Choose effective or real user ID for the command selected in the Commands Permitted column. Usually, the effective user ID is sufficient for granting access to restricted system resources. However, sometimes the real user ID is required.
If you are unsure, try effective first. If the command does not perform as expected, then the real user ID is probably necessary.
For example, suppose you want to grant a user the right to add applications with the pkgadd
command, which usually requires the user to be root. First, select pkgadd
in the Commands Permitted column. Then, choose
root
for User Ownership in this dialog box. Finally, select Real and grant this right to the user.
The user will be able to use the pkgadd
command without knowing the root
password.
Click Apply to apply the current settings. Click Reset to return to the settings that existed the last time you clicked Apply.