SUDO Class
Each record in the SUDO class identifies a command for which a user can borrow permissions from another user using the sesudo command.
capamsc141
Each record in the SUDO class identifies a command for which a user can borrow permissions from another user using the sesudo command.
The key of the SUDO class record is the name of the SUDO record. This name is used instead of the command name when a user executes the commands in the SUDO record.
If you create a SUDO record for an interactive Windows application, you must set the interactive flag for the SUDO record. If you do not set the interactive flag, the application runs in the background and you cannot interact with it. For more information, see the
Troubleshooting Guide
.The following definitions describe the properties contained in this class record. Most properties are modifiable and can be manipulated using selang or the administration interfaces. Non-modifiable properties are marked
informational
.- ACLDefines a list of accessors (users and groups) permitted to access the resource, and the accessors' access types.Each element in the access control list (ACL) contains the following information:
- AccessorDefines an accessor.
- AccessDefines the access authority that the accessor has to the resource.
- CATEGORYDefines one or more security categories assigned to a user or a resource.
- COMMENTThe command that sesudo executes.The alphanumeric string can contain up to 255 characters, which include the command and also permitted and prohibited parameters.For example, the following profile definition uses the COMMENT property properly:newres SUDO profile_name comment('command;;NAME')This use of the COMMENT property is different than in other classes. For more information about defining SUDO records, see theEndpoint Administration Guidefor your OS. This property was also known as DATA in earlier versions ofPrivileged Access Manager.Limit:255 characters.Use the comment[-] parameter with the chres, editres, and newres commands to modify this property.
- CREATE_TIME(Informational) Displays the date and time when the record was created.
- DAYTIMEDefines the day and time restrictions that govern when an accessor can access a resource.Use the restrictions parameter with the chres, ch[x]usr, or ch[x]grp commands to modify this property.The resolution of daytime restrictions is one minute.
- GROUPSThe list of GSUDO or CONTAINER records a resource record belongs to.To modify this property in a SUDO class record, you must change the MEMBERS property in the appropriate CONTAINER or GSUDO record.Use the mem+ or mem- parameter with the chres, editres or newres command to modify this property.
- INTERACTIVE(Windows only). This switch should be marked when the application you intend to run via sesudo is an interactive Windows application (for example, notepad.exe or cmd.exe) and not a service application. If you are trying to run an interactive application using sesudo that is not marked asinteractive, the application runs in the background without the ability to interact with it.Some Windows applications can not run in the foreground because of a Windows limitation.
- NACL
The
NACL
property of a resource is an access control list that defines the accessors that are denied authorization to a resource, together with the type of access that they are denied (for example, write). See also ACL, CALACL, PACL. Each entry in the NACL contains the following information:- Accessor
Defines an accessor.
- AccessDefines the type of access that is denied to the accessor.
Use the authorize deniedaccess command, or the authorize- deniedaccess- command, to modify this property.
- NOTIFY
Defines the user to be notified when a resource or user generates an audit event.
Privileged Access Manager
can email the audit record to the specified user.
Limit:
30 characters.- OWNER
Defines the user or group that owns the record.
PACL
Defines a list of accessors that are permitted to access the resource when the access request is made by a specific program (or a program that matches a name-pattern) and their access types. Each element in the program access control list (PACL) contains the following information:
- AccessorDefines an accessor.
- ProgramDefines a reference to a record in the PROGRAM class, either specifically or by wildcard pattern matching.
- AccessDefines the access authority that the accessor has to the resource.
You can use wildcard characters to specify the resource in a PACL.
Use the via(
pgm
) parameter with the selang authorize command to add programs, accessors, and their access types to a PACL, You can use the authorize- command to remove accessors from a PACL.- PASSWORDREQ
(UNIX only) Indicates whether the sesudo command requests the original user's password before executing.
Use the password parameter with the chres, editres, or newres command to modify this property.
- POLICYMODEL
Specifies the PMDB that receives new passwords when you change user passwords with the sepass utility. The passwords are
not
sent to the Policy Model defined by the parent_pmd or passwd_pmd configuration settings if a value is entered for this property.Note:
This property corresponds to the pmdb[-] parameter of the ch[x]usr and ch[x]grp commands.- SECLABEL
Defines the security label of a user or resource.
The SECLABEL property corresponds to the label[-] parameter of the chres and ch[x]usr commands.
- SECLEVEL
Defines the security level of an accessor or resource.
Note:
This property corresponds to the level[-] parameter of the ch[x]usr and chres commands.- TARGUSR
(UNIX only) Indicates the target uid, which identifies the user whose permissions are to be borrowed for executing the command. The default is root.
Use the targuid parameter with the chres, editres, or newres command to modify this property.
- UACC
Defines the default access authority for the resource, which indicates the access granted to accessors who are not defined to
Privileged Access Manager
or who do not appear in the ACL of the resource.Use the defaccess parameter with the chres, editres, or newres command to modify this property.
- UPDATE_TIME
(Informational) Displays the date and time when the record was last modified.
- UPDATE_WHO
(Informational) Displays the administrator who performed the update.
- WARNING
Specifies whether Warning mode is enabled. When Warning mode is enabled on a resource, all access requests to the resource are granted, and if an access request violates an access rule, a record is written to the audit log.