Introducing Sudo for Windows We’re excited to announce the release of Sudo for Windows in Windows 11 Insider Preview Build 26052! Sudo for Windows is a new way for users to run elevated commands directly from an unelevated console session. It is an ergonomic and familiar solution for users who want ...
The security problem has been internally fixed and will be available in the next release
It's not just an alias for 'runas'. It seems to be able to configurably block user input for sudo'd commands, retain the existing environment, ditch it and open a new window, and remember that you've sudo'd in the last minute or so.
It brings up UAC instead of having you input the password
I was Googling like mad just this week on how to execute a cmdlet as Admin from within a script that isn't running with elevated privileges. The results all basically came back with some variation of "just run the script as Admin".
This is the right way to do it. I'm glad it's coming.
The OpenBSD devs published a mail about it. The irony here is how Microsoft would behave if anybody else copied their concepts, including the name. The treatment is never symmetric or reciprocal.
I mean licensing comes in here. The FOSS licenses allow this. Microsoft EULA and copyright almost certainly does not. But yes, I get the sentiment.
It's almost as if all of the FAANG/Magnificent 7 market outperformance the past 15 years was built on the backs of the free labor provided by the FOSS movement. But then they will turn around and claim that non-western companies steal IP, etc and have US intervene to ban competition, or sue in courts. Kind of funny.
Back to the tech discussion, I've been using doas for a few years now instead of sudo. Even on my GNU/Linux machines. It's a lot simpler to setup for desktop workflow machines.
That's where I started, of course - but you can't combine -verb with -credential. It's a silly limitation that seems to make sense to Microsoft. What you can do is configure a savecred which you can call with RunAs, but you then need to update that saved credential every time the password changes.
I do have a $Credential object that has been pulled out of the password safe that has elevation permissions, but can't seem to apply it non-interactively or without being in an elevated session. This appears to be by design. Not that I intended my comment to turn into a support question. 😀
I like it! I think I'll tinker with this on my workstation, potentially even my dev environment. It isn't suitable for my present issue though, as gsudo is not in the SOE. Also, from that little demo thingy, it appears to pop up a UAC prompt the first time it executes. I need to be non-interactive.
If I'm understanding this correctly, it's not even copying. It's apparently just a wrapper for the built-in runas command that's been there since Windows 2000.
@OmnipotentEntity@Pilgrim it's actually not just a wrapper for runas. There's a lot of other plumbing here to get the console handle you're actually using plumbed to the target application. That's the magic that lets you actually interact with the elevated process in the same terminal.
With runas, the target application is just stuck in a separate console window (gross)
This would be real nice if this let you easly run commands as SYSTEM or TrustedInstaller from a script, not just as Admin. Not only can Admin be reached from the "Run as Admininstrator" menu option, is actualy quite limited for messing around with system files. For the most part, Admin lets you mess with system settings/registry, and user files, but not with a lot if system/application files without TAKEOWNing everything.