Solved

Second & Third "root" access

Posted on 2004-08-09
8
223 Views
Last Modified: 2013-12-15
Dear Expert,
I would like to implement below root access security:
Primary administrator to have root acc & PW,
Secondary administrator to have root2 acc & PW,
The superior of Pri admin & Sec Admin to have root3 acc & PW.
Rules:
- root3 can change root & root2 account anytime when the superior need to access root or root2 account.
- both root2 & root3 have similar root priviledges

Can this be done for root account access security & tracability purpose.
Is there any better way?

Thank you.
0
Comment
Question by:omloo
8 Comments
 
LVL 45

Accepted Solution

by:
sunnycoder earned 43 total points
ID: 11751120
Hi omloo,

use sudo
http://www.courtesan.com/sudo/

Sunnycoder
0
 
LVL 10

Expert Comment

by:prakash_prk
ID: 11751799
Hi  omloo

for what pupose you need this??

As sunnycoder said you try sudo

sudo allows  administrator to give certain users the ability to run some  commands as root or another user .

use the command visudo to edit the /etc/sudeors file



0
 
LVL 22

Assisted Solution

by:pjedmond
pjedmond earned 41 total points
ID: 11754887
Depending on what you are trying to do and administer, it may be that webmin/usermin suits your purposes in that various rights can be granted to each user by the root user as required - This is very nice graphical user interface that may be possible to configure to suit your requirements:

http://www.webmin.com/
0
 
LVL 4

Expert Comment

by:jonesy2k
ID: 11780706
What you must remember is that a true root user has full and unrestricted access to the whole system and as such can have no superior. A root user can do whatever he wants.

Having said that, I agree with the others. If you only need for these users to run some commands as root, sudo is the way to go.

Remember that even being allowed to run a few commands as root could mean priveledge escalation to full root access if you're not careful what you give access to.
0
 
LVL 51

Assisted Solution

by:ahoffmann
ahoffmann earned 41 total points
ID: 11803366
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

This is the error message I got (CODE) Error caused by incompatible libmp3lame 3.98-2 with ffmpeg I've googled this error message and found out sometimes it attaches this note "can be treated with downgrade libmp3lame to version 3.97 or 3.98" …
I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now