Using RBAC

Up to this point, we've managed to create some “normal” users, in addition to our existing super-user (root). The problem we now find is that the normal users have little power, while root has absolute power—we don't have anything in between! Unfortunately, this is the way UNIX has worked for quite some time.

Now, however, we can use a package known as RBAC (Role Based Access Control), which we briefly described in Chapter 1, to provide the functionality we want. Using RBAC allows us to accurately control which tasks users can perform and, therefore, reduce the risk of anyone accidentally destroying the system.

Therefore, in this section, we'll try to balance the power a little by creating a user that possesses some of root's capabilities. ...

Get Solaris™ Operating Environment Boot Camp now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.