Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Root right and user rights

Posted on 2011-03-25
7
Medium Priority
?
389 Views
Last Modified: 2013-12-04
Hi,

How do I create a user that can do more or less the same as root?

I would like to have the users to be able to restart all services, configure systems  etc.

But I DONT want the user to be able to edit any log messages.. I have to be able to trace fraud.. but that the same time the support team must be able to work with the services..


Is that possible??

Thank you
J

0
Comment
Question by:MrJN
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 15

Assisted Solution

by:DonConsolio
DonConsolio earned 664 total points
ID: 35219247
Check out the "sudo" man page, it does what you need.
0
 
LVL 34

Accepted Solution

by:
PsiCop earned 672 total points
ID: 35222086
Look at my EE Profile for a link to my personal website.

On that website, look in my Projects for a paper entitled Controlled Privilege Escalation in Linux/UNIX Environments

Read that and then let me know if you still have questions.
0
 
LVL 4

Expert Comment

by:ReN501
ID: 35334021
in the /etc/group file , add the user name to  the wheel group , like as follows

wheel:*:0:root,<user>

seperated by a comma and without the <>
0
What Is Blockchain Technology?

Blockchain is a technology that underpins the success of Bitcoin and other digital currencies, but it has uses far beyond finance. Learn how blockchain works and why it is proving disruptive to other areas of IT.

 
LVL 4

Expert Comment

by:ReN501
ID: 35334036
ok , my comment will not work , disregard plz. sudo is the correct responce.
0
 
LVL 62

Assisted Solution

by:gheist
gheist earned 664 total points
ID: 35405445
You can create another UID 0 user or GID 0 group
This leads to big mess at best because many programs will get the name from id etc etc.

SUDO SUDO SUDO
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 36283904
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question