--
Registered Linux User # 379282
SUMMARY: Changing the permissions from the default is not recommended,
best practice, or supported by me. :)
That sounds like a pain in the butt. He should be able to give you
sudo access to the things you need (/var/ossec/bin/*).
At least the non-scripted executables. The ossec-control script
wouldn't be hard to modify to use sudo in the appropriate places.
Another possibility may be MAC/RBAC type setups that allow specific
users to perform the necessary actions of managing an OSSEC system.
But this isn't something I've looked into. Most of these systems scare
me with their complexity and my lack of time.
Over-all changing the permissions sounds dangerous. I don't know of
anyone doing testing with odd permissions, so no idea what weird
things could break.
Putting your user in the ossec group may go a long way in getting
access to the various parts, and I guess opening up permissions to the
ossec group may not be too bad... Again, this isn't recommended, just
tossing it out there.
Beyond the initial setup (and future upgrades), what needs to be done
as root? For an agent you add the key and point the agent to the
manager in ossec.conf. Most other things can be handled through the
agent.conf, and wouldn't require root access.