08-07-2002
on a decently secure system, shadowed passwords will be enabled. Thus, your solution won't work. You can however, edit /etc/shadow and change the minimum passwd expiration. Read the man page for shadow:
man shadow
That will give you what you want
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I'm tasked to change a user's password on multiple Linux systems (RH v3). I though copying the encrypted password from one Linux /etc/shadow file to another would work but I was wrong.
The long term solution is to establish an openLDAP Directory service, but for now I'm stuck with a manual... (1 Reply)
Discussion started by: benq70
1 Replies
2. UNIX for Dummies Questions & Answers
I want to change login failure message, "login incorrect"
deny user login for user id tom
sudo passwd -l tom
type username and type password on login prompt
and then it will display login failure message "login incorrect"
console
############
login: tom
password:
login incorrect... (2 Replies)
Discussion started by: lifegeek
2 Replies
3. Shell Programming and Scripting
Hi Friends.
I am new to scripting now i want to change the root password using the script with standard password.
which is the easy scripting to learn for the beginner, Thanks in advance. (2 Replies)
Discussion started by: kurva
2 Replies
4. Solaris
Hi Gurus
I have a few Sol 5.9 servers and i have enabled password less authentication between them for my user ID. Often i have found that when my password has expired,the login fails.
Resetting my password reenables the keys.
Do i need to do something to avoid this scenario or is this... (2 Replies)
Discussion started by: Renjesh
2 Replies
5. Solaris
Hi
Any body knows how to prompt user to change password on first login in a Solaris NIS client.
Thanks
HG (3 Replies)
Discussion started by: Hari_Ganesh
3 Replies
6. AIX
AIX 6.1
User has a password set.
It needs to be a blank password (no password).
smit passwd
enter user name
at change password and confirm password, just press ENTER
Afterwards, I could not log on with blank password or with original password.
How can I change the password to a... (2 Replies)
Discussion started by: landog
2 Replies
7. UNIX for Advanced & Expert Users
Hi All,
I have an SFTP server where there are user id's created for vendors and given only SFTP access for them (eg: given below)
jim.tran:x:10040:10008:abc.def@ghi.com:/dropbox:/bin/false
They cannot login to the server via SSH and can only do an SFTP. These users are set up as jailed... (1 Reply)
Discussion started by: nathsaba
1 Replies
8. Solaris
Hi there,
Is there a way to ask the solaris user to change passwordo n the first login. I am looking at how to do this for every single new user. (5 Replies)
Discussion started by: alvinoo
5 Replies
9. Forum Support Area for Unregistered Users & Account Problems
I was unable to login and so used the "Forgotten Password' process. I was sent a NEWLY-PROVIDED password and a link through which my password could be changed. The NEWLY-PROVIDED password allowed me to login.
Following the provided link I attempted to update my password to one of my own... (1 Reply)
Discussion started by: Rich Marton
1 Replies
LEARN ABOUT REDHAT
grpconv
PWCONV(8) System Manager's Manual PWCONV(8)
NAME
pwconv, pwunconv, grpconv, grpunconv - convert to and from shadow passwords and groups.
SYNOPSIS
pwconv
pwunconv
grpconv
grpunconv
DESCRIPTION
These four programs all operate on the normal and shadow password and group files: /etc/passwd, /etc/group, /etc/shadow, and /etc/gshadow.
pwconv creates shadow from passwd and an optionally existing shadow. pwunconv creates passwd from passwd and shadow and then removes
shadow. grpconv creates gshadow from group and an optionally existing gshadow. grpunconv creates group from group and gshadow and then
removes gshadow.
Each program acquires the necessary locks before conversion.
pwconv and grpconv are similiar. First, entries in the shadowed file which don't exist in the main file are removed. Then, shadowed
entries which don't have `x' as the password in the main file are updated. Any missing shadowed entries are added. Finally, passwords in
the main file are replaced with `x'. These programs can be used for initial conversion as well to update the shadowed file if the main
file is edited by hand.
pwconv will use the values of PASS_MIN_DAYS, PASS_MAX_DAYS, and PASS_WARN_AGE from /etc/login.defs when adding new entries to /etc/shadow.
Likewise, pwunconv and grpunconv are similiar. Passwords in the main file are updated from the shadowed file. Entries which exist in the
main file but not in the shadowed file are left alone. Finally, the shadowed file is removed.
Some password aging information is lost by pwunconv. It will convert what it can.
BUGS
Errors in the password or group files (such as invalid or duplicate entries) may cause these programs to loop forever or fail in other
strange ways. Please run pwck and grpck to correct any such errors before converting to or from shadow passwords or groups.
SEE ALSO
login.defs(5), grpck(8), pwck(8)
26 Sep 1997 PWCONV(8)