Most common approach with this design is to create an account solely for Zenoss.
Such Zenoss account would have read-only characteristics or a shell (in the /etc/passwd) that points only to the Zenoss script. You would then limit your vulnerabilities to just the retrieval of system information. -------------------- m2f -------------------- Read this topic online here: http://forums.zenoss.com/viewtopic.php?p=27555#27555 -------------------- m2f -------------------- _______________________________________________ zenoss-users mailing list [email protected] http://lists.zenoss.org/mailman/listinfo/zenoss-users
