Sudoers file
Using Sudoers file
Unrestricted privileges
betty ALL=(ALL) ALL
The /etc/sudoers
file is used in Unix-like operating systems to control which users and groups have permission to execute commands as other users, including the superuser (root).
Each entry in this file grants specific privileges. Let’s break down the entry betty ALL=(ALL) ALL:
Username - betty: This is the username to whom the rule applies. In this case, the user betty is the one receiving the sudo privileges defined by this entry.
Host Alias - ALL: The first
ALL
specifies the host alias, which determines on which machines this rule is valid. In this context,ALL
means this rule applies to any machine. This is useful in network environments where the same sudoers file might be distributed or used across multiple machines.User Alias - (ALL): The
(ALL)
in parentheses is the user alias. It specifies the users that betty is allowed to run commands as. Here,ALL
means betty can execute commands as any user, includingroot
. This is a powerful privilege.Command Alias - ALL: The last
ALL
is the command alias. It specifies which commands betty is allowed to execute. In this case, ALL means betty is allowed to execute any command.
So, the entry betty ALL=(ALL) ALL
means that the user betty can execute any command as any user (including root) on any machine where this sudoers file is active.
This is a broad level of access and should be granted carefully, as it gives betty essentially unrestricted control over the system.
Restricted with Specific privileges
amy ALL=/usr/sbin/useradd, /usr/bin/passwd, ! /usr/bin/passwd root
This entry in the /etc/sudoers
file defines specific permissions for a user named amy. It’s more restrictive and precise compared to the previous example. Let’s break it down:
Username - amy: This is the username to whom the rule applies. In this case, amy is the user being granted certain sudo privileges.
Host Alias - ALL: As in the previous example, the first
ALL
indicates the host alias. This means that the rule is valid on any machine where this sudoers file is active. It’s a common setting in environments where the same sudoers configuration is used across multiple machines.Command Alias - /usr/sbin/useradd, /usr/bin/passwd, ! /usr/bin/passwd root: This part is more complex than the previous example. It specifies a list of commands that amy is allowed to execute with sudo privileges, with a specific restriction:
/usr/sbin/useradd: amy is allowed to execute the
useradd
command, which is used to create new user accounts./usr/bin/passwd: amy can also execute the
passwd
command, which is used to change user passwords.! /usr/bin/passwd root: The exclamation mark (
!
) indicates a negation. This means amy is explicitly forbidden from changing the root user’s password using the passwd command.
Lack of User Alias - (ALL): Unlike the previous example, this entry does not include
(ALL)
or any other user alias in parentheses. This implies that amy can only execute these commands as her own user account. She cannot use sudo to run these commands as any other user (including root).
So, the entry amy ALL=/usr/sbin/useradd, /usr/bin/passwd, ! /usr/bin/passwd root
means that on any machine, the user amy can use sudo to run the useradd and passwd commands to manage users and their passwords, but she is explicitly forbidden from changing the root password.
This entry provides specific and controlled administrative privileges to amy, enhancing security by limiting the scope of her sudo access.