Skip to main content

Questions tagged [authorization]

Questions about either authorization policy (who should be given access to what) or mechanisms (how to enforce the policy, how to grant or deny access).

1 vote
0 answers
4k views

When changing the hostname in the icewm-session, the application startup breaks down. Such errors are written in the logs .xsession-errors when launching applications: Authorization required, but no ...
alexanderzhirov's user avatar
0 votes
1 answer
329 views

When you change password via kpasswd, does it change your password that is stored on the Kerberos server, or does it change your password that is stored in the OpenLDAP server?
JLC's user avatar
  • 327
1 vote
0 answers
56 views

Question: Are there any further sources to catch up on the implementation of groups in the linux kernel. The man page about credentials helped me out so far, but I like to delve deeper (though still ...
Semnodime's user avatar
  • 397
0 votes
0 answers
139 views

This may be an x-y problem and please feel free to point me in other directions as well. I'm trying to write a login mechanism to dovecot's passdb, using either a Lua plugin or a CheckPassword program....
Bex's user avatar
  • 768
0 votes
1 answer
168 views

My servers are incessantly being brute-force attacked on my SSH port. I am using non-standard SSH port, firewall blacklist for port-scanners, and I am also using custom fail2ban-like script to ban ...
Martin Vegter's user avatar
0 votes
1 answer
932 views

I have a Linux centos 7 server. On that server, I started one script which should save images into one folder /images and inside the CSV file. Is there any chance that I can make CSV file and folder ...
linija's user avatar
  • 3
0 votes
1 answer
215 views

Numerous sources provide instructions for key-based authentication to an SSH server, rather than password based. In some isolated environments, it is preferable for a server to authorize a user ...
brainchild's user avatar
0 votes
1 answer
71 views

I want to authorize (or unauthorise) by adding (or removing) user to a group. Is it possible to have the changes be effective immediately without having to reboot? I just want to give one time access ...
Porcupine's user avatar
  • 2,176
0 votes
1 answer
385 views

I seem to be getting a lot of different connections (ssh) on this Ubuntu server I am sshed into. Are these just brute force attempts? When running netstat -tnpa | grep 'ESTABLISHED.*sshd' why do I get ...
Yohan's user avatar
  • 3
1 vote
1 answer
332 views

I'm working on a piece of automation that generates a list of allowed public keys and overwrites a server's user ~./ssh/authorized_keys. Is there a way to prevent a mistake in the automation to ...
bitoiu's user avatar
  • 113
0 votes
0 answers
45 views

I would like to limit a user to only two commands: cat and exit. I've tried to edit visudo but it does not work. My OS version is CentOS 8.
kdm.J's user avatar
  • 11
1 vote
0 answers
316 views

I have a requirement of generating a SPIFFY Cert from the openssl similar to this here Local SSL Certificates in Chrom(e/ium) 63 can any one suggest on what need to be added to generate the spiffe uri ...
VManoj's user avatar
  • 21
3 votes
2 answers
1k views

Does the root user bypass capability checking in the kernel, or is the root user subject to capability checking starting with Linux 2.2? May applications check for and deny access for the root user, ...
Shuzheng's user avatar
  • 5,009
3 votes
0 answers
747 views

I installed linux Mint. But it's booting too slow (20-30 seconds). Even during authorization it takes 3-5 seconds. Windows, for example, loaded for 5 seconds max. (I have an SSD and mint was also ...
SageCat's user avatar
  • 153
0 votes
1 answer
1k views

At my company all employees are given a private key, which get's renewed each year, that they should use to connect to VMs. The SA here have a puppet script which will look up my public key and save ...
dsollen's user avatar
  • 814

15 30 50 per page
1
2 3 4 5