mirror of
https://github.com/rd235/cado
synced 2024-12-26 14:03:07 +01:00
Fix spelling and grammar errors
This commit is contained in:
parent
792020b65d
commit
c3bc6f56dd
@ -15,7 +15,7 @@ cado \- Capability Ambient DO
|
||||
]
|
||||
|
||||
.SH DESCRIPTION
|
||||
Cado permits to delegate capabilities to users.
|
||||
Cado allows the system administrator to delegate capabilities to users.
|
||||
Cado is a capability based sudo. Sudo allows authorized users to run programs as root (or as another user),
|
||||
cado allows authorized users to run programs with specific (ambient) capabilities.
|
||||
|
||||
|
@ -14,7 +14,7 @@ cadrop \- Capability Ambient Drop
|
||||
]
|
||||
|
||||
.SH DESCRIPTION
|
||||
Cadrop permits to drop (ambient) capabilities.
|
||||
Cadrop allows users to drop (ambient) capabilities.
|
||||
|
||||
Cadrop launches the command indicated as a parameter ($SHELL if omitted) dropping all the capabilities
|
||||
listed in the capability_list.
|
||||
|
@ -20,8 +20,8 @@ scado \- Script Capability Ambient DO
|
||||
|
||||
.SH DESCRIPTION
|
||||
|
||||
\fBcado(1)\fR permits to delegate capabilities to users.
|
||||
Users can grant a subset of these ambient capabilities to trusted programs.
|
||||
\fBcado(1)\fR allows the system administrator to delegate capabilities to users.
|
||||
Users can grant a subset of these ambient capabilities to trusted programs.
|
||||
Each user can define their own list of trusted programs and which capabilities to grant, using a scado file.
|
||||
\fBcado -S\fR or \fBcado --scado\fR run those trusted programs without any further authentication.
|
||||
In this way it is also possible to run programs requiring specific capabilities within a bash script.
|
||||
|
@ -71,7 +71,7 @@ void usage(char *progname) {
|
||||
fprintf(stderr," -f, --force do not display warnings, do what is allowed\n");
|
||||
fprintf(stderr," -v, --verbose generate extra output\n");
|
||||
fprintf(stderr," -S, --scado check scado pre-authorization for scripts\n");
|
||||
fprintf(stderr," -s, --setcap set the minimun caps for %s (root access)\n",progname);
|
||||
fprintf(stderr," -s, --setcap set the minimum caps for %s (root access)\n",progname);
|
||||
exit(1);
|
||||
}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user