I have a problem where a non root user logging in on a VNC Server Session cannot access Add/Remove Software. Sure, I can run yum to do what I need to do, and I've already searched the forum threads and found the following
1. you must login to the actual console, using a non-root user to modify authorizations.
2. You must modify the perms for PackageKit
I'm having a bit of difficulty understanding what the actual steps are and what is actually preventing me from running Add/Remove. I have attempted to set a lot of settings in Authorizations.
For instance, I have set for
Update Packages ->>
Active Console Yes
The exact error message is as follows:
Package installer is running when the session is not active
These applications should be run only when on active console.
This normally indicates a bug with your remote desktop implementation.
I have also added my non-root user under Explicit Authorizations with no restrictions.
Still, when i log in to a VNC session after modifying these settings, and I still get the same error.
I also have a question related to how the authorizations take effect.
Do they take effect immediately?, OR
Do I need to restart Vncserver service OR
Do I need to restart the X server? OR something else?
Im at my wits end with this thing and I have found another thread Called F10 Headless Servers with no real solution at the end. Reference : http://forums.fedoraforum.org/showthread.php?t=197339
/* RANT ON
I can't help but think that all of this policy junk on a default install of the Linux Operating System is akin to microsoft's implementation of the standard unix operating philosophy of operating as a non-root user. If we want to tighten up our security, then we should have tools such as Policy Kit to do this, and I am assuming that this is PolicyKit that is preventing me from running this and not some other bug. But its ridiculous to try the linux community in the same fashion that Microsoft treats the average household user.
END RANT */
Rediscover Hotmail®: Get e-mail storage that grows with you. Check it out.