privedit man page on HP-UX

Man page or keyword search:  
man Server   10987 pages
apropos Keyword Search (all sections)
Output format
HP-UX logo
[printable version]

privedit(1M)							  privedit(1M)

NAME
       privedit	 -  let authorized users edit files that are under access con‐
       trol

SYNOPSIS
       authorization] file

DESCRIPTION
       allows authorized users to edit files that are otherwise restricted  by
       permissions  or	access	control lists.	Identify which file to edit by
       specifying the file name as an argument	to  the	 command.   After  you
       invoke  the command, checks the database to determine the authorization
       required to edit the file.  If you have	the  necessary	authorization,
       invokes the specified editor to edit the file.

       You can specify which editor uses to edit the file by setting the envi‐
       ronment variable.  If you do not set the	 variable,  uses  the  default
       editor,	You  cannot pass arguments to the editor via the command line.
       However, the editor recognizes and supports editor-specific environment
       variables if you set them before invoking

       You can use a fully qualified file name as a argument to identify which
       file to edit.  If you do not use a fully qualified file name, adds  the
       current	working	 directory to the beginning of the file name you spec‐
       ify.  Regardless of how you specify the file to edit,  all  file	 names
       are fully qualified after invoking The command also recognizes and sup‐
       ports files that are symbolic links.

       can edit only one file at a time.  If you specify multiple  file	 names
       as arguments, edits the first file specified and ignores the subsequent
       file names.

       The HP-UX RBAC feature also provides the ability to customize  how  and
       check user authorizations.  (See privrun(1M).)  The Access Control Pol‐
       icy Switch (ACPS) module of HP-UX RBAC provides responses  to  applica‐
       tions  that  must make authorization decisions.	The ACPS configuration
       file, controls which modules are consulted for making access decisions,
       the sequence in which the modules are consulted, and the rules for com‐
       bining  module  responses  to  return  results  to  applications.   See
       acps.conf(4), acps(3) and rbac(5) for more information.

   Options
       recognizes the following options:

       Match only those entries requiring the specified authorization.
			   The	specified authorization must exactly match the
			   authorization present in the database (that is,  no
			   wildcards allowed).

       Print		   usage or help.

       Check to see if the user has the authorization to edit the file and
			   inform the user of the results.

       If the authorization check fails, edit the file with the caller's
			   original privileges.

       Invoke		   in verbose mode.

   Operands
       recognizes the following operands:

       file		   File to edit.

   The cmd_priv Database
       As  described  in privrun(1M), the file contains information indicating
       which authorizations are required to execute commands  or  edit	files.
       You can also specify a PAM service name in to indicate how should iden‐
       tify itself to PAM if a user must be reauthenticated.

       The file contains any number of entries, where each entry is  specified
       on a single line in the following format:

       {command|file}

       These fields are defined as follows:

       Field		   Description

       command | file	   For the fully qualified path of a file to edit.

			   This	 field	may  contain  wildcards	 as defined in
			   fnmatch(3C).

       arguments	   Ignored.  (Used only by

       The operation the user is required to have on the object
			   specified.  Together, the forms the	authorization.
			   operation  must  be fully qualified and cannot con‐
			   tain a wild card

			   in object requires that the user has the  specified
			   operation on all objects.  (Note: this is satisfied
			   by a specification of in the database if RBAC is in
			   use.)

			   This field may contain the keyword instead of which
			   indicates that no access check is required and  the
			   file can be edited with privilege by any user.

       Ignored.		   (Used only by

       compartment	   Ignored.  (Used only by

       privs		   Ignored.  (Used only by for privileges .)

       pam-service	   Reauthentication  service.	If specified, the user
			   is required to reauthenticate.  The command identi‐
			   fies itself to PAM as the service indicated in this
			   field.  This allows the security officer to require
			   an additional set of authentication/account manage‐
			   ment restrictions for particular files for editing.
			   See pam.conf(4) for a list of PAM services.

			   The	keyword must be used to indicate that no reau‐
			   thorization is required.

       flags		   Flag values can be specified to indicate whether or
			   not can edit a file.	 Additional flag values can be
			   specified to indicate whether can  execute  a  com‐
			   mand.  The specific values allowed are as follows:

			   The file can be both edited and executed.
					  This is mainly intended for scripts.

			   The file cannot be executed.
					  It can only be edited with

			   any	other  token  or empty (nothing after the last
			   ":")
					  The file is a command	 that  can  be
					  executed only.  It cannot be edited.

       The  Authorization field can contain the keyword instead of which indi‐
       cates that no access check is required and the command is invoked  with
       privilege for any user.	The UID and GID entry in field 4 is ignored by
       but the slash character separating the IDs must remain.	The  pam  ser‐
       vice  name  in  field 7 may also be which indicates reauthentication is
       not required.

       White space between each field (immediately surrounding the field sepa‐
       rator in this database is optional and ignored by

       There  may  be  multiple entries with the same file line (but different
       authorization required).	 evaluates each entry in the  order  specified
       in  the	file, continuing on to the next only if the user does not have
       the required authorization.  The command option described above	allows
       users to identify a specific authorization to match or find when multi‐
       ple entries for the same file exist in the database.

EXTERNAL INFLUENCES
   Environment Variables
       specifies the default editor.

       determines the language in which messages are displayed.

   International Code Set Support
       Single-byte character code set is supported.

RETURN VALUE
       Success	 If permitted the user to edit the file, then the return value
		 from is the return value of the editor used to edit the file.

       Failure	 returns  a  value  of	and  an	 appropriate  error message is
		 printed to standard error.

EXAMPLES
   Example 1
       In the following example, the caller invokes to edit

       The database is examined for an entry corresponding to the file If this
       entry is found, then the necessary authorization is retrieved from that
       entry.  then determines whether the user has the	 necessary  authoriza‐
       tion  and whether the file is allowed to be edited as determined by the
       value in the flag field.	 then invokes the editor to edit a copy of  as
       the original file is never edited directly.

       The  environment	 variable  determines which editor invokes.  If a user
       does not set the environment variable, uses the default	editor,	 After
       the  user exits the editor, the edited file replaces the original file.
       The editor is always invoked as the regular user so that there  are  no
       additional privileges given to the user while the file is being edited.

   Example 2
       In  the next example, the caller wants to edit the file with a specific
       authorization of

       If a entry exists for the file with the	associated  authorization  and
       editing	is  allowed  per  the  flag  field,  then the usual authoriza‐
       tion/edit process takes place.  If this entry does not exist, (even  if
       an entry for appears with different associated authorization then fails
       and prints an error message.

FILES
       Database containing valid definitions of all roles.

       Database containing definitions of all valid authorizations.

       Database specifying the roles for each specified user.

       Database defining the authorizations for each role.

       Database that contains the authorization to execute or  edit  specified
       commands
			   or  files,  and the privileges to alter UID and GID
			   for command execution.

SEE ALSO
       privrun(1M), rbacdbchk(1M), acps(3), acps.conf(4), rbac(5).

								  privedit(1M)
[top]

List of man pages available for HP-UX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net