Role-based System Administration or Who, What, Where, and How
نویسنده
چکیده
Traditionally, access for performing system administration tasks is an all or nothing proposition. With root access, an administrator can potentially make many changes to a system even though you may only want to allow them to add a user or mount a filesystem. In addition to specific tasks, you may want to control what tasks an administrator can perform based on which machine they are using. For some tasks, you also want to manage how those tasks are performed. For instance, when you add a user, you usually want to make sure the user ID is unique and is not zero. This paper defines requirements for a role-based system administration environment. It describes and compares traditional solutions such as restricted shells, multiple root accounts, and setuid programs. The comparisons are made in the context of the requirements defined and are used to introduce the motivation and need for an alternative solution. The solution proposed in this paper is object oriented and is based on the draft POSIX 1003.7 standard. Where appropriate, specific implementations (such as the Tivoli Management Environment) will be referenced. These examples will include lessons learned at Tivoli in developing and using an object-oriented system administration tool.
منابع مشابه
مدیر موفق کیست؟
Who is a really successful manager? A manager who spends less money, or the one who earns more? A manager who can survive for a longer period of time, or an administrator who expands his organization, and opens up new branches? Which one is the most successful? The article tries to answer these questions and provides, some simple guidlines for the managers in every domain of management who wan...
متن کاملImplementing Health in All Policies – Time and Ideas Matter Too!; Comment on “Understanding the Role of Public Administration in Implementing Action on the Social Determinants of Health and Health Inequities”
Carey and Friel suggest that we turn to knowledge developed in the field of public administration, especially new public governance, to better understand the process of implementing health in all policies (HiAP). In this commentary, I claim that theories from the policy studies bring a broader view of the policy process, complementary to that of new public governance. Drawing on the policy stud...
متن کاملModeling and Identification Based On CAN Network Information in Iranian Cars
Modeling and identification of the system of Iranian cars is one of the most basic needs of automotive and consumer groups and has a broad role for safe driving. It has happened with speed increasing or changing of shift gear, effects on water temperature or the car's torque has been observed, but how much and how intensely and with what algorithm this effect is identifiable, can be modeled...
متن کامل-
The development and evolution of any system–person, organization–nation depends on how the system succeeds to bridge the gap between what the system knows and what the system does (with the knowledge). We call this the gap between knowing and doing or the knowing-doing gap. If the system does not do what it knows, it will lose out in competition with other systems, its relative performance in...
متن کاملHow and Where Do We Ask Sensitive Questions: Self-reporting of STI-associated Symptoms Among the Iranian General Population
Background Reliable population-based data on sexually transmitted infections (STI) are limited in Iran and selfreporting remains the main source of indirect estimation of STI-associated symptoms in the country. However, where and how the questions are asked could influence the rate of self-reporting. In the present study, we aimed to assess what questionnaire delivery method (ie, face-to-face i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1993