Sponsored Content
Full Discussion: failed login time limit
Operating Systems AIX failed login time limit Post 302074617 by jyoung on Wednesday 24th of May 2006 01:59:18 PM
Old 05-24-2006
If you log in as root and go into smitty you can reset the failed logins or unlock an account. I was under the impression that it reset "failed logins" once you logged in successfully. Type smitty then select Security and Users then Users.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Limit login time...

How do I limit the amount of idle time an account gets on solaris? Thanks. VJ (2 Replies)
Discussion started by: vancouver_joe
2 Replies

2. Shell Programming and Scripting

User Login Limit

Gud day :) We have a limited user login so we want to restrict 1 login per user. We have added below script in each user's profile but it is not working :confused: , I displayed the output for COUNT (by inserting echo command) but the value is always 1. Hope you could help me. Thanks ;) ... (3 Replies)
Discussion started by: lancemendioro
3 Replies

3. Solaris

how to reset failed login in solaris 8.0

hi, can someone tell me " how to reset failed login in solaris 8.0" a user is not able to login and inspite of my changing password cannot. I believe it must be because the user tried many attempts. how do i reset the failed login for the user. Thanks! karthik (2 Replies)
Discussion started by: karthikosu
2 Replies

4. UNIX for Dummies Questions & Answers

Error, Login Limit Exceeded by 1 user

Would appreciate some help, system was displaying an error regarding the kernal when a "sar" was run, after a reboot we get "WARNING user login limit exceeded by 1 user". We have plenty of licences. any ideas? (1 Reply)
Discussion started by: nchrocc
1 Replies

5. Solaris

Last Failed Login

Hi, Would appreciate it if someone could shed me some light here as I'm yet to find any related information in this forum with regards to my problem. Basically, I would like to display "Last Unsuccessful login" information when a user successfully logs-in to the system. I can't seem to find... (2 Replies)
Discussion started by: gilberteu
2 Replies

6. Red Hat

limit non login id for ftp

Hi All, How can I limit a userid (/bin/false) to have access only to ftp service? On redhat ent 4. Thanks! (1 Reply)
Discussion started by: itik
1 Replies

7. Solaris

FTP login failed.

Hi guys, Can you please help me. I have SUN V100 server running solaris 8. I also have a Redhat Linux 6.2 machine and a windows XP machine on the network. I'm trying to copy files from the Linux and XP machines to the V100 server. When I try to ftp to the solaris machine, I'm challenged... (2 Replies)
Discussion started by: Stin
2 Replies

8. Solaris

Console Login Failed..

Dear Unix Team, This is sudhansu once again. I need some tips on below issue. Sometimes we got calls from customer that their console got hangged means they are not able to access the server through console ip. in that case "resetsc -y" will resolve the issue. 2. But couple of days... (2 Replies)
Discussion started by: sudhansu
2 Replies

9. Solaris

Reset failed login count

Hi, Can someone tell me the command to do this in solaris 5.10 please? I've trawled around the internet for ages but all I can find is the AIX command... Thanks (2 Replies)
Discussion started by: Grueben
2 Replies

10. Shell Programming and Scripting

Limit a user's login prompt upon logon

Hey Am new to scripting in aix 5.3 I need to write a script to limit a user's logon prompt to an interactive menu based upon logon and nothing else. Any ideas much appreciated. :wall: (4 Replies)
Discussion started by: mills
4 Replies
authenticate_user(3x)													     authenticate_user(3x)

Name
       authenticate_user - authenticate user

Syntax
       #include <pwd.h>
       #include <auth.h>   /* For error codes */

       int authenticate_user(user, password, line)
       struct passwd *user;
       char *password;
       char *line;

Arguments
       user
	 A pointer to the passwd entry.

       password
	 A pointer to the password.

       line
	 The name of the terminal line as it is listed in the file.

Description
       The  routine authenticates a user name or UID against a supplied password and returns a nonnegative integer on success.	The value returned
       is the number of failed login authentication attempts since the last successful login authentication  (or  zero	if  this  feature  is  not
       enabled).  This routine is found in the library and loaded with the -lauth option.

       At all security levels higher than BSD, the login fail count in the auth database is incremented if authentication fails, and cleared if it
       succeeds.  In addition, the account must be marked enabled for logins as defined by the Account Mask value for A_LOGIN.	See  for  informa-
       tion about the Account Mask values.

       If  a  non-NULL	value is supplied for the argument and the argument is not the empty string, the function also verifies that the specified
       user is allowed access through that line. In particular, accounts with a UID equal to zero will return success only if the  specified  line
       is marked secure in the file.

Restrictions
       The process must have read access to the auth database to authenticate users in a secure environment.

       The process must have read/write access to the auth database to update the authentication fail count.

       If auth information is being served through BIND, the process is required to obtain a Kerberos ticket for that service before invoking this
       function.

Example
       extern int errno;
       struct passwd *pwd;
       int status;

       pwd = getpwnam("root");
       status = authenticate_user(pwd, "rootpass", "/dev/console");
       if(status < 0)
	    if(errno == EPERM)
		 puts("Login failed");
	    else
		 perror("authenticate_user");
       else
	    if(status > 0)
		 printf("%d failed attempts
", status);

Return Values
       When successful, the routine returns the number of failed login authentication attempts since last successful login authentication.

       When an error occurs, errno is set and a negative error code is returned. The error code returned may be the same as errno or it may be	an
       extended error code defined in

Diagnostics
       On error return errno may be set to one of the following values:

       [EPERM]		 Either  the  password	is  incorrect,	the  password is expired, the specified line needs to be secure and is not, or the
			 account is disabled and a login authentication is required.

       [EINVAL] 	 No authentication information for user.

       [ENOSYS] 	 Security subsystem not configured correctly.

       [EACCES] 	 Process does not have read access to the necessary information.

       On error return the return value may be the same as errno or, if errno is [EPERM], it may be one of the following additional values defined
       in

       [A_EBADPASS]	 The supplied password was incorrect.

       [A_ESOFTEXP]	 The account's password expired recently.

       [A_EHARDEXP]	 The account's password expired quite some time ago.

       [A_ENOLOGIN]	 The account is not enabled.

       [A_EOPENLINE]	 The account requires a secure line and the specified line was not marked that way in the file.

Files
Environment
       If  the	system	is  operating in the BSD security level, the password expiration, login fail count, and account disabling features are not
       available (and therefore are not used in authentication computations).

See Also
       getauthent(3x), getpwent(3), auth(5), passwd(5yp), ttys(5)

															     authenticate_user(3x)
All times are GMT -4. The time now is 01:32 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy