Serevu deals with users who have tried to log in unsuccessfully.
T he daemon 'serevu' can be started by a non-root user provided that a set of rules authorising an Access Control (AC) administrator to do so, are present in the Access Control database.
The steps outlined below assume a standard installation of Access Control where all the classes required for the example below to work, are enabled by default.
It is assumed that the user that will be allowed to start the 'serevu' daemon is already present at Operating System level.
In this example, a user called 'actest' will be used, and the name of the system is 'myServer.acme.com'. The user designated to start serevu, in this case actest, needs to be an AccessControl administrator.
From the selangcommand prompt execute the following commands:
- nu actest admin
- auth TERMINAL myServer.acme.com uid(actest) access(a)
- auth PROGRAM /opt/CA/eTrustAccessControl/bin/sesudo uid(actest) access(exec)
- auth SURROGATE USER.root uid(actest) acc(read)
- nr SUDO serevu data('serevu')
- auth SUDO serevu uid(actest)
- exit the 'selang' environment.
- From the UNIX command prompt as root execute:
- Next telnet in as actest and execute:
The sesudo command above should come back with the following output:
serevu : serevu
- Finally execute serevu via sesudo:
The Access Control ' issec' command should now show the 'serevu' daemon running with its corresponding PID.