Linux - GeneralThis Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
This is not a valid security model, you would need to think more carefully about what you're trying to achieve in order to have alevel of security. Additionally it makes no sense to ask about "full access" and such when they are getting shell access to a multi-user system. no one other than root should have "full access" anyway...
This is not a valid security model, you would need to think more carefully about what you're trying to achieve in order to have alevel of security. Additionally it makes no sense to ask about "full access" and such when they are getting shell access to a multi-user system. no one other than root should have "full access" anyway...
I've not made my self clear
what I mean by full access it not to the system root access
xyz user is a normal users have access to a file eg a log file /var/log/maillog
If that user login to the system from IP 10.200.2.1 can modify delete that file
If the same user login to the system from different ip 10.200.2.20 can only view that file
this is just an example
any idea how to achieve this with out creating new user?
Again, that's really a bad model. your IP address is such an arbitrary piece of data. I think you need to think about what you need to actually achieve and come up with a better way of doing it.
Again, that's really a bad model. your IP address is such an arbitrary piece of data. I think you need to think about what you need to actually achieve and come up with a better way of doing it.
Thanks for the reply, need to think of some other options eg new user
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.