When you create an AIX account for users, they can run commands to change directories, view files, delete files, and perform other operations in the shell as long as their file permissions allow those operations. That's how it works, and most system administrators are happy working in that environment. However, there are occasions when you need to be a bit more restrictive about users' shell capabilities. For example, suppose third-party support people need to access your AIX system ...

REGISTER NOW TO ACCESS THIS ARTICLE

All registered users get access to premium content on POWER IT Pro for free.

Already registered? here.