Sponsored Content
Top Forums UNIX for Advanced & Expert Users URGENT: Password modification for oracle user Post 302096956 by Andrek on Monday 20th of November 2006 09:53:17 PM
Old 11-20-2006
on HP-UX trusted system use the /usr/lbin/getprpw {userid} and it will show you details about the user etc.

Whats your unix and is it trusted?
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Modification in configuration file to disable a particular user

Please anyone can tell me what is the procedure to perform the required modifications in configuration files to disable a particular user??? (3 Replies)
Discussion started by: debjyotidas007
3 Replies

2. UNIX for Advanced & Expert Users

password verification verify password of a user for only first 8 characters

Helo , I m using linux pam library for user and its password authentication. I m creating new user and giving its password.I m giving password of 10 characters.now when I login in as that newly created user its ask me $ su - ram Password: You are required to change your password immediately... (12 Replies)
Discussion started by: amitpansuria
12 Replies

3. UNIX for Dummies Questions & Answers

Doubt in Oracle connecting unix - Very urgent

I am using a oracle query from unix.. flag=`sqlplus -s <<EOF SELECT 'Y' FROM table_name WHERE cond1 = '${table_name}' AND DECODE('${var_a}','''NA''',own,'${var_b0}')= own exception when no_data_found then dbms_output.put_line(NVL(l_owner_flag,'X')); end; EOF` Its not validating the... (7 Replies)
Discussion started by: sivakumar.rj
7 Replies

4. Shell Programming and Scripting

Restrict modification of a file while it is already in use by another user?

How to restrict modification of a file while it is already in use by another user? If a file is in use by one user account, how to restrict it so that no one else can change it until its closed by the first user? (3 Replies)
Discussion started by: bdiwakarteja
3 Replies

5. Solaris

User id modification

Dear All, Some of the users having the same user id and group id in my /etc/passwd file. Now I want to change the users to have a unique user id and group id. How can we do that. If I change this will it affect the running applications. Rgds Rj (7 Replies)
Discussion started by: jegaraman
7 Replies

6. Shell Programming and Scripting

Switching user to oracle to connect Oracle 11g DB with 'sysdba'

I need to connect my Oracle 11g DB from shell script with 'sysdba' permissions. To do this I have to switch user from 'root' to 'oracle'. I've tried the following with no success. su - oracle -c "<< EOF1 sqlplus -s "/ as sysdba" << EOF2 whenever sqlerror exit sql.sqlcode;... (2 Replies)
Discussion started by: NetBear
2 Replies

7. Web Development

Tapatalk Modification for vB3 - Adding User for System Information

Referring back to this thread: Tapatalk Modification for vB3 - Issue with Avatar Icons I mentioned that we had some "system bot" code: In this post, I describe that code and how easy it is to create a "system bot" user for Tapatalk (TT): Basically, its quite easy. We add a hook to... (0 Replies)
Discussion started by: Neo
0 Replies

8. Shell Programming and Scripting

Oracle DB user password change

Hi Experts, I am trying to write a shell script to change DB user password. Requirement: login to multiple DBs as multiple users and change their respective passwords. ex :users:T1,T2,T3 DB:X,Y,Z scenario: login as T1 to X,Y,Z change password login as T2 to X,Y,Z change password ... (2 Replies)
Discussion started by: navsan420
2 Replies

9. Shell Programming and Scripting

How to do user-preset login to Bash shell then automate path modification?

How do a user login with full user-environment preset to Bash shell then automatically do path modification with few script codes, either on command-line or put it in a script file. what i tried: bash --login -c PATH="/ANewPath:${PATH}" bash --login -c 'PATH="/ANewPath:${PATH}"; export PATH'... (2 Replies)
Discussion started by: abdulbadii
2 Replies
hosts.equiv(5)							File Formats Manual						    hosts.equiv(5)

Name
       hosts.equiv - list of trusted hosts

Description
       The file resides in the directory and contains a list of trusted hosts.	When an or request from a host listed in the file is made, and the
       initiator of the request has an entry in further validity checking is not required.  Thus, does not prompt for a  password,  and  completes
       successfully.  When a remote user is in the local file, that user is defined as equivalenced to a local user with the same user ID.

       The format of is a list of names, as in:
       host1
       -host2
       +@group1
       -@group2

       A  line	consisting  of a host name means that anyone logging in from that host is trusted.  A line consisting of a host name preceded by -
       means that anyone logging in from that host is not trusted.  A line consisting of a single + means that all hosts are trusted.	Placing  a
       line consisting of a single + in your file poses substantial security risks and is not recommended.

       The  +@ and -@ syntax are specific to Yellow Pages (YP).  A line consisting of +@group means that all hosts in that network group (which is
       served by YP) are trusted.  A line consisting of -@group means that hosts in that network group (which is served by YP)	are  not  trusted.
       Programs  scan  the  file sequentially and stop when they encounter the appropriate entry (either positive for host name and +@ entries, or
       negative for -@ entries).

       The file has the same format as the file.  When a user executes or the file from that user's home directory is concatenated onto  the  file
       for  permission	checking.  The host names listed in the and files may optionally contain the local BIND domain name.  For more information
       on BIND, see the Guide to the BIND/Hesiod Service.  If a user is excluded by a minus entry from but included in	that  user  is	considered
       trusted.  In the special case when the user is root, only the file is checked.

       It  is  possible to have two entries on a single line.  Separate the entires with a space.  If the remote host is equivalenced by the first
       entry, the user named by the second entry is allowed to specify any name to the option (provided that name is in the file).  For example:
       suez john
       This entry allows John to log in from suez.  The normal use would be to put this entry in the file in the home directory for  bill.   Then,
       John can log in as bill when coming from suez without having to supply a password.  The second entry can be a netgroup.	For example:
       +@group1 +@group2
       This entry allows any user in group2 coming from a host in group1 to log in as anyone.

Files
       /var/yp/domain/netgroup
       /var/yp/domain/netgroup.byuser
       /var/yp/domain/netgroup.byhost

See Also
       rlogin(1c), rsh(1c), netgroup(5yp)
       Guide to the BIND/Hesiod Service
       Guide to the Yellow Pages Service

																    hosts.equiv(5)
All times are GMT -4. The time now is 03:17 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy