C++. Now I want to customize solaris in the following manner.

The system should boot in text mode and prompt for Login info.

If the user is "root" then X-server should start with full access to the system.

But if the user is other than "root", the system should run a my specific application (graphical application)with no access to system what so ever. The system should come back to text login prompt when the user quits the application.

(Actually I want that even novice users ahould be able to use my application without learning the intricacies of solaris. Moreover, they should not be able to fiddle with the system)
Question by:amirabbas
LVL 40

Expert Comment

ID: 6892347
I don't believe you can do this for two reasons. One is that CDE & X can't simply be started from a command line login. And the other is that Unix in general doesn't have that capability of running such an application as a part of the boot process, nor does it have that capability of doing an 'auto-logon' at boot.

What you could do, which I belive would satisfy your requirements, would be to allow CDE to start normally at boot. Root, of course, would be able to login normally, but the application would be accessed via a designated login name. The shell init scripts for that user could be used to start the application.

Expert Comment

ID: 6899562
I have another opinion about this.

Before CDE came and the graphical interface became default we started openwindows in the users login file.

There are systemloginfiles in /etc ( profile for ksh,sh and .login for csh,tcsh) you could start your application or an xwindowsystem in this file based on a check on userid.
CDE is a problem since it default kicks of the login when it starts.

There might be yet another way to do this. Check the manuals for "sessionetc". This is script you can write and put in the dt directory that starts up a mandatory application in the CDE environment for the users who has this file.
That way you can use the dtlogin but hide the not so great CDE from them.

CDE can also be hacked but I would stay away from that since it is going away in a near future.

Happy hacking
LVL 51

Expert Comment

ID: 6904688
hat's what users and groups are for in UNIX.
Simply setup your /etc/passwd and /etc/group, then ssign appropriate permissions to dirs, files and programs according your settings.
You don't nedd a special program for that, it's all standard UNIX/Solaris.

Expert Comment

ID: 6910486
Why do you want to disable X? Just assigning the command to launch your appliction in the shell script of the user  is enough
How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline


Expert Comment

ID: 6913090
Make the last field of the user's entry in the passwd file to be the full path/name of your application.

simple as that.

Regards, Nisus
LVL 20

Expert Comment

ID: 8052599
No comment has been added lately, so it's time to clean up this Topic Area.
I will leave a recommendation for this question in the Cleanup topic area as follows:

- PAQ, no points refunded

Please leave any comments here within the next 7 days


Cleanup Volunteer

Accepted Solution

SpideyMod earned 0 total points
ID: 8099884
per recommendation

Community Support Moderator @Experts Exchange

Expert Comment

ID: 8099935
You have logged on yesterday, so you are still active and using this site.  However, you have a terrible record for closing out your own questions.  I will give you 1 week to close out all of your open questions older then 1 month before I ask site administration to step in at which time they will most likely suspend your account.  Feel free to ask questions here to help you handle your open question, or post in the Community Support area.  

You can get to the list of your opened questions (as can everybody else) by clicking on your login name link at the top left of the site.

You can get to the Community Support Topic area by clickin on it in the list to the left or here:

Below is a list of your open questions for easy reference.

Questions Asked
Last 10 Grades Given
Question Grading Record
7 Answers Graded / 7 Answers Received

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Java performance on Solaris - Managing CPUs There are various resource controls in operating system which directly/indirectly influence the performance of application. one of the most important resource controls is "CPU".   In a multithreaded…
Why Shell Scripting? Shell scripting is a powerful method of accessing UNIX systems and it is very flexible. Shell scripts are required when we want to execute a sequence of commands in Unix flavored operating systems. “Shell” is the command line i…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now