Check out the sudo command - this lets you give "root" permission to individuals for individual commands: ie you can list those who can kill users, and a different group who can, for example, mount filesystems, etc.
With suitable scripts, you can even restrict which arguments can be passed to which commands.
Just vi /etc/passwd and copy roots entry to a new line and then change the home directory and login name. Then use ' passwd <new username> ' from the command line to set the password for the new pseudo root user. Works like a charm.
However be VERY careful editing /etc/passwd as any mistakes to other users could hose your system faster than rm -r *
Go with fishiface's suggestion. You will be able to manage access much better with this. Also your security auditors (if you use any) will not be happy with multiple UID 0 users. Having said that, that is the correct answer to the question
If the user has access to shell out to the command level, have them kill their own process. "Thy who makes a process, can die by their process". Yah i know, not vary Shakespear like, but it works. Sometimes, the end user has to learn to stop making problems for the rest of the IT world and insignificant phone calls. Maybe if they see what we go through, they will not press Ctrl+C in their applications. <grin>
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.