Solved

Create another system admin in Linux

Posted on 2011-02-21
11
351 Views
Last Modified: 2013-12-06
My ERP consultant need to install application on the Red Hat Linux. Is it possible to create another system admin on linux for him to install the application, without giving him the "root" ID ?

Tks
0
Comment
Question by:AXISHK
  • 3
  • 3
  • 2
  • +3
11 Comments
 
LVL 14

Accepted Solution

by:
small_student earned 100 total points
ID: 34941303
Yes there is. its called SUDO

Here is a good guide

http://www.linuxhomenetworking.com/wiki/index.php/Quick_HOWTO_:_Ch09_:_Linux_Users_and_Sudo

With sudo you can allow a normal user to have some/all of root privileges while still using their own credentials. and you can monitor them.
0
 
LVL 12

Assisted Solution

by:upanwar
upanwar earned 100 total points
ID: 34942036
Instead of creating a user with root previlege, SUDO is a good optiong. I agree with small_student. If you require further help to configure SUDO, you can ask us.
0
 
LVL 1

Assisted Solution

by:praveen_expert
praveen_expert earned 100 total points
ID: 34944884
Yes, SUDO can be configured to provide the limited root access. For ex: if you need to install the particular application.

Also we can create a sudo group, and provide the required commands & directories to execute & access.

Let me know the type of application, and commands used to install. so that i can provide you a sudo codes to update the sudoers files.
0
Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

 
LVL 34

Assisted Solution

by:PsiCop
PsiCop earned 100 total points
ID: 34947919
Check out my EE Profile - you'll find a link to my website. On there, look for a paper entitled Controlled Privilege Escalation in Linux/UNIX Environments

It will explain how to safely use the sudo tool recommended above.
0
 

Author Comment

by:AXISHK
ID: 34949453
Thanks.

I have setup a testing Red Hat 5.0 Enterprise and I could already configured it such that Window users could use its own credential to login to the server.

However, I find that any Window server logging to the Red hat server could shutdown the server. Is it the default security setting ? Is it possible to disable system function for those Window domain users and only allow few operators to have full admin operation on this server ?

Great thanks.
0
 
LVL 14

Expert Comment

by:small_student
ID: 34949598
Yes you can do this from PAM, you will find the files under /etc/pam.d/

0
 

Author Comment

by:AXISHK
ID: 34949605
So, this is nothing to do with sudo. To clarify,

- all my Window Domain users could login to the server
- only the few system administration could have full control function on the server.

To archieve this purpose. how to configure it on Red Hat ?

Thanks again.


0
 
LVL 14

Expert Comment

by:small_student
ID: 34950047
Yes it has to do with sudo.

Any user can access commands under /bin and /usr/bin but needs more privileges to run commands under /usr/sbin/

For example your domain users can not run the command /usr/sbin/useradd to create a new Linux user under /etc/passwd and this must be explicitly added to them by using SUDO
0
 

Author Comment

by:AXISHK
ID: 34989688
Put the line "%admin ALL=(ALL) ALL" under visudo. Create a user and already put under "admin" group.

Create a login "itsupport" and put under admin group. When I issue su -s under itsupport 's credential and try to restart the network services, it says that the bash service is not found.

Do I need to do anything beside put under visudo in order for user itsupport to have full root privilege ?

Thanks
0
 
LVL 31

Assisted Solution

by:farzanj
farzanj earned 100 total points
ID: 35017088
For the user you need the following command

sudo su -

In general for any command you need to add sudo in front of it, with the syntax
sudo command
0
 
LVL 34

Expert Comment

by:PsiCop
ID: 35022896
Mind you, once someone does that, they have total, complete control over the system.

There is NOTHING that they cannot do - including altering log files.

Make sure that:

a) You trust them
b) They know what they are doing
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This document is written for Red Hat Enterprise Linux AS release 4 and ORACLE 10g.  Earlier releases can be installed using this document as well however there are some additional steps for packages to be installed see Metalink. Disclaimer: I hav…
1. Introduction As many people are interested in Linux but not as many are interested or knowledgeable (enough) to install Linux on their system, here is a safe way to try out Linux on your existing (Windows) system. The idea is that you insta…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question