A user can either authorize by authenticating as
root
or by authenticating as self. Both
authentication methods exist in four variants:
Authentication
The user always has to authenticate
One Shot Authentication
The authentication is bound to the instance of the program currently running. Once
the program is restarted, the user is required to authenticate again.
Keep Session Authentication
The authentication dialog box offers a check button Remember authorization for
this session. If checked, the authentication is valid until the user logs out.
Keep Indefinitely Authentication
The authentication dialog box offers a check button Remember authorization. If
checked, the user has to authenticate only once.
9.2.2 Explicit Privileges
Explicit privileges can be granted to specific users. They can either be granted without
limitations, or, when using constraints, limited to an active session and/or a local console.
It is not only possible to grant privileges to a user, a user can also be blocked. Blocked
users will not be able to carry out an action requiring authorization, even though the
default implicit policy allows authorization by authentication.
9.3 Modifying and Setting Privileges
To modify implicit privileges or to set explicit ones, you can either use the graphical
Authorizations tool available with GNOME, use the command line tools shipped with
PolicyKit, or modify the configuration files. While the GUI and the command line tools
are a good solution for making temporary changes, editing the configuration files should
be the preferred way to make permanent changes.
PolicyKit
123
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......