This repository was archived by the owner on Sep 27, 2024. It is now read-only.
File tree Expand file tree Collapse file tree 2 files changed +13
-0
lines changed Expand file tree Collapse file tree 2 files changed +13
-0
lines changed Original file line number Diff line number Diff line change @@ -363,6 +363,17 @@ files are not supported yet!
363
363
.Selecting a remote machine for scanning
364
364
image::scanning_remote_machine.png[align="center"]
365
365
366
+ The remote user doesn't have to be a superuser - you can setup the remote
367
+ `/etc/sudoers` file (using `visudo`) to enable the paswordless sudo for that particular user,
368
+ and you check the "user is sudoer" checkbox.
369
+
370
+ For example, if the scanning user is `oscap-user`, that would involve putting
371
+
372
+ oscap-user ALL=(root) NOPASSWD: /usr/bin/oscap xccdf eval *
373
+
374
+ user specification into the `sudoers` file, or into a separate file
375
+ that is included by `sudoers` s.a. `/etc/sudoers.d/99-oscap-user`.
376
+
366
377
=== Enable Online Remediation (optional)
367
378
368
379
****
Original file line number Diff line number Diff line change @@ -364,6 +364,8 @@ void OscapScannerRemoteSsh::processError(QString& message)
364
364
{
365
365
message.replace (QRegExp (" ^sudo:" ), " Error invoking sudo on the host:" );
366
366
message += " .\n Only passwordless sudo setup on the remote host is supported by scap-workbench." ;
367
+ message += " \n To configure a non-privileged user oscap-user to run only the oscap binary as root, "
368
+ " add this User Specification to your sudoers file: oscap-user ALL=(root) NOPASSWD: /usr/bin/oscap xccdf eval *" ;
367
369
}
368
370
}
369
371
You can’t perform that action at this time.
0 commit comments