AUTHS(1) User Commands AUTHS(1)
auths - print authorizations granted to a user
auths [ user ]...
The auths command prints on standard output the authorizations that
you or the optionally-specified user or role have been granted.
Authorizations are rights that are checked by certain privileged
programs to determine whether a user may execute restricted
functionality.
Each user may have zero or more authorizations. Authorizations are
represented by fully-qualified names, which identify the organization
that created the authorization and the functionality that it
controls. Following the Java convention, the hierarchical components
of an authorization are separated by dots (.), starting with the
reverse order Internet domain name of the creating organization, and
ending with the specific function within a class of authorizations.
An asterisk (*) indicates all authorizations in a class.
A user's authorizations are looked up in user_attr(5) and in the
/etc/security/policy.conf file (see policy.conf(5)). Authorizations
may be specified directly in user_attr(5) or indirectly through
prof_attr(5). Authorizations may also be assigned to every user in
the system directly as default authorizations or indirectly as
default profiles in the /etc/security/policy.conf file.
The auths output has the following form:
example% auths tester01 tester02
tester01 : solaris.system.date,solaris.jobs.admin
tester02 : solaris.system.*
example%
Notice that there is no space after the comma separating the
authorization names in tester01.
The following exit values are returned:
0
Successful completion.
1
An error occurred.
/etc/user_attr
/etc/security/auth_attr
/etc/security/policy.conf
/etc/security/prof_attr
profiles(1), roles(1), getauthattr(3SECDB), auth_attr(5),
policy.conf(5), prof_attr(5), user_attr(5), attributes(7)
March 25, 2004 AUTHS(1)
NAME
auths - print authorizations granted to a user
SYNOPSIS
auths [ user ]...
DESCRIPTION
The auths command prints on standard output the authorizations that
you or the optionally-specified user or role have been granted.
Authorizations are rights that are checked by certain privileged
programs to determine whether a user may execute restricted
functionality.
Each user may have zero or more authorizations. Authorizations are
represented by fully-qualified names, which identify the organization
that created the authorization and the functionality that it
controls. Following the Java convention, the hierarchical components
of an authorization are separated by dots (.), starting with the
reverse order Internet domain name of the creating organization, and
ending with the specific function within a class of authorizations.
An asterisk (*) indicates all authorizations in a class.
A user's authorizations are looked up in user_attr(5) and in the
/etc/security/policy.conf file (see policy.conf(5)). Authorizations
may be specified directly in user_attr(5) or indirectly through
prof_attr(5). Authorizations may also be assigned to every user in
the system directly as default authorizations or indirectly as
default profiles in the /etc/security/policy.conf file.
EXAMPLES
Example 1: Sample output
The auths output has the following form:
example% auths tester01 tester02
tester01 : solaris.system.date,solaris.jobs.admin
tester02 : solaris.system.*
example%
Notice that there is no space after the comma separating the
authorization names in tester01.
EXIT STATUS
The following exit values are returned:
0
Successful completion.
1
An error occurred.
FILES
/etc/user_attr
/etc/security/auth_attr
/etc/security/policy.conf
/etc/security/prof_attr
SEE ALSO
profiles(1), roles(1), getauthattr(3SECDB), auth_attr(5),
policy.conf(5), prof_attr(5), user_attr(5), attributes(7)
March 25, 2004 AUTHS(1)