SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
How To Install and Configure SUDO on RHEL 7
i | P a g e
Table of Contents
Overview.......................................................................................................................................................1
Applies To......................................................................................................................................................1
Pre-Requisites ...............................................................................................................................................1
Install Package...............................................................................................................................................1
Verify Package Installation........................................................................................................................1
Locate Binary.............................................................................................................................................2
Configure SUDO ............................................................................................................................................2
visudo editor.............................................................................................................................................2
Sudoers File – Default Permissions...............................................................................................................2
Listing Commands.....................................................................................................................................3
List Allowed Commands – Current User ...............................................................................................3
List Allowed Commands – Other User ..................................................................................................3
Cached Credentials ...................................................................................................................................3
Revalidate Cached Credentials .............................................................................................................4
Invalidate Cached Credentials...............................................................................................................4
Customize User’s Timeouts...................................................................................................................4
Define Command Execution Privileges.........................................................................................................5
Define Commands – With Password.........................................................................................................5
Run Commands – Without Password .......................................................................................................6
Run Commands – Deny Specific Command Execution .............................................................................6
SUDO – Default Settings ...........................................................................................................................7
Configure – Session Time Out.......................................................................................................................7
System wise Attribute Configuration........................................................................................................7
User wise Attribute Configuration............................................................................................................8
How To Install and Configure SUDO on RHEL 7
1 | P a g e
Overview
The purpose of this document is guide you in the configuration of SUDO (Super User Doers), wherein
normal user is elevated to run the elevated commands on the system.
Applies To
Tested on RHEL 7, CentOS 7.
Pre-Requisites
 sudo package is installed
Install Package
SUDO package is installed by default in when you install operating system, in order to install the package
manually, if the package is not installed run the command;
yum install -y sudo
Verify Package Installation
After installation, to verify the sudo package is installed, run the command;
yum list installed | grep ^sudo
or
rpm -qa | grep ^sudo
How To Install and Configure SUDO on RHEL 7
2 | P a g e
Locate Binary
Next to get the binary information for sudo exeutable, run the command;
whereis sudo
Configure SUDO
In order to configure sudo, sudoers configuration file “/etc/sudoers” has to be modified.
visudo editor
Any standard editors i.e., vi, vim or nano.
Though there are few advantages of configuring sudo with “visudo” editor that are listed below:
 visudo will lock the sudoers file if a user is accessing it
 If the user is already accessing it, user would notified user stating, “/etc/sudoers busy, try again
later”
 It also checks for syntax errors upon file exit
Sudoers File – Default Permissions
The owner and group for the sudoers file must both be 0. The file permissions must be set to 0440. This
permission is set by default.
If you had changed the permission(s) ownership and accidentally, it needs to be rolled back, else sudo
will fail.
chown -c root:root /etc/sudoers
How To Install and Configure SUDO on RHEL 7
3 | P a g e
chmod -c 0440 /etc/sudoers
Listing Commands
Commands that can be executed for user and logged in user can be listed. It also lists the other
configuration parameters configured for the user, such as timeout, command restrictions, etc.
List Allowed Commands – Current User
sudo -l
List Allowed Commands – Other User
sudo -lU mvcp01
Cached Credentials
Upon successful sudo login by the user the credentials are cached for a default time period of 5 minutes
and the user can work without a password before the expiry period that is set by the attribute
“timestamp_timeout”.
How To Install and Configure SUDO on RHEL 7
4 | P a g e
This can also be configured to 0 minutes or more than default timeout period of 5 minutes, 0 means the
password is not cached and always user will be prompted for password. If the attribute is set less than 0,
then users sudo timeout period is set as “never expire”.
timestamp_timeout=2
Similarly, you can invalidate or revalidate cached credentials.
Revalidate Cached Credentials
After successful user’s sudo login, password is stored in cache for 5 minutes (default password lapse
period). To extend the password lapse period run the command. If sudo revalidation is done, it will extend
the lapse period additional 5 minutes.
sudo -v
Invalidate Cached Credentials
Clear the cached password and ask for password entry for sudo authentication, run the command;
Typically, It’s run if the user password has changed and timeout period is not yet expired.
sudo -k
Customize User’s Timeouts
If you would like to customize sudo timestamp_timeout for a specific user, it can be configured by
customizing the “timestamp_timeout” attribute with the user prefix and the timeout period, shown as
below.
This change can be done in either “/etc/sudoers” or “/etc/sudoers.d/
Defaults: sys.admin timestamp_timeout=30
sudo -lU sys.admin
How To Install and Configure SUDO on RHEL 7
5 | P a g e
Define Command Execution Privileges
SUDO can be configured with or without password authentication for users or specific commands that
user intends to execute. The user also can be denied command execution for specific command. The
below table will give insight into command execution privileges defined for a user.
Example: root ALL=(ALL) ALL
Definition Purpose
sys.admin ALL=(ALL:ALL) ALL This definition applies to user root
sys.admin ALL=(ALL:ALL) ALL This rule applies to all user sys.admin logged in from all hosts
sys.admin ALL=(ALL:ALL) ALL User sys.admin can run commands as all users
sys.admin ALL=(ALL:ALL) ALL User sys.admin can run commands as all groups
sys.admin ALL=(ALL:ALL) ALL These rules apply to all commands
Define Commands – With Password
Few commands that are defined for the user to run can be allowed to run only after keying the valid
password by the user, as shown below; User sys.operator can execute the commands “shutdown” and
“updatedb” after successful authentication.
sys.operator ALL=(ALL) PASSWD: /sbin/shutdown, /usr/bin/updatedb
How To Install and Configure SUDO on RHEL 7
6 | P a g e
Run Commands – Without Password
Execute command(s) without prompting for sudo password, configure the user as below; User sys.admin
can execute the commands “shutdown” and “updated” without password. Password-less command
execution.
mvcp001 ALL=(ALL) NOPASSWD: ALL
sys.admin ALL=(ALL) NOPASSWD: /sbin/shutdown, /usr/sbin/updatedb
Run Commands – Deny Specific Command Execution
If you want to deny a specific user to deny execution of a command prefix it with “!” as shown below; The
user can run all other commands expect the command “/usr/bin/passwd”
mvcp002 ALL=(root) ALL, !/usr/bin/passwd
How To Install and Configure SUDO on RHEL 7
7 | P a g e
SUDO – Default Settings
To list the current default settings run the command;
cat /etc/sudoers | grep ^Defaults
Configure – Session Time Out
The purpose of this attribute is to set timeout period for the user to enter password for the elevated
commands executed each time.
Default timeout is 5 minutes, once the user enters the password, the user’s password is remembered for
5 minutes and used need to reenter the password again.
System wise Attribute Configuration
To implement system configuration, after “Defaults” attribute, modify the changes that are required.
Defaults timestamp_timeout=5 #Applies To System wide
How To Install and Configure SUDO on RHEL 7
8 | P a g e
User wise Attribute Configuration
To implement user configuration, after “Defaults” attribute, include username also and modify the
changes that are required. This will override the system wide attribute setting.
Defaults:mvcp002 timestamp_timeout=0 # Applies to specific user only

Mais conteúdo relacionado

Mais procurados

Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups
Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups
Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups Niklas Iveslatt
 
CloudGenix_Customer Presentation
CloudGenix_Customer PresentationCloudGenix_Customer Presentation
CloudGenix_Customer PresentationSyed Arsalan
 
Dell Technologies Dell EMC Data Protection Solutions On One Single Page - POS...
Dell Technologies Dell EMC Data Protection Solutions On One Single Page - POS...Dell Technologies Dell EMC Data Protection Solutions On One Single Page - POS...
Dell Technologies Dell EMC Data Protection Solutions On One Single Page - POS...Dell Technologies
 
Citrix netscaler administration guide
Citrix netscaler administration guideCitrix netscaler administration guide
Citrix netscaler administration guideKendhe Deligny
 
Azure File Share and File Sync guide (Beginners Edition)
Azure File Share and File Sync guide (Beginners Edition)Azure File Share and File Sync guide (Beginners Edition)
Azure File Share and File Sync guide (Beginners Edition)Naseem Khoodoruth
 
What's So Special about the Oracle Database Appliance?
What's So Special about the Oracle Database Appliance?What's So Special about the Oracle Database Appliance?
What's So Special about the Oracle Database Appliance?O-box
 
Zero Data Loss Recovery Appliance - Deep Dive
Zero Data Loss Recovery Appliance - Deep DiveZero Data Loss Recovery Appliance - Deep Dive
Zero Data Loss Recovery Appliance - Deep DiveDaniele Massimi
 
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...FIDO Alliance
 
Installing and Invoking Oracle Data Integrator (ODI) Public Web Services (whi...
Installing and Invoking Oracle Data Integrator (ODI) Public Web Services (whi...Installing and Invoking Oracle Data Integrator (ODI) Public Web Services (whi...
Installing and Invoking Oracle Data Integrator (ODI) Public Web Services (whi...Revelation Technologies
 
Demystifying Initial Access in Azure
Demystifying Initial Access in AzureDemystifying Initial Access in Azure
Demystifying Initial Access in AzureGabriel Mathenge
 
Android 电源管理 power_management_(英文版)
Android 电源管理 power_management_(英文版)Android 电源管理 power_management_(英文版)
Android 电源管理 power_management_(英文版)borderj
 
RHEL-7 Administrator Guide for RedHat 7
RHEL-7  Administrator Guide for RedHat 7RHEL-7  Administrator Guide for RedHat 7
RHEL-7 Administrator Guide for RedHat 7Hemnath R.
 
EveryonePrint 4.0 installation guide - EN
EveryonePrint 4.0 installation guide - ENEveryonePrint 4.0 installation guide - EN
EveryonePrint 4.0 installation guide - ENEveryonePrint
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALLMoin Islam
 
5 modern desktop - windows autopilot
5   modern desktop - windows autopilot5   modern desktop - windows autopilot
5 modern desktop - windows autopilotAndrew Bettany
 
Improve Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and MaskingImprove Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and MaskingPatric Dahse
 

Mais procurados (20)

Aruba VIA 2.0 User Guide
Aruba VIA 2.0 User GuideAruba VIA 2.0 User Guide
Aruba VIA 2.0 User Guide
 
Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups
Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups
Oracle Open World Presentation - Oracle RMAN Best Practices for Cloud Backups
 
CloudGenix_Customer Presentation
CloudGenix_Customer PresentationCloudGenix_Customer Presentation
CloudGenix_Customer Presentation
 
Hypervisor
HypervisorHypervisor
Hypervisor
 
Dell Technologies Dell EMC Data Protection Solutions On One Single Page - POS...
Dell Technologies Dell EMC Data Protection Solutions On One Single Page - POS...Dell Technologies Dell EMC Data Protection Solutions On One Single Page - POS...
Dell Technologies Dell EMC Data Protection Solutions On One Single Page - POS...
 
Citrix netscaler administration guide
Citrix netscaler administration guideCitrix netscaler administration guide
Citrix netscaler administration guide
 
Azure File Share and File Sync guide (Beginners Edition)
Azure File Share and File Sync guide (Beginners Edition)Azure File Share and File Sync guide (Beginners Edition)
Azure File Share and File Sync guide (Beginners Edition)
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Aruba instant iap setup rev3
Aruba instant iap setup rev3Aruba instant iap setup rev3
Aruba instant iap setup rev3
 
What's So Special about the Oracle Database Appliance?
What's So Special about the Oracle Database Appliance?What's So Special about the Oracle Database Appliance?
What's So Special about the Oracle Database Appliance?
 
Zero Data Loss Recovery Appliance - Deep Dive
Zero Data Loss Recovery Appliance - Deep DiveZero Data Loss Recovery Appliance - Deep Dive
Zero Data Loss Recovery Appliance - Deep Dive
 
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
 
Installing and Invoking Oracle Data Integrator (ODI) Public Web Services (whi...
Installing and Invoking Oracle Data Integrator (ODI) Public Web Services (whi...Installing and Invoking Oracle Data Integrator (ODI) Public Web Services (whi...
Installing and Invoking Oracle Data Integrator (ODI) Public Web Services (whi...
 
Demystifying Initial Access in Azure
Demystifying Initial Access in AzureDemystifying Initial Access in Azure
Demystifying Initial Access in Azure
 
Android 电源管理 power_management_(英文版)
Android 电源管理 power_management_(英文版)Android 电源管理 power_management_(英文版)
Android 电源管理 power_management_(英文版)
 
RHEL-7 Administrator Guide for RedHat 7
RHEL-7  Administrator Guide for RedHat 7RHEL-7  Administrator Guide for RedHat 7
RHEL-7 Administrator Guide for RedHat 7
 
EveryonePrint 4.0 installation guide - EN
EveryonePrint 4.0 installation guide - ENEveryonePrint 4.0 installation guide - EN
EveryonePrint 4.0 installation guide - EN
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
5 modern desktop - windows autopilot
5   modern desktop - windows autopilot5   modern desktop - windows autopilot
5 modern desktop - windows autopilot
 
Improve Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and MaskingImprove Data Protection and Compliance with UI-Level Logging and Masking
Improve Data Protection and Compliance with UI-Level Logging and Masking
 

Destaque

Upgrade ipa to rhel 7
Upgrade ipa to rhel 7Upgrade ipa to rhel 7
Upgrade ipa to rhel 7Amjad Yaseen
 
How to Change Hostname in CentOS 7 or RHEL 7
How to Change Hostname in CentOS 7 or RHEL 7How to Change Hostname in CentOS 7 or RHEL 7
How to Change Hostname in CentOS 7 or RHEL 7VCP Muthukrishna
 
Configure Run Levels RHEL 7 or CentOS 7
Configure Run Levels RHEL 7 or CentOS 7Configure Run Levels RHEL 7 or CentOS 7
Configure Run Levels RHEL 7 or CentOS 7VCP Muthukrishna
 
How To Reset root Password on CentOS 7
How To Reset root Password on CentOS 7How To Reset root Password on CentOS 7
How To Reset root Password on CentOS 7VCP Muthukrishna
 
Kvm virtualization in_rhel_7
Kvm virtualization in_rhel_7Kvm virtualization in_rhel_7
Kvm virtualization in_rhel_7Urgen Sherpa
 
tuningfor_oracle
 tuningfor_oracle tuningfor_oracle
tuningfor_oraclestyxyx
 
Ibm power vc version 1.2.3 introduction and configuration
Ibm power vc version 1.2.3 introduction and configurationIbm power vc version 1.2.3 introduction and configuration
Ibm power vc version 1.2.3 introduction and configurationgagbada
 
IBM PowerVM Virtualization Introduction and Configuration
IBM PowerVM Virtualization Introduction and ConfigurationIBM PowerVM Virtualization Introduction and Configuration
IBM PowerVM Virtualization Introduction and ConfigurationIBM India Smarter Computing
 
Aix student guide system administrations part 2 problem determination
Aix student guide system administrations part 2   problem determinationAix student guide system administrations part 2   problem determination
Aix student guide system administrations part 2 problem determinationYogesh Sharma
 
マイコンボード色々
マイコンボード色々マイコンボード色々
マイコンボード色々Hirokazu Tokuno
 
Kickstart, Puppet, Docker
Kickstart, Puppet, DockerKickstart, Puppet, Docker
Kickstart, Puppet, DockerHirokazu Tokuno
 
Compliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM iCompliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM itaford
 
Introduce: IBM Power Linux with PowerKVM
Introduce: IBM Power Linux with PowerKVMIntroduce: IBM Power Linux with PowerKVM
Introduce: IBM Power Linux with PowerKVMZainal Abidin
 
How To Create RDS Database for WordPress in AWS on RHEL 7 or CentOS 7
How To Create RDS Database for WordPress in AWS on RHEL 7 or CentOS 7How To Create RDS Database for WordPress in AWS on RHEL 7 or CentOS 7
How To Create RDS Database for WordPress in AWS on RHEL 7 or CentOS 7VCP Muthukrishna
 
How To Install and Generate Audit Reports in CentOS 7 or RHEL 7
How To Install and Generate Audit Reports in CentOS 7 or RHEL 7How To Install and Generate Audit Reports in CentOS 7 or RHEL 7
How To Install and Generate Audit Reports in CentOS 7 or RHEL 7VCP Muthukrishna
 
LSOF Command Usage on RHEL 7
LSOF Command Usage on RHEL 7LSOF Command Usage on RHEL 7
LSOF Command Usage on RHEL 7VCP Muthukrishna
 
How To Install and Configure AWS CLI on RHEL 7
How To Install and Configure AWS CLI on RHEL 7How To Install and Configure AWS CLI on RHEL 7
How To Install and Configure AWS CLI on RHEL 7VCP Muthukrishna
 

Destaque (20)

Upgrade ipa to rhel 7
Upgrade ipa to rhel 7Upgrade ipa to rhel 7
Upgrade ipa to rhel 7
 
How to Change Hostname in CentOS 7 or RHEL 7
How to Change Hostname in CentOS 7 or RHEL 7How to Change Hostname in CentOS 7 or RHEL 7
How to Change Hostname in CentOS 7 or RHEL 7
 
SystemD Usage Guide
SystemD Usage GuideSystemD Usage Guide
SystemD Usage Guide
 
Configure Run Levels RHEL 7 or CentOS 7
Configure Run Levels RHEL 7 or CentOS 7Configure Run Levels RHEL 7 or CentOS 7
Configure Run Levels RHEL 7 or CentOS 7
 
How To Reset root Password on CentOS 7
How To Reset root Password on CentOS 7How To Reset root Password on CentOS 7
How To Reset root Password on CentOS 7
 
Rhel6 vs rhel7
Rhel6 vs rhel7Rhel6 vs rhel7
Rhel6 vs rhel7
 
Kvm virtualization in_rhel_7
Kvm virtualization in_rhel_7Kvm virtualization in_rhel_7
Kvm virtualization in_rhel_7
 
tuningfor_oracle
 tuningfor_oracle tuningfor_oracle
tuningfor_oracle
 
Ibm power vc version 1.2.3 introduction and configuration
Ibm power vc version 1.2.3 introduction and configurationIbm power vc version 1.2.3 introduction and configuration
Ibm power vc version 1.2.3 introduction and configuration
 
IBM PowerVM Virtualization Introduction and Configuration
IBM PowerVM Virtualization Introduction and ConfigurationIBM PowerVM Virtualization Introduction and Configuration
IBM PowerVM Virtualization Introduction and Configuration
 
Aix install via nim
Aix install via nimAix install via nim
Aix install via nim
 
Aix student guide system administrations part 2 problem determination
Aix student guide system administrations part 2   problem determinationAix student guide system administrations part 2   problem determination
Aix student guide system administrations part 2 problem determination
 
マイコンボード色々
マイコンボード色々マイコンボード色々
マイコンボード色々
 
Kickstart, Puppet, Docker
Kickstart, Puppet, DockerKickstart, Puppet, Docker
Kickstart, Puppet, Docker
 
Compliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM iCompliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM i
 
Introduce: IBM Power Linux with PowerKVM
Introduce: IBM Power Linux with PowerKVMIntroduce: IBM Power Linux with PowerKVM
Introduce: IBM Power Linux with PowerKVM
 
How To Create RDS Database for WordPress in AWS on RHEL 7 or CentOS 7
How To Create RDS Database for WordPress in AWS on RHEL 7 or CentOS 7How To Create RDS Database for WordPress in AWS on RHEL 7 or CentOS 7
How To Create RDS Database for WordPress in AWS on RHEL 7 or CentOS 7
 
How To Install and Generate Audit Reports in CentOS 7 or RHEL 7
How To Install and Generate Audit Reports in CentOS 7 or RHEL 7How To Install and Generate Audit Reports in CentOS 7 or RHEL 7
How To Install and Generate Audit Reports in CentOS 7 or RHEL 7
 
LSOF Command Usage on RHEL 7
LSOF Command Usage on RHEL 7LSOF Command Usage on RHEL 7
LSOF Command Usage on RHEL 7
 
How To Install and Configure AWS CLI on RHEL 7
How To Install and Configure AWS CLI on RHEL 7How To Install and Configure AWS CLI on RHEL 7
How To Install and Configure AWS CLI on RHEL 7
 

Semelhante a Install and configure SUDO on RHEL 7

Sudo User(super user do)
Sudo User(super user do)Sudo User(super user do)
Sudo User(super user do)Shubhamg Gupta
 
Sudo & su commands
Sudo & su commandsSudo & su commands
Sudo & su commandsMeenu Chopra
 
How to install odoo 15 steps on a ubuntu 20.04 lts system installation
How to install odoo 15 steps on a ubuntu 20.04 lts system installation How to install odoo 15 steps on a ubuntu 20.04 lts system installation
How to install odoo 15 steps on a ubuntu 20.04 lts system installation Geminate Consultancy Services
 
How to secure ubuntu 12.04
How to secure ubuntu 12.04 How to secure ubuntu 12.04
How to secure ubuntu 12.04 John Richard
 
Create a sudo user on rhel
Create a sudo user on rhelCreate a sudo user on rhel
Create a sudo user on rhelLinuxConcept
 
How To Install OpenFire in CentOS 7
How To Install OpenFire in CentOS 7How To Install OpenFire in CentOS 7
How To Install OpenFire in CentOS 7VCP Muthukrishna
 
ManagingLocalLinuxUsersandGroups(2)
ManagingLocalLinuxUsersandGroups(2)ManagingLocalLinuxUsersandGroups(2)
ManagingLocalLinuxUsersandGroups(2)Bipul Kumar
 
System administration
System administrationSystem administration
System administrationpuspa joshi
 
How To Install and Configure Log Rotation on RHEL 7 or CentOS 7
How To Install and Configure Log Rotation on RHEL 7 or CentOS 7How To Install and Configure Log Rotation on RHEL 7 or CentOS 7
How To Install and Configure Log Rotation on RHEL 7 or CentOS 7VCP Muthukrishna
 
linux_Commads
linux_Commadslinux_Commads
linux_Commadstastedone
 
Pdn multipath io-pvm-ver1.0.0
Pdn multipath io-pvm-ver1.0.0Pdn multipath io-pvm-ver1.0.0
Pdn multipath io-pvm-ver1.0.0pdnsoftco
 
How To Manage Linux User on RHEL 7
How To Manage Linux User on RHEL 7How To Manage Linux User on RHEL 7
How To Manage Linux User on RHEL 7VCP Muthukrishna
 
101 4.3 control mounting and unmounting of filesystems
101 4.3 control mounting and unmounting of filesystems101 4.3 control mounting and unmounting of filesystems
101 4.3 control mounting and unmounting of filesystemsAcácio Oliveira
 
Installing odoo v8 from github
Installing odoo v8 from githubInstalling odoo v8 from github
Installing odoo v8 from githubAntony Gitomeh
 
Installing & Configuring IBM Domino 9 on CentOS
Installing & Configuring IBM Domino 9 on CentOSInstalling & Configuring IBM Domino 9 on CentOS
Installing & Configuring IBM Domino 9 on CentOSDevin Olson
 
Installation Of Odoo 12 On Ubuntu 18.4
Installation Of Odoo 12 On Ubuntu 18.4Installation Of Odoo 12 On Ubuntu 18.4
Installation Of Odoo 12 On Ubuntu 18.4Varsha Technaureus
 
What’s new in Sudo 1.8?
What’s new in Sudo 1.8?What’s new in Sudo 1.8?
What’s new in Sudo 1.8?Tyler Reese
 

Semelhante a Install and configure SUDO on RHEL 7 (20)

Linux Security Crash Course
Linux Security Crash CourseLinux Security Crash Course
Linux Security Crash Course
 
Sudo User(super user do)
Sudo User(super user do)Sudo User(super user do)
Sudo User(super user do)
 
Sudo
SudoSudo
Sudo
 
Cent os 5 ssh
Cent os 5 sshCent os 5 ssh
Cent os 5 ssh
 
Sudo & su commands
Sudo & su commandsSudo & su commands
Sudo & su commands
 
How to install odoo 15 steps on a ubuntu 20.04 lts system installation
How to install odoo 15 steps on a ubuntu 20.04 lts system installation How to install odoo 15 steps on a ubuntu 20.04 lts system installation
How to install odoo 15 steps on a ubuntu 20.04 lts system installation
 
How to secure ubuntu 12.04
How to secure ubuntu 12.04 How to secure ubuntu 12.04
How to secure ubuntu 12.04
 
Create a sudo user on rhel
Create a sudo user on rhelCreate a sudo user on rhel
Create a sudo user on rhel
 
How To Install OpenFire in CentOS 7
How To Install OpenFire in CentOS 7How To Install OpenFire in CentOS 7
How To Install OpenFire in CentOS 7
 
ManagingLocalLinuxUsersandGroups(2)
ManagingLocalLinuxUsersandGroups(2)ManagingLocalLinuxUsersandGroups(2)
ManagingLocalLinuxUsersandGroups(2)
 
System administration
System administrationSystem administration
System administration
 
How To Install and Configure Log Rotation on RHEL 7 or CentOS 7
How To Install and Configure Log Rotation on RHEL 7 or CentOS 7How To Install and Configure Log Rotation on RHEL 7 or CentOS 7
How To Install and Configure Log Rotation on RHEL 7 or CentOS 7
 
linux_Commads
linux_Commadslinux_Commads
linux_Commads
 
Pdn multipath io-pvm-ver1.0.0
Pdn multipath io-pvm-ver1.0.0Pdn multipath io-pvm-ver1.0.0
Pdn multipath io-pvm-ver1.0.0
 
How To Manage Linux User on RHEL 7
How To Manage Linux User on RHEL 7How To Manage Linux User on RHEL 7
How To Manage Linux User on RHEL 7
 
101 4.3 control mounting and unmounting of filesystems
101 4.3 control mounting and unmounting of filesystems101 4.3 control mounting and unmounting of filesystems
101 4.3 control mounting and unmounting of filesystems
 
Installing odoo v8 from github
Installing odoo v8 from githubInstalling odoo v8 from github
Installing odoo v8 from github
 
Installing & Configuring IBM Domino 9 on CentOS
Installing & Configuring IBM Domino 9 on CentOSInstalling & Configuring IBM Domino 9 on CentOS
Installing & Configuring IBM Domino 9 on CentOS
 
Installation Of Odoo 12 On Ubuntu 18.4
Installation Of Odoo 12 On Ubuntu 18.4Installation Of Odoo 12 On Ubuntu 18.4
Installation Of Odoo 12 On Ubuntu 18.4
 
What’s new in Sudo 1.8?
What’s new in Sudo 1.8?What’s new in Sudo 1.8?
What’s new in Sudo 1.8?
 

Mais de VCP Muthukrishna

How to Fix Duplicate Packages in YUM on CentOS 7
How to Fix Duplicate Packages in YUM on CentOS 7How to Fix Duplicate Packages in YUM on CentOS 7
How to Fix Duplicate Packages in YUM on CentOS 7VCP Muthukrishna
 
How To Install and Configure GNome on CentOS 7
How To Install and Configure GNome on CentOS 7How To Install and Configure GNome on CentOS 7
How To Install and Configure GNome on CentOS 7VCP Muthukrishna
 
How To Connect to Active Directory User Validation
How To Connect to Active Directory User ValidationHow To Connect to Active Directory User Validation
How To Connect to Active Directory User ValidationVCP Muthukrishna
 
How To Connect To Active Directory PowerShell
How To Connect To Active Directory PowerShellHow To Connect To Active Directory PowerShell
How To Connect To Active Directory PowerShellVCP Muthukrishna
 
How To List Files on Remote Server - PowerShell
How To List Files on Remote Server - PowerShellHow To List Files on Remote Server - PowerShell
How To List Files on Remote Server - PowerShellVCP Muthukrishna
 
How To List Files and Display In HTML Format
How To List Files and Display In HTML FormatHow To List Files and Display In HTML Format
How To List Files and Display In HTML FormatVCP Muthukrishna
 
How To Check and Delete a File via PowerShell
How To Check and Delete a File via PowerShellHow To Check and Delete a File via PowerShell
How To Check and Delete a File via PowerShellVCP Muthukrishna
 
Zimbra Troubleshooting - Mails not being Delivered or Deferred or Connection ...
Zimbra Troubleshooting - Mails not being Delivered or Deferred or Connection ...Zimbra Troubleshooting - Mails not being Delivered or Deferred or Connection ...
Zimbra Troubleshooting - Mails not being Delivered or Deferred or Connection ...VCP Muthukrishna
 
How To Setup SSH Keys on CentOS 7
How To Setup SSH Keys on CentOS 7How To Setup SSH Keys on CentOS 7
How To Setup SSH Keys on CentOS 7VCP Muthukrishna
 
How To Install and Configure Open SSH Server on Ubuntu
How To Install and Configure Open SSH Server on UbuntuHow To Install and Configure Open SSH Server on Ubuntu
How To Install and Configure Open SSH Server on UbuntuVCP Muthukrishna
 
Windows PowerShell Basics - How To List PSDrive Info
Windows PowerShell Basics - How To List PSDrive InfoWindows PowerShell Basics - How To List PSDrive Info
Windows PowerShell Basics - How To List PSDrive InfoVCP Muthukrishna
 
How To List Nginx Modules Installed / Complied on CentOS 7
How To List Nginx Modules Installed / Complied on CentOS 7How To List Nginx Modules Installed / Complied on CentOS 7
How To List Nginx Modules Installed / Complied on CentOS 7VCP Muthukrishna
 
Windows PowerShell Basics – How To Create powershell for loop
Windows PowerShell Basics – How To Create powershell for loopWindows PowerShell Basics – How To Create powershell for loop
Windows PowerShell Basics – How To Create powershell for loopVCP Muthukrishna
 
How To Construct IF and Else Conditional Statements
How To Construct IF and Else Conditional StatementsHow To Construct IF and Else Conditional Statements
How To Construct IF and Else Conditional StatementsVCP Muthukrishna
 
How To Create PowerShell Function Mandatory Parameter and Optional Parameter
How To Create PowerShell Function Mandatory Parameter and Optional ParameterHow To Create PowerShell Function Mandatory Parameter and Optional Parameter
How To Create PowerShell Function Mandatory Parameter and Optional ParameterVCP Muthukrishna
 
How To Create Power Shell Function Mandatory Parameter Value
How To Create Power Shell Function Mandatory Parameter ValueHow To Create Power Shell Function Mandatory Parameter Value
How To Create Power Shell Function Mandatory Parameter ValueVCP Muthukrishna
 
How To Create PowerShell Function
How To Create PowerShell FunctionHow To Create PowerShell Function
How To Create PowerShell FunctionVCP Muthukrishna
 
How To Disable IE Enhanced Security Windows PowerShell
How To Disable IE Enhanced Security Windows PowerShellHow To Disable IE Enhanced Security Windows PowerShell
How To Disable IE Enhanced Security Windows PowerShellVCP Muthukrishna
 
How To Check IE Enhanced Security Is Enabled Windows PowerShell
How To Check IE Enhanced Security Is Enabled Windows PowerShellHow To Check IE Enhanced Security Is Enabled Windows PowerShell
How To Check IE Enhanced Security Is Enabled Windows PowerShellVCP Muthukrishna
 
How To Configure Nginx Load Balancer on CentOS 7
How To Configure Nginx Load Balancer on CentOS 7How To Configure Nginx Load Balancer on CentOS 7
How To Configure Nginx Load Balancer on CentOS 7VCP Muthukrishna
 

Mais de VCP Muthukrishna (20)

How to Fix Duplicate Packages in YUM on CentOS 7
How to Fix Duplicate Packages in YUM on CentOS 7How to Fix Duplicate Packages in YUM on CentOS 7
How to Fix Duplicate Packages in YUM on CentOS 7
 
How To Install and Configure GNome on CentOS 7
How To Install and Configure GNome on CentOS 7How To Install and Configure GNome on CentOS 7
How To Install and Configure GNome on CentOS 7
 
How To Connect to Active Directory User Validation
How To Connect to Active Directory User ValidationHow To Connect to Active Directory User Validation
How To Connect to Active Directory User Validation
 
How To Connect To Active Directory PowerShell
How To Connect To Active Directory PowerShellHow To Connect To Active Directory PowerShell
How To Connect To Active Directory PowerShell
 
How To List Files on Remote Server - PowerShell
How To List Files on Remote Server - PowerShellHow To List Files on Remote Server - PowerShell
How To List Files on Remote Server - PowerShell
 
How To List Files and Display In HTML Format
How To List Files and Display In HTML FormatHow To List Files and Display In HTML Format
How To List Files and Display In HTML Format
 
How To Check and Delete a File via PowerShell
How To Check and Delete a File via PowerShellHow To Check and Delete a File via PowerShell
How To Check and Delete a File via PowerShell
 
Zimbra Troubleshooting - Mails not being Delivered or Deferred or Connection ...
Zimbra Troubleshooting - Mails not being Delivered or Deferred or Connection ...Zimbra Troubleshooting - Mails not being Delivered or Deferred or Connection ...
Zimbra Troubleshooting - Mails not being Delivered or Deferred or Connection ...
 
How To Setup SSH Keys on CentOS 7
How To Setup SSH Keys on CentOS 7How To Setup SSH Keys on CentOS 7
How To Setup SSH Keys on CentOS 7
 
How To Install and Configure Open SSH Server on Ubuntu
How To Install and Configure Open SSH Server on UbuntuHow To Install and Configure Open SSH Server on Ubuntu
How To Install and Configure Open SSH Server on Ubuntu
 
Windows PowerShell Basics - How To List PSDrive Info
Windows PowerShell Basics - How To List PSDrive InfoWindows PowerShell Basics - How To List PSDrive Info
Windows PowerShell Basics - How To List PSDrive Info
 
How To List Nginx Modules Installed / Complied on CentOS 7
How To List Nginx Modules Installed / Complied on CentOS 7How To List Nginx Modules Installed / Complied on CentOS 7
How To List Nginx Modules Installed / Complied on CentOS 7
 
Windows PowerShell Basics – How To Create powershell for loop
Windows PowerShell Basics – How To Create powershell for loopWindows PowerShell Basics – How To Create powershell for loop
Windows PowerShell Basics – How To Create powershell for loop
 
How To Construct IF and Else Conditional Statements
How To Construct IF and Else Conditional StatementsHow To Construct IF and Else Conditional Statements
How To Construct IF and Else Conditional Statements
 
How To Create PowerShell Function Mandatory Parameter and Optional Parameter
How To Create PowerShell Function Mandatory Parameter and Optional ParameterHow To Create PowerShell Function Mandatory Parameter and Optional Parameter
How To Create PowerShell Function Mandatory Parameter and Optional Parameter
 
How To Create Power Shell Function Mandatory Parameter Value
How To Create Power Shell Function Mandatory Parameter ValueHow To Create Power Shell Function Mandatory Parameter Value
How To Create Power Shell Function Mandatory Parameter Value
 
How To Create PowerShell Function
How To Create PowerShell FunctionHow To Create PowerShell Function
How To Create PowerShell Function
 
How To Disable IE Enhanced Security Windows PowerShell
How To Disable IE Enhanced Security Windows PowerShellHow To Disable IE Enhanced Security Windows PowerShell
How To Disable IE Enhanced Security Windows PowerShell
 
How To Check IE Enhanced Security Is Enabled Windows PowerShell
How To Check IE Enhanced Security Is Enabled Windows PowerShellHow To Check IE Enhanced Security Is Enabled Windows PowerShell
How To Check IE Enhanced Security Is Enabled Windows PowerShell
 
How To Configure Nginx Load Balancer on CentOS 7
How To Configure Nginx Load Balancer on CentOS 7How To Configure Nginx Load Balancer on CentOS 7
How To Configure Nginx Load Balancer on CentOS 7
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Install and configure SUDO on RHEL 7

  • 1. How To Install and Configure SUDO on RHEL 7 i | P a g e Table of Contents Overview.......................................................................................................................................................1 Applies To......................................................................................................................................................1 Pre-Requisites ...............................................................................................................................................1 Install Package...............................................................................................................................................1 Verify Package Installation........................................................................................................................1 Locate Binary.............................................................................................................................................2 Configure SUDO ............................................................................................................................................2 visudo editor.............................................................................................................................................2 Sudoers File – Default Permissions...............................................................................................................2 Listing Commands.....................................................................................................................................3 List Allowed Commands – Current User ...............................................................................................3 List Allowed Commands – Other User ..................................................................................................3 Cached Credentials ...................................................................................................................................3 Revalidate Cached Credentials .............................................................................................................4 Invalidate Cached Credentials...............................................................................................................4 Customize User’s Timeouts...................................................................................................................4 Define Command Execution Privileges.........................................................................................................5 Define Commands – With Password.........................................................................................................5 Run Commands – Without Password .......................................................................................................6 Run Commands – Deny Specific Command Execution .............................................................................6 SUDO – Default Settings ...........................................................................................................................7 Configure – Session Time Out.......................................................................................................................7 System wise Attribute Configuration........................................................................................................7 User wise Attribute Configuration............................................................................................................8
  • 2. How To Install and Configure SUDO on RHEL 7 1 | P a g e Overview The purpose of this document is guide you in the configuration of SUDO (Super User Doers), wherein normal user is elevated to run the elevated commands on the system. Applies To Tested on RHEL 7, CentOS 7. Pre-Requisites  sudo package is installed Install Package SUDO package is installed by default in when you install operating system, in order to install the package manually, if the package is not installed run the command; yum install -y sudo Verify Package Installation After installation, to verify the sudo package is installed, run the command; yum list installed | grep ^sudo or rpm -qa | grep ^sudo
  • 3. How To Install and Configure SUDO on RHEL 7 2 | P a g e Locate Binary Next to get the binary information for sudo exeutable, run the command; whereis sudo Configure SUDO In order to configure sudo, sudoers configuration file “/etc/sudoers” has to be modified. visudo editor Any standard editors i.e., vi, vim or nano. Though there are few advantages of configuring sudo with “visudo” editor that are listed below:  visudo will lock the sudoers file if a user is accessing it  If the user is already accessing it, user would notified user stating, “/etc/sudoers busy, try again later”  It also checks for syntax errors upon file exit Sudoers File – Default Permissions The owner and group for the sudoers file must both be 0. The file permissions must be set to 0440. This permission is set by default. If you had changed the permission(s) ownership and accidentally, it needs to be rolled back, else sudo will fail. chown -c root:root /etc/sudoers
  • 4. How To Install and Configure SUDO on RHEL 7 3 | P a g e chmod -c 0440 /etc/sudoers Listing Commands Commands that can be executed for user and logged in user can be listed. It also lists the other configuration parameters configured for the user, such as timeout, command restrictions, etc. List Allowed Commands – Current User sudo -l List Allowed Commands – Other User sudo -lU mvcp01 Cached Credentials Upon successful sudo login by the user the credentials are cached for a default time period of 5 minutes and the user can work without a password before the expiry period that is set by the attribute “timestamp_timeout”.
  • 5. How To Install and Configure SUDO on RHEL 7 4 | P a g e This can also be configured to 0 minutes or more than default timeout period of 5 minutes, 0 means the password is not cached and always user will be prompted for password. If the attribute is set less than 0, then users sudo timeout period is set as “never expire”. timestamp_timeout=2 Similarly, you can invalidate or revalidate cached credentials. Revalidate Cached Credentials After successful user’s sudo login, password is stored in cache for 5 minutes (default password lapse period). To extend the password lapse period run the command. If sudo revalidation is done, it will extend the lapse period additional 5 minutes. sudo -v Invalidate Cached Credentials Clear the cached password and ask for password entry for sudo authentication, run the command; Typically, It’s run if the user password has changed and timeout period is not yet expired. sudo -k Customize User’s Timeouts If you would like to customize sudo timestamp_timeout for a specific user, it can be configured by customizing the “timestamp_timeout” attribute with the user prefix and the timeout period, shown as below. This change can be done in either “/etc/sudoers” or “/etc/sudoers.d/ Defaults: sys.admin timestamp_timeout=30 sudo -lU sys.admin
  • 6. How To Install and Configure SUDO on RHEL 7 5 | P a g e Define Command Execution Privileges SUDO can be configured with or without password authentication for users or specific commands that user intends to execute. The user also can be denied command execution for specific command. The below table will give insight into command execution privileges defined for a user. Example: root ALL=(ALL) ALL Definition Purpose sys.admin ALL=(ALL:ALL) ALL This definition applies to user root sys.admin ALL=(ALL:ALL) ALL This rule applies to all user sys.admin logged in from all hosts sys.admin ALL=(ALL:ALL) ALL User sys.admin can run commands as all users sys.admin ALL=(ALL:ALL) ALL User sys.admin can run commands as all groups sys.admin ALL=(ALL:ALL) ALL These rules apply to all commands Define Commands – With Password Few commands that are defined for the user to run can be allowed to run only after keying the valid password by the user, as shown below; User sys.operator can execute the commands “shutdown” and “updatedb” after successful authentication. sys.operator ALL=(ALL) PASSWD: /sbin/shutdown, /usr/bin/updatedb
  • 7. How To Install and Configure SUDO on RHEL 7 6 | P a g e Run Commands – Without Password Execute command(s) without prompting for sudo password, configure the user as below; User sys.admin can execute the commands “shutdown” and “updated” without password. Password-less command execution. mvcp001 ALL=(ALL) NOPASSWD: ALL sys.admin ALL=(ALL) NOPASSWD: /sbin/shutdown, /usr/sbin/updatedb Run Commands – Deny Specific Command Execution If you want to deny a specific user to deny execution of a command prefix it with “!” as shown below; The user can run all other commands expect the command “/usr/bin/passwd” mvcp002 ALL=(root) ALL, !/usr/bin/passwd
  • 8. How To Install and Configure SUDO on RHEL 7 7 | P a g e SUDO – Default Settings To list the current default settings run the command; cat /etc/sudoers | grep ^Defaults Configure – Session Time Out The purpose of this attribute is to set timeout period for the user to enter password for the elevated commands executed each time. Default timeout is 5 minutes, once the user enters the password, the user’s password is remembered for 5 minutes and used need to reenter the password again. System wise Attribute Configuration To implement system configuration, after “Defaults” attribute, modify the changes that are required. Defaults timestamp_timeout=5 #Applies To System wide
  • 9. How To Install and Configure SUDO on RHEL 7 8 | P a g e User wise Attribute Configuration To implement user configuration, after “Defaults” attribute, include username also and modify the changes that are required. This will override the system wide attribute setting. Defaults:mvcp002 timestamp_timeout=0 # Applies to specific user only