Configure sudo to separate users' duty if some people share privileges.
|
|
[1] | Install sudo |
root@dlp:~#
aptitude -y install sudo
|
[2] | Transfer root privilege to a user all. |
root@dlp:~#
# add at the last: user 'pangolin' can use all root privilege
pangolin
ALL=(ALL)
ALL
# how to write ⇒ destination host=(owner) command
# push 'Ctrl + x' key to quit visudo
# make sure with user 'pangolin'
pangolin@dlp:~$
/sbin/shutdown -r now
shutdown: you must be root to do that!
# denied normally
pangolin@dlp:~$
[sudo] password for pangolin:
pangolin@dlp:~$
# pangolin's password
Broadcast message from root@dlp (pts/0) (Sun Mar 6 02:45:10 2011):
The system is going down for reboot NOW!
# executed
|
[3] | In addition to the setting [1], set that some commands are not allowed. |
root@dlp:~#
# add alias for the kind of shutdown commands
# Cmnd alias specification
Cmnd_Alias SHUTDOWN = /sbin/halt, /sbin/shutdown, \
/sbin/poweroff, /sbin/reboot, /sbin/init
# add ( commands in alias 'SHUTDOWN' are not allowed )
pangolin
ALL=(ALL)
ALL,
!SHUTDOWN
# make sure with user 'pangolin'
pangolin@dlp:~$ [sudo] password for pangolin: Sorry, user pangolin is not allowed to execute '/sbin/shutdown -r now' as root on dlp.server.world.
# denied
|
[4] | Transfer some commands with root privilege to users in a group. |
root@dlp:~#
# add aliase for the kind of user management comamnds
# Cmnd alias specification
Cmnd_Alias USERMGR = /usr/sbin/adduser, /usr/sbin/useradd, /usr/sbin/newusers, \
/usr/sbin/deluser, /usr/sbin/userdel, /usr/sbin/usermod, /usr/bin/passwd
# add at the last
%usermgr ALL=(ALL) USERMGR
groupadd usermgr
root@dlp:~#
vi /etc/group
# add a user in this group
usermgr:x:1002:
pangolin
# make sure with user 'pangolin'
pangolin@dlp:~$ pangolin@dlp:~$
# done normally
pangolin@dlp:~$ Enter new UNIX password:
# set testuser's password
Retype new UNIX password: passwd: password updated successfully |
[5] | Transfer a command with root privilege to a user. |
root@dlp:~#
# add at the last
fedora
ALL=(ALL) /usr/sbin/visudo
cent
ALL=(ALL) /usr/sbin/adduser, /usr/sbin/useradd, /usr/sbin/newusers, \
/usr/sbin/deluser, /usr/sbin/userdel, /usr/sbin/usermod, /usr/bin/passwd
suse
ALL=(ALL) /usr/bin/vim
# possible to open and edit
## Sudoers allows particular users to run various commands as ## the root user, without needing the root password. ##
# make sure with user 'cent'
cent@dlp:~$
cent@dlp:~$
# done normally
# make sure with user 'suse'
# possible to open and edit
# ~/.profile: executed by Bourne-compatible login shells. |
[6] | The logs for sudo are kept in '/var/log/auth.log', but there are many kind of logs in it. So if you'd like to keep only sudo's log in a file, Set like follows. |
root@dlp:~#
# add at the last
Defaults syslog=local1
root@dlp:~#
vi /etc/rsyslog.d/50-default.conf
# line 8: add
local1.*
/var/log/sudo.log
auth,authpriv.*
/var/log/auth.log
*.*;auth,authpriv.none
-/var/log/syslog
service rsyslog restart
rsyslog start/running, process 1354
Post a Comment