Solved

Second & Third "root" access

Posted on 2004-08-09
8
227 Views
Last Modified: 2013-12-15
Dear Expert,
I would like to implement below root access security:
Primary administrator to have root acc & PW,
Secondary administrator to have root2 acc & PW,
The superior of Pri admin & Sec Admin to have root3 acc & PW.
Rules:
- root3 can change root & root2 account anytime when the superior need to access root or root2 account.
- both root2 & root3 have similar root priviledges

Can this be done for root account access security & tracability purpose.
Is there any better way?

Thank you.
0
Comment
Question by:omloo
8 Comments
 
LVL 45

Accepted Solution

by:
sunnycoder earned 43 total points
ID: 11751120
Hi omloo,

use sudo
http://www.courtesan.com/sudo/

Sunnycoder
0
 
LVL 10

Expert Comment

by:prakash_prk
ID: 11751799
Hi  omloo

for what pupose you need this??

As sunnycoder said you try sudo

sudo allows  administrator to give certain users the ability to run some  commands as root or another user .

use the command visudo to edit the /etc/sudeors file



0
 
LVL 22

Assisted Solution

by:pjedmond
pjedmond earned 41 total points
ID: 11754887
Depending on what you are trying to do and administer, it may be that webmin/usermin suits your purposes in that various rights can be granted to each user by the root user as required - This is very nice graphical user interface that may be possible to configure to suit your requirements:

http://www.webmin.com/
0
 
LVL 4

Expert Comment

by:jonesy2k
ID: 11780706
What you must remember is that a true root user has full and unrestricted access to the whole system and as such can have no superior. A root user can do whatever he wants.

Having said that, I agree with the others. If you only need for these users to run some commands as root, sudo is the way to go.

Remember that even being allowed to run a few commands as root could mean priveledge escalation to full root access if you're not careful what you give access to.
0
 
LVL 51

Assisted Solution

by:ahoffmann
ahoffmann earned 41 total points
ID: 11803366
0

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
lunix and unix command 21 89
linux SFTP 8 63
Apache module 5 47
Trying to install php56 on CentOS 7 get GPG error 5 30
Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question