Difference between admin and normal user

Hi Community,


how does the user right management works when an admin account is used? In Mac OSX an admin isn't really an admin account because the user become prompted for the (admin) user password again if he require higher privileges. Microsoft implemented since Windows Vista a similar technique, an administrator account works with a normal user token and if higher privileges are needed, the user will get the UAC dialog to grant higher privileges. This is done by providing the user an admin token temporarily.


Is this the same way Mac OSX works or is this done by a different technique?


Thx & Bye Tom

Posted on May 1, 2013 4:17 AM

Reply
14 replies

May 1, 2013 4:37 AM in response to prontosystems

An Admin user is added to an admin group. Members of the admin group are allowed to use the Unix 'sudo' command. The Unix sudo command allows the user to become the Unix 'root' account for the duration of one command/utility/program.


Apple wraps GUI's around the use of sudo, but it is the heart of any Unix system administration.


Google 'sudo' if you want more details.

May 1, 2013 4:53 AM in response to BobHarris

Hi Bob,


always on duty, hm?

BobHarris wrote:


An Admin user is added to an admin group. Members of the admin group are allowed to use the Unix 'sudo' command. The Unix sudo command allows the user to become the Unix 'root' account for the duration of one command/utility/program.

And that's all? The user is member of the admin group and is allowed to use sudo? I asked this because I listen to another discussion in a German newsgroup where the risk of using an admin account is addressed. On my Mac I have no fear of using an admin account but I was not aware that this is just that simple.


Thx & Bye Tom

May 1, 2013 5:41 AM in response to prontosystems

That's pretty much all, yes. Presuming no bypasses, the downside of running an admin user is largely you can potentially end up installing more than you bargained for. There are folks that deliberately choose not to run as Admin users, so that there's simply no way that they can install anything system-wide short of a security bypass.


For further reading and improving your knowledge security beyond "root" and "sudo", there are Apple's security guides and the US NSA/CIA operating system security configuration guides. Both of these resources are a little dated, but the underpinnings of the operating system and its security have not changed significantly; what you learn will still be valid, though there can be some features of newer releases (such as the profile manager, the lack of installed Java) that might be useful.


Wo ist die Diskussion, bitte?

May 1, 2013 6:12 AM in response to BobHarris

And that's all? The user is member of the admin group and is allowed to use sudo?


'root' is the ONLY truly privileged account on a Unix system. Once you can be root, you can do anything. Permissions can be used to put safeties in front of some root actions, but root can undo them if it wants to.


If you want to verify, then create 2 accounts. Give one account "Adimin" and leave the other as a non-Admin user.


Now from an Applications -> Utilties -> Terminal session enter the following commands:


id normal_user_short_name
id admin_user_short_name


Check the list of groups each use is associated with. The only difference should be that the Admin user should have the 80(admin) associated with it.


Then the /etc/sudoers file (which you will need sudo to read) has an entry that gives Admin users "ALL" privileges, just like root:


...
# User privilege specification
root    ALL=(ALL) ALL
%admin    ALL=(ALL) ALL
...

May 1, 2013 6:24 AM in response to prontosystems

There are some subtle differences between an admin account and a standard account. I believe an admin account can do things like copy files to the /Applications directory and maybe /Library. It is possible that feature has been removed in Mountain Lion. I'm not sure. I am sure that there is no real reason for your primary user account to be an admin account. I have admin accounts dedicated to that purpose. If I need to modify some system setting, instead of being prompted for my password, I must supply the username and password of the admin account. If I need to so something on the command line, I can just "su" into the admin account and run sudo from there.

May 2, 2013 1:12 AM in response to MrHoffman

Hi MrHoffman

MrHoffman wrote:


For further reading and improving your knowledge security beyond "root" and "sudo", there are Apple's security guides and the US NSA/CIA operating system security configuration guides. Both of these resources are a little dated, but the underpinnings of the operating system and its security have not changed significantly; what you learn will still be valid, though there can be some features of newer releases (such as the profile manager, the lack of installed Java) that might be useful.


Thanks a lot. The link to the Mac OS security configuration guide seems to be broken but I took a short look into the Linux guide and this is also very interesting, even if I'm not using Redhat but Debian.


MrHoffman wrote:


Wo ist die Diskussion, bitte?


In de.comp.sys.mac.misc but only one posing is interesting:

Message-ID: <slrnknnu85.5mh.Thomas.Kaiser@phg-online.de>


And there is only the problem addressed about the difference between an users login shell and an interactive sub shell and how it could be used for privilege escalation by modifying the $PATH variable to execute malicious code with root privileges. I remember this on earlier days in Linux when the actual directory (.) was at the end of the $PATH variable. This could end in the same issue after all.


Thx & Bye Tom

May 2, 2013 5:00 AM in response to MrHoffman

MrHoffman wrote:


Odd. The link is not broken here; opens fine with Safari.


Hm, if I navigate to the link target[1] by myself, the document is loading. But if I'm using the link[2] from the NSA site, I receive the following error:


---snip---

An error occurred while processing your request.

Reference #97.767ffea5.1367494820.4b43e07e

---snap---


[1] http://images.apple.com/support/security/guides/docs/SnowLeopard_Security_Config _v10.6.pdf

[2] http://www.nsa.gov/applications/links/notices.cfm?address=http://images.apple.co m/support/security/guides/docs/SnowLeopard_Security_Config_v10.6.pdf


Really odd but it's not our problem anyway. I knew this document already but at that time I didn't study it about that specific question. So I can take a closer look again, thanks.


Bye Tom

May 2, 2013 7:01 AM in response to prontosystems

prontosystems wrote:


I'm able to open the link under the Linux section for example or did you mean that ironically? ;-)

No irony intended. I am very familiar with .gov IT. The Linux link works because it is hosted on the NSA's site. One of the Mac links, and one of the Windows links, is a redirect to the vendor site that doesn't work. On the NSA site, you must also use the appropriate menu navigation to find any of those links. The search feature returns another one of those internal server errors. Government IT definitely prefers Linux. They can burn through taxpayer dollars faster with Linux than with any other OS.

May 4, 2013 4:00 PM in response to prontosystems

It's worth noting that no one uses MS Windows user token technique outside of Windows; it was primarily put in place originally to try and shoehorn some psuedo-privilage separation into Windows around the same time that NTFS provided a filesystem capable of actually providing multi-user protections at the filesystem level.


It's both elegant and grotesque, in ways that can't really be appreciated until you see it being used in the context of Group Policy Objects being pushed by Active Directory in a full up Windows domain or forest.


And not really very secure at all.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Difference between admin and normal user

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.