HP-UX Reference (11i v2 04/09) - 5 Miscellaneous Topics (vol 9)
p
privileges(5) privileges(5)
NAME
privileges - description of privileged user
DESCRIPTION
The UNIX operating system has traditionally used an "all or nothing" privilege model, where superusers
(those with effective
UID 0
, such as the root user) have virtually unlimited power, and other users have
few or no special privileges.
System administrators often need to delegate limited powers to other users. HP-UX provides several
ways to do this, including restricted sam(1M), the privilege groups described in privgrp (4), the
shutdown.allow
file described in shutdown (1M), and the cron.allow file described in crontab (1).
Because these mechanisms permit users other than superusers to perform certain privileged operations,
HP-UX documentation often uses terms such as "privileged user" or "user who has appropriate privileges"
instead of "superuser" or "root user" when describing who is permitted to perform an operation.
In the absence of a more specific description of the privileges necessary to perform an operation, you can
generally assume that superusers are suitably privileged.
WARNINGS
Product documentation, as discussed above, describes alternate ways that programs or users can obtain
sufficient privileges to perform restricted operations. These alternate ways may be extended in future
product revisions.
SEE ALSO
crontab(1), sam(1M), shutdown(1M), privgrp(4).
Section 5−−270 Hewlett-Packard Company − 1 − HP-UX 11i Version 2: September 2004