CONTENTS

Access Control & OS: SOLARIS Lab Procedures

1. Creating User accounts and Assuming Roles.

1. Start the SMC and click on This Computer icon on the left panel.

2. Then double click on System Configuration and double click Users.

3. Enter the username  stadmin and password  intro2810 are used to login.

4. The next screen asks you to assume the role studentadmin if you wish to continue. You will learn to assign roles in the next exercise. Are there any other roles that you can assume? ___________________

5. Enter the password as intro2150.

6. Then double click on User Accounts. Once the user accounts come up, go to Action on the menu and select Add User->from Wizard.

7. Follow the procedure, creating a user with username telcom2810 and password sec2810. Select the group as students.

2. Creating Roles and Assigning them to User Accounts.

1. Under Users in the SMC, select Administrative Roles and go to Action->Add Role

2. Create a role with the name newadmin and password 123abc. Add the Basic Solaris User rights for the role. Add the user telcom2810 as a user who can assume this role

3. Logout and login as telcom2810. Then launch SMC. Does it allow you to login? ___________

4. Try to create a new user account. What do you see?

5. Logout and login as stadmin.

3. Working with File Permissions and ACLs. 

1. Open a terminal and use the following commands to to launch the vi editor, and enter some text into the file. To enter text, hit ‘Insert’ to go into insert mode and enter text. Then press ‘Esc’. Save the file and exit by typing ‘:wq’.

a.  $ cd /public

b.  $ vi testing.txt

2. Then logout and login as telcom2810 and open a terminal.

3. Enter the command

a.  $ vi /public/testing.txt

4. Enter some text and try to save as before. What do you see? ________________________________________________

5. Then logout and login as stadmin again and open a terminal.

6. Enter the command to set an ACL to allow telcom2810 to write to the file. The command for this is as follows:

a.  $setfacl –s user:r-x group;r-x other r-x user:telcom2810:rw-

7. Repeat steps 2, 3 and 4. What do you see?

4. Questions. 

1.  How different is the access control architecture from that of UNIX-based platforms?

2.  How different is access control management in Windows, compared to UNIX? Which would you say is easier? Which is more efficient?