Root privileges on Anchor dedicated servers
Anchor dedicated and virtual private GNU/Linux servers are delivered as a hardware (or virtualised hardware) product bundled with your choice of support package or level of hands-off management. Your choice of support package will dictate how root (or superuser) privileges are gained on your service.
All Windows Server 2003 and 2008 products are currently delivered with local administrator privileges, irrespective of your chosen support package.
As an Anchor Monitor customer, you will have been provided with the root password to your server in the e-mail describing your new service. As an exercise in best practices, we strongly recommend that this password be changed as soon as possible and that root logins over SSH be limited to the RSA authentication scheme.
As an Anchor Secure customer, you will have been provided with one or more sudoer accounts capable of executing administrative directives as root. For a root shell:
- Log into the server over SSH using the credentials supplied in the e-mail describing your new service.
At your shell, invoke the following:
(Older systems may require sudo su - Note that the trailing dash is significant.)
- Enter your password when prompted.
- Perform administrative tasks using the root shell.
To return to an unprivileged shell, enter:
or hit ^D (control + D) on your keyboard.
Never run services from an account with sudoer privileges.
Anchor Complete customers are barred from executing administrative directives as root. In order to maintain quality of service, Anchor's technical staff implement all change requests on your behalf as a core component of our fully-managed service. Authorised account contacts are welcome to contact us during support hours to lodge new change requests.