Centralized user right management method based on UNIX
A technology of centralized management and user rights, applied in the direction of electrical components, transmission systems, etc., can solve problems such as difficult management, difficult dynamic adjustment of centralized management, and inconvenient security audits
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0012] 1. Create an administrator user admin, which belongs to the group system
[0013] 2. Create the following scripts in the user's home directory (display processes and modules in the form of pseudo-scripts)
[0014]
[0015]
[0016] 1)
[0017] Function: lsuser() (display all users of the system, including user name, group, whether to lock, whether to allow remote login, etc.)
[0018] 2)
[0019] Function: manager_lock() (management user's lock flag, input Y means to lock the user, that is, the user is not allowed to log in, N means to unlock)
[0020] 3)
[0021] Function: manager_remote() (remote login flag of the management user, enter Y to allow the user to log in remotely, and N to prohibit)
[0022] 4)
[0023] Function: manager_password() (management user's password)
[0024] 5)
[0025] Function: manager_authority() (administrative user authority, can grant su to a certain ID authority according to the application, such as su to root, su to oracle, ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com