Runas
Encyclopedia
In computing
,
in the Microsoft Windows
line of operating system
s that allows a user to run specific tools and programs under a different username
to the one that was used to logon
to a computer interactively. It is similar to the Unix
command
operating system, when the underlying CreateProcessAsUser API that it uses was added. Any application can use this API to create a process
with alternate credentials, for example, Windows Explorer
in Windows 7 allows an application to be started under a different account if the shift key is held while right-clicking its icon
. The program has the ability to cache verified credentials so that the user only every has to enter them once.
operating system.
Note: The command is only invoked if setting of the user name succeeds.
Computing
Computing is usually defined as the activity of using and improving computer hardware and software. It is the computer-specific part of information technology...
,
runas
is a commandCommand (computing)
In computing, a command is a directive to a computer program acting as an interpreter of some kind, in order to perform a specific task. Most commonly a command is a directive to some kind of command line interface, such as a shell....
in the Microsoft Windows
Microsoft Windows
Microsoft Windows is a series of operating systems produced by Microsoft.Microsoft introduced an operating environment named Windows on November 20, 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces . Microsoft Windows came to dominate the world's personal...
line of operating system
Operating system
An operating system is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system...
s that allows a user to run specific tools and programs under a different username
User (computing)
A user is an agent, either a human agent or software agent, who uses a computer or network service. A user often has a user account and is identified by a username , screen name , nickname , or handle, which is derived from the identical Citizen's Band radio term.Users are...
to the one that was used to logon
Logging (computer security)
In computer security, a login or logon is the process by which individual access to a computer system is controlled by identifying and authentifying the user referring to credentials presented by the user.A user can log in to a system to obtain access and can then log out or log off In computer...
to a computer interactively. It is similar to the Unix
Unix
Unix is a multitasking, multi-user computer operating system originally developed in 1969 by a group of AT&T employees at Bell Labs, including Ken Thompson, Dennis Ritchie, Brian Kernighan, Douglas McIlroy, and Joe Ossanna...
command
sudoSudosudo is a program for Unix-like computer operating systems that allows users to run programs with the security privileges of another user...
, but uses a completely separate account rather than adding privileges to an existing one.Microsoft Windows
Therunas
command was introduced with the Windows 2000Windows 2000
Windows 2000 is a line of operating systems produced by Microsoft for use on personal computers, business desktops, laptops, and servers. Windows 2000 was released to manufacturing on 15 December 1999 and launched to retail on 17 February 2000. It is the successor to Windows NT 4.0, and is the...
operating system, when the underlying CreateProcessAsUser API that it uses was added. Any application can use this API to create a process
Process (computing)
In computing, a process is an instance of a computer program that is being executed. It contains the program code and its current activity. Depending on the operating system , a process may be made up of multiple threads of execution that execute instructions concurrently.A computer program is a...
with alternate credentials, for example, Windows Explorer
Windows Explorer
This article is about the Windows file system browser. For the similarly named web browser, see Internet ExplorerWindows Explorer is a file manager application that is included with releases of the Microsoft Windows operating system from Windows 95 onwards. It provides a graphical user interface...
in Windows 7 allows an application to be started under a different account if the shift key is held while right-clicking its icon
Computer icon
A computer icon is a pictogram displayed on a computer screen and used to navigate a computer system or mobile device. The icon itself is a small picture or symbol serving as a quick, intuitive representation of a software tool, function or a data file accessible on the system. It functions as an...
. The program has the ability to cache verified credentials so that the user only every has to enter them once.
Syntax
Examples
Inferno
The command is also included in the InfernoInferno (operating system)
Inferno is a distributed operating system started at Bell Labs, but is now developed and maintained by Vita Nuova Holdings as free software. Inferno was based on the experience gained with Plan 9 from Bell Labs, and the further research of Bell Labs into operating systems, languages, on-the-fly...
operating system.
Syntax
runas
writes the user
to /dev/user
and invokes cmd
with the given arguments.Note: The command is only invoked if setting of the user name succeeds.
See also
- Comparison of privilege authorization featuresComparison of privilege authorization featuresA number of computer operating systems employ security features to help prevent malicious software from gaining sufficient privileges to compromise the computer system...
- Principle of least privilegePrinciple of least privilegeIn information security, computer science, and other fields, the principle of least privilege, also known as the principle of minimal privilege or just least privilege, requires that in a particular abstraction layer of a computing environment, every module must be able to access only the...
- User Account ControlUser Account ControlUser Account Control is a technology and security infrastructure introduced with Microsoft's Windows Vista and Windows Server 2008 operating systems, with a more relaxed version also present in Windows 7 and Windows Server 2008 R2...
, which disables the Administrator SID for the desktop, allowing it to re-enabled by exception.