Solved

remote access to the redhat linux server

Posted on 2007-12-06
4
1,813 Views
Last Modified: 2013-12-06
Dear Sir/Madam:

I have redhat linux enterprise version 5 as network opearating system  in my lan which can be accessed from the remote by ssh , we have software development team in the remote place now they have to login to this server from remote install and test the developed application , application is developed using java , mysql and apache  this is fine , problem is i do not want to give the  ssh root access to login from the remote place but if given ordinary ssh login they will not able able to install , remove packages of apache , mysql and java packages also they cannot start or stop the services , please suggest me how to give them the full access for these work and deny other access, please help me step by step.

Please help me on this


0
Comment
Question by:D_wathi
4 Comments
 
LVL 19

Accepted Solution

by:
alextoft earned 500 total points
ID: 20420305
You're asking how you can give them root access without giving them root access... interesting.

How about giving them a virtual machine to play with? RedHat 5 comes with Xen, or there is the free VMware server option. Then they can have a server to test on with root access.
0
 
LVL 88

Expert Comment

by:rindi
ID: 20420444
Standard operation is that SSH doesn't have root rights anyway. Once you have logged in as a standard user you can use su or sudo to allow the logged in user to install things or administrate the system. You just have to add the user to the /etc/sudoer file, or add him to the group that is allowed to su.
0
 

Expert Comment

by:vanista
ID: 20420729
Sudo is the way, but you might want to give restricted permissions. It is possible to define a precise list of executables which your users will be able to access without entering a password. Once your sudoers are configured, users must use 'sudo' to call the executables.


Example /etc/sudoers


# /etc/sudoers : edit only as root with 'visudo'
 
 
# Define aliases
User_Alias	OPERATORS  = a, b, c
Cmnd_Alias	OPERATIONS = /usr/sbin/command_a /sbin/command_b
 
# Default permissions for root and admin user group
root		ALL = (ALL) ALL
%admin		ALL = (ALL) ALL
 
# Special permissions for OPERATORS, can execute all OPERATIONS without password
OPERATORS	ALL = NOPASSWD: OPERATIONS

Open in new window

0
 
LVL 14

Expert Comment

by:arrkerr1024
ID: 20420881
Just to clarify what other's have said "sudo" stands for "super-user do".  It allows a normal user to "do" things are a "super user".  This access is controlled by a configuration file, /etc/sudoers, that tells the sudo command who can run what.  You should always edit the sudoers file by typing "visudo", not directly.  You can customize it up the wazoo... see the man page or your system may have come with a good example (redhat does).

I would really suggest, as alextoft suggested, that they do their actual testing in a virtual machine.  Or another physical machine that you give them root access to.  They're going to screw it up and change an unknown billion options.  They should give you precise step-by-step instructions on how to install it on a staging server.  This is a good exercise that ALL software/development companies should do.  Otherwise you're going to have to re-load this later and you'll be SOL.
0

Featured Post

Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Linux SSH Error 9 120
Database client version mismatch in PhpMyAdmin 4 74
BASH script to modify crontab? 3 68
Using init script with Systemd: need help crafting unit file 11 114
Have you ever been frustrated by having to click seven times in order to retrieve a small bit of information from the web, always the same seven clicks, scrolling down and down until you reach your target? When you know the benefits of the command l…
The purpose of this article is to fix the unknown display problem in Linux Mint operating system. After installing the OS if you see Display monitor is not recognized then we can install "MESA" utilities to fix this problem or we can install additio…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

823 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question