Document that sudo uses the real uid to map from uid to passwd file
user name.
This commit is contained in:
@@ -16,7 +16,9 @@ SSYYNNOOPPSSIISS
|
||||
|
||||
DDEESSCCRRIIPPTTIIOONN
|
||||
ssuuddoo allows a permitted user to execute a _c_o_m_m_a_n_d as the superuser or
|
||||
another user, as specified by the security policy.
|
||||
another user, as specified by the security policy. The invoking user's
|
||||
real (_n_o_t effective) user ID is used to determine the user name with
|
||||
which to query the security policy.
|
||||
|
||||
ssuuddoo supports a plugin architecture for security policies and
|
||||
input/output logging. Third parties can develop and distribute their own
|
||||
@@ -606,4 +608,4 @@ DDIISSCCLLAAIIMMEERR
|
||||
file distributed with ssuuddoo or http://www.sudo.ws/license.html for
|
||||
complete details.
|
||||
|
||||
Sudo 1.8.15 August 7, 2015 Sudo 1.8.15
|
||||
Sudo 1.8.15 August 9, 2015 Sudo 1.8.15
|
||||
|
@@ -410,4 +410,4 @@ DDIISSCCLLAAIIMMEERR
|
||||
file distributed with ssuuddoo or http://www.sudo.ws/license.html for
|
||||
complete details.
|
||||
|
||||
Sudo 1.8.15 December 4, 2014 Sudo 1.8.15
|
||||
Sudo 1.8.15 August 9, 2015 Sudo 1.8.15
|
||||
|
@@ -16,7 +16,7 @@
|
||||
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||||
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.\"
|
||||
.TH "SUDO" "5" "December 4, 2014" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
|
||||
.TH "SUDO" "5" "August 9, 2015" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
|
||||
.nh
|
||||
.if n .ad l
|
||||
.SH "NAME"
|
||||
|
@@ -21,7 +21,7 @@
|
||||
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
|
||||
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
|
||||
.\"
|
||||
.TH "SUDO" "8" "August 7, 2015" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
|
||||
.TH "SUDO" "8" "August 9, 2015" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
|
||||
.nh
|
||||
.if n .ad l
|
||||
.SH "NAME"
|
||||
@@ -89,6 +89,10 @@ allows a permitted user to execute a
|
||||
\fIcommand\fR
|
||||
as the superuser or another user, as specified by the security
|
||||
policy.
|
||||
The invoking user's real
|
||||
(\fInot\fR
|
||||
effective) user ID is used to determine the user name with which
|
||||
to query the security policy.
|
||||
.PP
|
||||
\fBsudo\fR
|
||||
supports a plugin architecture for security policies and input/output
|
||||
|
@@ -77,6 +77,10 @@ allows a permitted user to execute a
|
||||
.Ar command
|
||||
as the superuser or another user, as specified by the security
|
||||
policy.
|
||||
The invoking user's real
|
||||
.No ( Em not
|
||||
effective) user ID is used to determine the user name with which
|
||||
to query the security policy.
|
||||
.Pp
|
||||
.Nm
|
||||
supports a plugin architecture for security policies and input/output
|
||||
|
Reference in New Issue
Block a user