Tchater maintenant avec le support
Tchattez avec un ingénieur du support

Privilege Manager for Unix 7.3 - Administration Guide

Introducing Privilege Manager for Unix Planning Deployment Installation and Configuration Upgrade Privilege Manager for Unix System Administration Managing Security Policy The Privilege Manager for Unix Security Policy Advanced Privilege Manager for Unix Configuration Administering Log and Keystroke Files InTrust Plug-in for Privilege Manager for Unix Troubleshooting Privilege Manager for Unix Policy File Components Privilege Manager for Unix Variables
Variable names Variable scope Global input variables Global output variables Global event log variables PM settings variables
Privilege Manager for Unix Flow Control Statements Privilege Manager for Unix Built-in Functions and Procedures
Environment functions Hash table functions Input and output functions LDAP functions LDAP API example List functions Miscellaneous functions Password functions Remote access functions String functions User information functions Authentication Services functions
Privilege Manager for Unix programs Installation Packages

runchroot

Description

Type string READ/WRITE

runchroot emulates the behavior of the system chroot command; that is, it runs a command with a specified root directory. Ordinarily, file names are looked up starting at the root of the directory structure, ('/'). Setting runchroot to a different value changes the root directory, a directory that must exist.

Example
if (basename(runcommand) == "customapplication") 
{ 
   runchroot="/home/customapplicationv"; 
}

runcksum

Description

Type string READ/WRITE

If runcksum is defined, pmlocald verifies the value of this variable against the checksum of the runcommand and rejects the request if it does not match. Set this variable to the value produced by running the pmsum command on the agent with the full pathname of the runcommand.

You can use this method to detect a program that has been changed without authorization, and a program that a user is attempting to run from an unauthorized path.

Example
# Generate a checksum value for the program "/usr/bin/passwd" on the agent:host1 
# for use in the policy file on the policy server. 
pmsum /usr/bin/passwd 

# The pmsum command displays the output: 
fbc9cf01 /usr/bin/passwd 

# Update the security policy using this checksum: 

if (( basename(runcommand) == "passwd" ) && (host == "host1")) 
{ 
   runcksum="fbc9cf01"; 
}

runclienthost

Description

Type string READ/WRITE

runclienthost is a modifiable copy of the clienthost input variable.

Example
# reject commands being issued from unknown workstations 
workstations = {"sun34","sun35","sun36"}; 
if (!(clienthost in workstations)) 
   reject;
Related Topics

clienthost

runcommand

Description

Type string READ/WRITE

runcommand is a modifiable copy of the command input variable. It specifies the pathname of the program that pmlocald will run.

Example
Setting the runcomand can be a useful way of using a pseudonym for a command that an 
auditor wants to disguise: 
if ( command == "passcmd") 
{ 
   runcommand="/usr/bin/passwd" 
   runargv[0]="passwd"; 
   runargv=replace(runargv,1,length(runargv)); 
}
Related Topics

command

Documents connexes

The document was helpful.

Sélectionner une évaluation

I easily found the information I needed.

Sélectionner une évaluation