Fredrich Maney wrote:
> On Fri, Mar 27, 2009 at 6:05 PM, Glenn Faden <Glenn.Faden at sun.com> wrote:
> [...]
>
>   
>> It is a mistake to be telling users to constantly use pfexec. It was not
>> designed for that purpose. We should be telling people to assume roles, via
>> su, or to use sudo.
>>     
>
> I'm in the process of taking the root password away from several users
> that shouldn't have it (application administrators). Since we are an
> all Solaris shop (at least on the Unix side), I had planned on using
> roles and judicious use of 'pfexec' to also remove our dependency on
> 'sudo' at the same time. Is there some reason I shouldn't do that?
>
> fpsm
>   
When you say that you are taking the root password away from users, I 
assume you mean that you will change it and not tell them. However, if 
you make root a role, then they can't su to root even if they know the 
password. When roles are assigned RBAC-aware shells, like pfsh, they 
don't need to call pfexec directly; it's done by the shell.

Having normal users invoke pfexec directly presents the risk that any 
user application could also invoke it without the user's knowledge. It 
could be buried in a shell script, for example. That's why it is safer 
to use roles.

--Glenn

Reply via email to