?
Solved

Give users access to su to generic account, but login as themselves with generic disabled?

Posted on 2004-10-13
3
Medium Priority
?
261 Views
Last Modified: 2010-04-22
Hi,

What would be the easiest way to accomplish this.

For security, I need users to login as themselves; however, they need to be able to access a generic account we have.   Can I set it up so they can login as themselves, then su to the generic account, but disable login with the generic account so they are forced to login as themselves?

Thanks

0
Comment
Question by:jkrech17
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 14

Accepted Solution

by:
chris_calabrese earned 1500 total points
ID: 12299384
Sounds like you want to use sudo. You can create the generic account with no valid password and put in rules about who can sudo to that account. You can also restrict people to running specific commands as that user rather than getting general access.
0
 

Author Comment

by:jkrech17
ID: 12299902
Would there be a way to allow them to ssh as themselves and su as the generic account, but not ssh as the generic account?
0
 

Author Comment

by:jkrech17
ID: 12300134
Thanks, I was able to deny ssh to the generic account; however, still allow them to su.  

Thanks for the input and I believe your solution would work too.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question