Solved

Root right and user rights

Posted on 2011-03-25
7
387 Views
Last Modified: 2013-12-04
Hi,

How do I create a user that can do more or less the same as root?

I would like to have the users to be able to restart all services, configure systems  etc.

But I DONT want the user to be able to edit any log messages.. I have to be able to trace fraud.. but that the same time the support team must be able to work with the services..


Is that possible??

Thank you
J

0
Comment
Question by:MrJN
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 15

Assisted Solution

by:DonConsolio
DonConsolio earned 166 total points
ID: 35219247
Check out the "sudo" man page, it does what you need.
0
 
LVL 34

Accepted Solution

by:
PsiCop earned 168 total points
ID: 35222086
Look at my EE Profile for a link to my personal website.

On that website, look in my Projects for a paper entitled Controlled Privilege Escalation in Linux/UNIX Environments

Read that and then let me know if you still have questions.
0
 
LVL 4

Expert Comment

by:ReN501
ID: 35334021
in the /etc/group file , add the user name to  the wheel group , like as follows

wheel:*:0:root,<user>

seperated by a comma and without the <>
0
Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

 
LVL 4

Expert Comment

by:ReN501
ID: 35334036
ok , my comment will not work , disregard plz. sudo is the correct responce.
0
 
LVL 62

Assisted Solution

by:gheist
gheist earned 166 total points
ID: 35405445
You can create another UID 0 user or GID 0 group
This leads to big mess at best because many programs will get the name from id etc etc.

SUDO SUDO SUDO
0
 
LVL 27

Expert Comment

by:Rainer Meller
ID: 36283904
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…
Suggested Courses

628 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question