ADX02 - Privileged and Unprivileged Mode on the UNIX Agent

In unprivileged mode, the Unix Agent strictly adheres to the principle of least privilege. This reduces privileges and the attack surface, but deliberately restricts certain operational options. In privileged mode, the scope for action is expanded, but this comes with increased requirements for clean and controlled operation. This article shows you which differences are truly relevant in practice and what you should look out for when classifying them, without getting bogged down in unnecessary theoretical details.

Understanding Automic UNIX Agent privileged and unprivileged Mode

With the Automic UNIX Agent, the difference between privileged and unprivileged Mode is a central security topic. It determines whether an agent can start jobs with a real user-context switch or whether all executions remain in the context of the agent user. This distinction is important when you want to operate Automic jobs on UNIX systems securely, classify login objects correctly, and implement least-privilege requirements cleanly.

In this article you will learn in a practical way how to check the runtime context of a UNIX agent and how to recognize whether a user switch actually takes place. This is not just theory, but concrete observations in the system: process list, file permissions, SUID bit, LOGIN_CHECK, login objects and job reports.

When does an Automic UNIX Agent need privileged Mode?

The privileged Mode is relevant when jobs on the same UNIX Agent should run under different OS users. In this mode the agent can perform a user-context switch, for example from a technical agent user to a functional batch user. That capability is powerful but must be secured deliberately.

You will learn, among other things:

  • how to practically distinguish between privileged and unprivileged on the Automic UNIX Agent

  • what role LOGIN_CHECK plays in the agent INI

  • how login objects relate to the actual OS user

  • why a listener process alone is not sufficient proof of security

  • how to limit allowed target users via [GLOBAL], [USERID] and userid_type

Unprivileged Mode, Anonymous Mode and Host Characteristics

In unprivileged Mode the Automic UNIX Agent cannot perform a user-context switch. According to the documentation, the agent must therefore be operated in Anonymous Mode. For this, LOGIN_CHECK=N in the agent configuration and the appropriate ANONYMOUS_JOB, ANONYMOUS_FT and ANONYMOUS_FE values in the associated UC_HOSTCHAR_* variable are important.

If you are looking for a clear explanation of Automic Agent security, UNIX agent user-switch, Anonymous Mode, UC_HOSTCHAR_DEFAULT, LOGIN_CHECK or least privilege, you will find clear guidance here. The article helps you choose the right operating mode for your UNIX agent and avoid common misinterpretations in Automic operations.

Learn Automic with PEM!

Would you like to learn more about Automic without having to travel across the country for workshops? At PEM, you decide when and how you want to continue your education! In interactive courses, tutorials and videos, you will learn everything you need to know about Automic – and more! And we are always there for you via comment function or email.

Does that sound interesting? Then get started today with PEM, Automic Training 2.0 and year-round Automic support!

More about PEM
Start now

FAQ about Automic Training on PEM

PEM is the most innovative and fastest growing Automic learning platform. It offers PEM members a comprehensive range of online training courses that can be accessed 24/7 and from anywhere. The platform includes dozens of videos and interactive courses and is aimed at beginners and professionals alike.