Delegating Authority

This chapter has spent a lot of time stressing the importance of protecting root privileges at all costs. There are times, however, when delegating this authority to normal users is appropriate and even necessary. You can use any of several tools and methods to delegate this authority safely, including aliases and defaults, controlling access with Solaris 8, and using Unix Group Permissions. The sections that follow offer detailed information about using each of these techniques to delegate access authority and other privileges.

Unix System Privileged Accounts

root may not be the only privileged account on a Unix system. For ...

Get Unix® System Management Primer Plus now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.