You need to be root to do this but there is no single command available. From the /etc/security/passwd you get the information when the password for a particular user was set ("lastupdate"). You'd then check the user's attributes to find the intervall for a forced password change. With those two values and the current date you can calculate when the current password will be expired. Thus a script would probably be written around the following commands:
Search the script forum to find how to convert a date into seconds from epoch for easy comparison. You might even find several complete scripts there for accomplishing your aim.
Hi,
Is there any way of sending an email to a number of users indicating that the passwords of user accounts will expire?
Currently we have a test server with a number of oracle test accounts on it. Each of these accounts correspond to an instance of Oracle on the server. These... (2 Replies)
Hi,
Is there any way of sending an email to a number of users indicating that the passwords of user accounts will expire?
Currently we have a test server with a number of oracle test accounts on it. Each of these accounts correspond to an instance of Oracle on the server. These... (2 Replies)
Hi Gurus
I have a few Sol 5.9 servers and i have enabled password less authentication between them for my user ID. Often i have found that when my password has expired,the login fails.
Resetting my password reenables the keys.
Do i need to do something to avoid this scenario or is this... (2 Replies)
Hi All,
I want to write a script that will send the alert when linux server password expiry for user 'x' is less than 12 days.
I have written the below script but this is not working for expiry date 04 july
script;-
P_EXPIRY_DATE=`chage -l msdp| grep 'Password expires' | awk ' {... (2 Replies)
Hi,
I would like to know is there command which will tell me when password will be expire and when last password was changed ?
like on linux chage -l <username? (2 Replies)
Hi,
Here's the version of unix that we are working on.
> uname -a
AIX yyyyyyyy 1 6 00F613E24C00
@:on(cluster303)/iishomea/kmani00->
i have application id: aaabbb
Now i need to check whether the password for the application id set to non expiry type or not.
Moreover, with that unix... (3 Replies)
Discussion started by: kmanivan82
3 Replies
LEARN ABOUT OSX
openssl-passwd
PASSWD(1SSL) OpenSSL PASSWD(1SSL)NAME
openssl-passwd, passwd - compute password hashes
SYNOPSIS
openssl passwd [-help] [-crypt] [-1] [-apr1] [-aixmd5] [-5] [-6] [-salt string] [-in file] [-stdin] [-noverify] [-quiet] [-table] [-rand
file...] [-writerand file] {password}
DESCRIPTION
The passwd command computes the hash of a password typed at run-time or the hash of each password in a list. The password list is taken
from the named file for option -in file, from stdin for option -stdin, or from the command line, or from the terminal otherwise. The Unix
standard algorithm crypt and the MD5-based BSD password algorithm 1, its Apache variant apr1, and its AIX variant are available.
OPTIONS -help
Print out a usage message.
-crypt
Use the crypt algorithm (default).
-1 Use the MD5 based BSD password algorithm 1.
-apr1
Use the apr1 algorithm (Apache variant of the BSD algorithm).
-aixmd5
Use the AIX MD5 algorithm (AIX variant of the BSD algorithm).
-5
-6 Use the SHA256 / SHA512 based algorithms defined by Ulrich Drepper. See <https://www.akkadia.org/drepper/SHA-crypt.txt>.
-salt string
Use the specified salt. When reading a password from the terminal, this implies -noverify.
-in file
Read passwords from file.
-stdin
Read passwords from stdin.
-noverify
Don't verify when reading a password from the terminal.
-quiet
Don't output warnings when passwords given at the command line are truncated.
-table
In the output list, prepend the cleartext password and a TAB character to each password hash.
-rand file...
A file or files containing random data used to seed the random number generator. Multiple files can be specified separated by an OS-
dependent character. The separator is ; for MS-Windows, , for OpenVMS, and : for all others.
[-writerand file]
Writes random data to the specified file upon exit. This can be used with a subsequent -rand flag.
EXAMPLES
% openssl passwd -crypt -salt xx password
xxj31ZMTZzkVA
% openssl passwd -1 -salt xxxxxxxx password
$1$xxxxxxxx$UYCIxa628.9qXjpQCjM4a.
% openssl passwd -apr1 -salt xxxxxxxx password
$apr1$xxxxxxxx$dxHfLAsjHkDRmG83UXe8K0
% openssl passwd -aixmd5 -salt xxxxxxxx password
xxxxxxxx$8Oaipk/GPKhC64w/YVeFD/
COPYRIGHT
Copyright 2000-2018 The OpenSSL Project Authors. All Rights Reserved.
Licensed under the OpenSSL license (the "License"). You may not use this file except in compliance with the License. You can obtain a
copy in the file LICENSE in the source distribution or at <https://www.openssl.org/source/license.html>.
1.1.1a 2018-12-18 PASSWD(1SSL)