Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Centralized user right management method based on UNIX

A technology of centralized management and user rights, applied in the direction of electrical components, transmission systems, etc., can solve problems such as difficult management, difficult dynamic adjustment of centralized management, and inconvenient security audits

Inactive Publication Date: 2015-06-24
陈荣富
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this management method is simple and easy to implement, it also has great management difficulties. For example, it is difficult to control and audit root and high-authority IDs, clarify responsibilities, and it is difficult to implement dynamic adjustments to permissions (such as changing someone's permissions from root to database management) and unified centralized management bring a lot of inconvenience to the security audit of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Centralized user right management method based on UNIX
  • Centralized user right management method based on UNIX

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0012] 1. Create an administrator user admin, which belongs to the group system

[0013] 2. Create the following scripts in the user's home directory (display processes and modules in the form of pseudo-scripts)

[0014]

[0015]

[0016] 1)

[0017] Function: lsuser() (display all users of the system, including user name, group, whether to lock, whether to allow remote login, etc.)

[0018] 2)

[0019] Function: manager_lock() (management user's lock flag, input Y means to lock the user, that is, the user is not allowed to log in, N means to unlock)

[0020] 3)

[0021] Function: manager_remote() (remote login flag of the management user, enter Y to allow the user to log in remotely, and N to prohibit)

[0022] 4)

[0023] Function: manager_password() (management user's password)

[0024] 5)

[0025] Function: manager_authority() (administrative user authority, can grant su to a certain ID authority according to the application, such as su to root, su to oracle, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a centralized user right management method based on UNIX. Duty separation of a system and an application is achieved, the right level is distinct, the operation of high-right ID is limited in a definite range, and therefore the purposes of the controllable risk and the effective audit are achieved.

Description

1. Technical field [0001] The invention relates to a method for centralized management of operating system user rights, in particular to a method for centralized management of user rights based on UNIX. 2. Background technology [0002] UNIX platform (AIX, HP-UNIX, SOLARIS, etc.), as the current mainstream commercial operating system, carries the core applications of important industries. In the daily operation and maintenance of the system, user rights management is a very important content. As the super ID with the highest authority, the scope of use of Root should be strictly limited; other high-authority IDs, such as those involving databases, middleware, and application systems, should also be authorized clearly and have controllable permissions. At present, the common method is that the system maintenance personnel keep and use the super ID, and the application maintenance personnel use the high-privilege ID within the scope of their duties. Although this management ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/10
Inventor 陈荣富
Owner 陈荣富
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products