O'Reilly logo

Solaris™ Operating Environment Boot Camp by Dominic Butler, David Rhodes

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using RBAC

Up to this point, we've managed to create some “normal” users, in addition to our existing super-user (root). The problem we now find is that the normal users have little power, while root has absolute power—we don't have anything in between! Unfortunately, this is the way UNIX has worked for quite some time.

Now, however, we can use a package known as RBAC (Role Based Access Control), which we briefly described in Chapter 1, to provide the functionality we want. Using RBAC allows us to accurately control which tasks users can perform and, therefore, reduce the risk of anyone accidentally destroying the system.

Therefore, in this section, we'll try to balance the power a little by creating a user that possesses some of root's capabilities. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required