Access Control & OS: SOLARIS Lab Procedures
1. Creating User accounts and Assuming Roles.
1. Start the SMC and click on This Computer icon on the left panel.
2. Then double click on System Configuration and double click Users.
3. Enter the username stadmin and password
intro2810 are used to login.
4. The next screen asks you to assume the role studentadmin if you
wish to continue. You will learn to assign roles in the next exercise.
Are there any other roles that you can assume? ___________________
5. Enter the password as intro2150.
6. Then double click on User Accounts. Once the user accounts come
up, go to Action on the menu and select Add User->from Wizard.
7. Follow the procedure, creating a user with username telcom2810 and
password sec2810. Select the group as students.
2. Creating Roles and Assigning them to User Accounts.
1. Under Users in the SMC, select Administrative Roles and go to
2. Create a role with the name newadmin and password 123abc. Add the
Basic Solaris User rights for the role. Add the user telcom2810 as a
user who can assume this role
3. Logout and login as telcom2810. Then launch SMC. Does it allow you
to login? ___________
4. Try to create a new user account. What do you see?
5. Logout and login as stadmin.
3. Working with File Permissions and ACLs.
1. Open a terminal and use the following commands to to launch the vi
editor, and enter some text into the file. To enter text, hit ‘Insert’
to go into insert mode and enter text. Then press ‘Esc’. Save the file
and exit by typing ‘:wq’.
a. $ cd /public
b. $ vi testing.txt
2. Then logout and login as telcom2810 and open a terminal.
3. Enter the command
a. $ vi /public/testing.txt
4. Enter some text and try to save as
before. What do you see?
5. Then logout and login as stadmin again and open a terminal.
6. Enter the command to set an ACL to allow telcom2810 to write to
the file. The command for this is as follows:
a. $setfacl –s user:r-x group;r-x other r-x user:telcom2810:rw-
7. Repeat steps 2, 3 and 4. What do you see?
1. How different is the access control
architecture from that of UNIX-based platforms?
2. How different is access control management in
Windows, compared to UNIX? Which would you say is easier? Which is more