CentOS 5
Sponsored Link

Configure sudo2010/05/27

  Configure sudo to separate users' duty if some people share privileges.

[1] Transfer root privilege to a user all
[root@dlp ~]#

# add at the bottom: user 'cent' can use all root privilege

cent
ALL=(ALL)
ALL


# how to write ⇒ destination host=(owner) command


# make sure with user 'cent'

[cent@dlp ~]$
/sbin/shutdown -r now

shutdown: you must be root to do that!
# denied normally

[cent@dlp ~]$
sudo /sbin/shutdown -r now

Password:
# own password

Broadcast message from root (pts/0) (Wed Aug 5 20:46:41 2009):

The system is going down for reboot NOW!  
# just executed
[2] In addition to the setting [1], some commands are not allow
[root@dlp ~]#

# near line 49: add aliase for the kind of shutdown commands

Cmnd_Alias SHUTDOWN = /sbin/halt, /sbin/shutdown, \
/sbin/poweroff, /sbin/reboot, /sbin/init


# add ( commands in aliase 'SHUTDOWN', 'SOFTWARE' are not allowed )

# * 'SOFTWARE' is defined by default

cent
ALL=(ALL)
ALL,
!SHUTDOWN, !SOFTWARE


# make sure with user 'cent'

[cent@dlp ~]$
sudo /sbin/shutdown -r now

Password:
Sorry, user cent is not allowed to execute '/sbin/shutdown -r now' as root on dlp.server-world.info.  
# denied

[cent@dlp ~]$
sudo /usr/bin/yum update

Password:
Sorry, user cent is not allowed to execute '/usr/bin/yum update' as root on dlp.server-world.info.  
# denied
[3] Transfer some commands with root privilege to users in a group
[root@dlp ~]#

# near line 51: add aliase for the kind of user management comamnds

Cmnd_Alias USERMGR = /usr/sbin/useradd, /usr/sbin/userdel, /usr/sbin/usermod, \
/usr/bin/passwd


# add at the bottom

%usermgr ALL=(ALL) USERMGR


[root@dlp ~]#
groupadd usermgr

[root@dlp ~]#
vi /etc/group


# add users in this group

usermgr:x:502:
cent


# make sure with user 'cent'

[cent@dlp ~]$
sudo /usr/sbin/useradd testuser

[cent@dlp ~]$
# done normally

[cent@dlp ~]$
sudo /usr/bin/passwd testuser

Changing password for user testuser.
New UNIX password:
# set testuser's password

Retype new UNIX password:
passwd: all authentication tokens updated successfully.
[4] Transfer a command with root provilege to a user
[root@dlp ~]#

# add at the bottom

cent
ALL=(ALL) /usr/sbin/visudo

fedora
ALL=(ALL) /usr/sbin/useradd, /usr/sbin/userdel, /usr/sbin/usermod, /usr/bin/passwd

suse
ALL=(ALL) /bin/vi


# make sure with user 'cent'

[cent@dlp ~]$
sudo /usr/sbin/visudo


# possible to open and edit

## Sudoers allows particular users to run various commands as
## the root user, without needing the root password.
##

# make sure with user 'fedora'

[fedora@dlp ~]$
sudo /usr/sbin/userdel -r testuser

[fedora@dlp ~]$
# done normally


# make sure with user 'suse'

[suse@dlp ~]$
sudo /bin/vi /boot/grub/grub.conf


# possible to open and edit

# grub.conf generated by anaconda
#
# Note that you do not have to rerun grub after making changes to this file
# NOTICE: You have a /boot partition. This means that
[5] The logs for sudo are kept in '/var/log/secure', but there are many kind of logs in it. So if you'd like to keep only sudo' log in a file, Set like follows.
[root@dlp ~]#

# add at the bottom

Defaults syslog=local1


[root@dlp ~]#
cp /etc/syslog.conf /etc/syslog.conf.bk

[root@dlp ~]#
vi /etc/syslog.conf


# The authpriv file has restricted access.
local1.*
/var/log/sudo.log
# line 10: add

authpriv.*
/var/log/secure


[root@dlp ~]#
/etc/rc.d/init.d/syslog restart

Shutting down kernel logger:
[  OK  ]

Shutting down system logger:
[  OK  ]

Starting system logger:
[  OK  ]

Starting kernel logger:
[  OK  ]
Matched Content