Most common approach with this design is to create an account solely for Zenoss.

Such Zenoss account would have read-only characteristics or a shell (in the 
/etc/passwd) that points only to the Zenoss script.

You would then limit your vulnerabilities to just the retrieval of system 
information.




-------------------- m2f --------------------

Read this topic online here:
http://forums.zenoss.com/viewtopic.php?p=27555#27555

-------------------- m2f --------------------



_______________________________________________
zenoss-users mailing list
[email protected]
http://lists.zenoss.org/mailman/listinfo/zenoss-users

Reply via email to