Questions tagged [authorization]
Questions about either authorization policy (who should be given access to what) or mechanisms (how to enforce the policy, how to grant or deny access).
66 questions
1 vote
0 answers
4k views
Authorization required, but no authorization protocol specified
When changing the hostname in the icewm-session, the application startup breaks down. Such errors are written in the logs .xsession-errors when launching applications: Authorization required, but no ...
0 votes
1 answer
329 views
How does kpasswd change password?
When you change password via kpasswd, does it change your password that is stored on the Kerberos server, or does it change your password that is stored in the OpenLDAP server?
1 vote
0 answers
56 views
Implementation of groups in the linux kernel
Question: Are there any further sources to catch up on the implementation of groups in the linux kernel. The man page about credentials helped me out so far, but I like to delve deeper (though still ...
0 votes
0 answers
139 views
Using OpenBSD /usr/libexec/auth/login_* from command line or other program
This may be an x-y problem and please feel free to point me in other directions as well. I'm trying to write a login mechanism to dovecot's passdb, using either a Lua plugin or a CheckPassword program....
0 votes
1 answer
168 views
client-certificate authentication for SSH
My servers are incessantly being brute-force attacked on my SSH port. I am using non-standard SSH port, firewall blacklist for port-scanners, and I am also using custom fail2ban-like script to ban ...
0 votes
1 answer
932 views
how to enable access to files on the linux server via URL with password protection
I have a Linux centos 7 server. On that server, I started one script which should save images into one folder /images and inside the CSV file. Is there any chance that I can make CSV file and folder ...
0 votes
1 answer
215 views
ssh authorization from id only, without authentication credentials
Numerous sources provide instructions for key-based authentication to an SSH server, rather than password based. In some isolated environments, it is preferable for a server to authorize a user ...
0 votes
1 answer
71 views
Authorize and Unauthorize by adding and remove user to a group
I want to authorize (or unauthorise) by adding (or removing) user to a group. Is it possible to have the changes be effective immediately without having to reboot? I just want to give one time access ...
0 votes
1 answer
385 views
Why do the following netstat, ps, and auth.log have such output?
I seem to be getting a lot of different connections (ssh) on this Ubuntu server I am sshed into. Are these just brute force attempts? When running netstat -tnpa | grep 'ESTABLISHED.*sshd' why do I get ...
1 vote
1 answer
332 views
Fallback for authorized_keys
I'm working on a piece of automation that generates a list of allowed public keys and overwrites a server's user ~./ssh/authorized_keys. Is there a way to prevent a mistake in the automation to ...
0 votes
0 answers
45 views
How to limit user to only cat & exit commands? [duplicate]
I would like to limit a user to only two commands: cat and exit. I've tried to edit visudo but it does not work. My OS version is CentOS 8.
1 vote
0 answers
316 views
How to generate a self signed certificate from openssl having the SPIFFE URI
I have a requirement of generating a SPIFFY Cert from the openssl similar to this here Local SSL Certificates in Chrom(e/ium) 63 can any one suggest on what need to be added to generate the spiffe uri ...
3 votes
2 answers
1k views
Does the root user bypass capability checking?
Does the root user bypass capability checking in the kernel, or is the root user subject to capability checking starting with Linux 2.2? May applications check for and deny access for the root user, ...
3 votes
0 answers
747 views
linux mint very slow boot and authorization
I installed linux Mint. But it's booting too slow (20-30 seconds). Even during authorization it takes 3-5 seconds. Windows, for example, loaded for 5 seconds max. (I have an SSD and mint was also ...
0 votes
1 answer
1k views
How to prevent my additions to authorized keys from being overwritten by puppet?
At my company all employees are given a private key, which get's renewed each year, that they should use to connect to VMs. The SA here have a puppet script which will look up my public key and save ...