home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
SGI Enlighten DSM 1.1
/
SGI EnlightenDSM 1.1.iso
/
sco5x
/
admin
/
help
/
C
/
online0359.hlp
< prev
next >
Wrap
Text File
|
1998-06-30
|
1KB
|
39 lines
CRONTAB USER ACCESS CONFIGURATION
cron has built in security features allowing it to control which users
are allowed to execute cron jobs. There are five possible user access
states:
Only root is allowed to execute cron jobs
Only selected users are allowed to execute cron jobs
All users are allowed to execute cron jobs
All users except specified users are allowed to execute cron jobs
No users are allowed to execute cron jobs
You can use this window to display the cron security status of all
hosts.
Hostnames field
If you want to limit this modification to specific hostnames within a
pool, enter those hostnames in this field. If you are using multiple
entries, leave a blank between each entry. You can also use the arrow
button to the right to select the available hosts from the current
pool.
User Access option
Use this set of toggles to specify what type of user cron access you
want to allow.
User Names field
If you want this modification to allow or exclude (deny) specific
users, enter the user name(s) in this field. If you are using multiple
entries, leave a blank between each entry. You can also use the arrow
button to the right to select from a pick list of the users.