• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 201
  • Last Modified:

Checking if user is root or normal user for linux

hi

I am building an application which i only want the root users to be able to use, so that if a normal user attempts to run the program they are not allowed in. I am guessing that I have to use If/else to check if the user is root,  so that if they arent i can display a message something like  Showmessage('You must be under root to run this application');  . Is this possible? thanks in advance

0
itektas
Asked:
itektas
1 Solution
 
monirCommented:

Simply use the function (IsAdministrator)

function IsAdministrator: Boolean;

You can find this function at JclSecurity unit from Project JEDI Code Library (JCL).

JCL library can be found at:
http://projectjedi.sourceforge.net/

This library is free and come with full source code!!

Monir.
0
 
thegettaCommented:
Begin
       If IsAdministrator = False Then
       Begin
               showmessage('error');
               exit;
         end;

End;

function IsAdministrator: Boolean;
var
  psidAdmin: Pointer;
  Token: THandle;
  Count: DWORD;
  TokenInfo: PTokenGroups;
  HaveToken: Boolean;
  I: Integer;
begin
  Result := False;
  psidAdmin := nil;
  TokenInfo := nil;
  HaveToken := False;
  try
    HaveToken := OpenThreadToken(GetCurrentThread, TOKEN_QUERY, True, Token);
    if (not HaveToken) and (GetLastError = ERROR_NO_TOKEN) then
      HaveToken := OpenProcessToken(GetCurrentProcess, TOKEN_QUERY, Token);
    if HaveToken then
    begin
      Win32Check(AllocateAndInitializeSid(SECURITY_NT_AUTHORITY, 2,
        SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0,
        psidAdmin));
      if GetTokenInformation(Token, TokenGroups, nil, 0, Count) or
       (GetLastError <> ERROR_INSUFFICIENT_BUFFER) then
         RaiseLastOSError;
      TokenInfo := PTokenGroups(AllocMem(Count));
      Win32Check(GetTokenInformation(Token, TokenGroups, TokenInfo, Count, Count));
      for I := 0 to TokenInfo^.GroupCount - 1 do
      begin
        {$RANGECHECKS OFF} // Groups is an array [0..0] of TSIDAndAttributes, ignore ERangeError
        Result := EqualSid(psidAdmin, TokenInfo^.Groups[I].Sid);
        {$IFDEF RANGECHECKS_ON}
        {$RANGECHECKS ON}
        {$ENDIF RANGECHECKS_ON}
        if Result then
          Break;
      end;
    end;
  finally
    if TokenInfo <> nil then
      FreeMem(TokenInfo);
    if HaveToken then
      CloseHandle(Token);
    if psidAdmin <> nil then
      FreeSid(psidAdmin);
  end;
end;
0
 
monirCommented:


 thegetta stole the code from JEDI Code Library !!!!
0
Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

 
itektasAuthor Commented:
I can not find it on the website actually, when i go to the link "jedi code library"  i can not see any links that talk about jcl security?! and isnt that code for windows? i can see lines in it where it says " win32"
0
 
itektasAuthor Commented:
i have briefly tried it and it doesnt seem to work, i am using delphi under linux not windows?
0
 
itektasAuthor Commented:
ok the code that you guys are talking about i have found the same on the borland developer support site;

http://community.borland.com/article/0,1410,26752,00.html 

but it is only for windows! when i try to use it with delphi in linux i get loads of compiler errors.

:(
0
 
PashaModCommented:
Question closed and points refunded

PashaMod
Cs Moderator
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Cloud Class® Course: Certified Penetration Testing

This CPTE Certified Penetration Testing Engineer course covers everything you need to know about becoming a Certified Penetration Testing Engineer. Career Path: Professional roles include Ethical Hackers, Security Consultants, System Administrators, and Chief Security Officers.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now