{{Header}} {{title|title= Unrestricted Admin Mode }} {{#seo: |description=todo }} {{passwords_mininav}} {{intro| '''{{project_name_short}} can be configured for unrestricted admin mode.''' In this mode, traditional access to privilege escalation tools such as sudo and pkexec is possible for the {{project_name_short}} default limited account user. Most other operating systems do not even call this "unrestricted admin mode" because they do not come with user-sysmaint-split by default. In such systems, unrestricted admin mode is implied. However, {{project_name_short}} provides the flexibility to switch between user-sysmaint-split and unrestricted admin mode depending on your needs. Starting from {{project_name_short}} version TODO Xfce and above, {{project_name_short}} comes with [[sysmaint|user-sysmaint-split]] by default. }} __FORCETOC__ = Uninstalling user-sysmaint-split and Enabling Unrestricted Admin Mode = This chapter documents how to disable user-sysmaint-split and revert to unrestricted admin mode, where the user user can use sudo. '''Optional.''' Discouraged. Warning: Reverting to unrestricted admin mode increases the risk of privilege escalation attacks and may weaken system security. If user-sysmaint-split is installed by default, the easiest way to remove it is by using [[Debian_Packages#dummy-dependency|dummy-dependency]] to avoid meta-package removal issues ([[Debian Packages]]). The --purge option is optional and not required in this case when using dummy-dependency, because user-sysmaint-split has been designed without configuration files in the /etc folder. Instead, user-sysmaint-split uses symlinks, which are deleted upon removal. This design ensures that a standard apt remove user-sysmaint-split will not result in unexpected functionality, such as parts of user-sysmaint-split (e.g., boot menu entries) still being active. {{CodeSelect|code= dummy-dependency user-sysmaint-split }} = Impact = This removes the sysmaint mode related [[Grub|GRUB]] boot menu modifications and reverts back to a "normal" boot menu. Security impact? = Optional Restrictions = After removal the user can configure sudo and/or other privilege escalation tools etc as per usual. = Footer = {{Footer}} [[Category: Design]] [[Category: Development]]