12-21-2006
On HP-UX
You can convert the system to trusted and then set the time out values for different events like;
passwd aging
passwd reminder to change
etc
best way for you may be to use SAM to convert to this security level on a test box and see how you go.
Also use SAm to set your passwd aging defaults.
(Note: theres a little trap I fell into. after you change the system wide defaults any new user added to the system will have the new defaults, but all the old users will still have the previous settings. you will need to go and manually change the old users. This can be done from the command line or via SAM)
Not sure on other O/S listed...
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi there,
I was wandering, if it is possible to nice set of process on user level.
Say, I have user1,user2
if user1 spawns 12 process and user2 spwans 15 process, Is there a way can I change the priority of any process started by user1 to 5 and viz-a-viz user2 to 20
Thanks in advance (3 Replies)
Discussion started by: braindrain
3 Replies
2. Solaris
All,
I log into Solaris 9 server through a command line at the console and want enable a inactivity timer to log out of the server after 5 minutes. How can it be done? (1 Reply)
Discussion started by: bubba112557
1 Replies
3. Shell Programming and Scripting
hi all
how to replace a file in user level..
i tried this
cp -r /usr/lib/munna.txt /usr/lib/
saying the error permission denied..
is there any way..
please help me to replace a file in user level (not from root)
thank you in advance (4 Replies)
Discussion started by: munna_dude
4 Replies
4. UNIX for Dummies Questions & Answers
I just need the shell script that checks your user id and your permission level. I sort of have one to check the user id but I don't like it. Can anyone help with this? (3 Replies)
Discussion started by: yammer
3 Replies
5. Red Hat
Hi All,
On red hat ent 4. How do I make the inactivity a default to 30 days? What config file I need to modify so that I will not modify /etc/shadow?
Thanks for any comment you may add. (1 Reply)
Discussion started by: itik
1 Replies
6. Solaris
what are the major Difference Between run level & init level (2 Replies)
Discussion started by: rajaramrnb
2 Replies
7. UNIX for Dummies Questions & Answers
How would i force The server console to be locked automatically after 5 minutes ?
I want it to happen for X as well as terminal session of the machine.
My Linux distribution details.
LSB Version: :core-3.1-ia32:core-3.1-noarch:graphics-3.1-ia32:graphics-3.1-noarch
Distributor ID:... (11 Replies)
Discussion started by: pinga123
11 Replies
8. AIX
I am on AIX 6.1, and need to find out who has not accessed the system within 1, 2, or 3 months depending upon the filter I specify.
The output I need to have is the account name and the last time accessed:
i.e.
kart Mar 27 05:13 - 05:13 (00:00)
Please advise. (5 Replies)
Discussion started by: Daniel Gate
5 Replies
9. Solaris
Simple question: for determining whether the user has exceeded the maximum amount of "inactivity" (as set in the shadow file) what date is the current login being compared to? Is it wtmp data or something? (3 Replies)
Discussion started by: thmnetwork
3 Replies
10. Red Hat
We have a RHEL 5.8 server at the production level and we have a Java application on this server. I know of the SSL certificate generation at the OS (RHEL) level but it is implemented on the Java application by our development team using the Java keytool. My doubt is that is the SSL generation can... (3 Replies)
Discussion started by: RHCE
3 Replies
LEARN ABOUT FREEBSD
pwconv
pwconv(1M) System Administration Commands pwconv(1M)
NAME
pwconv - installs and updates /etc/shadow with information from /etc/passwd
SYNOPSIS
pwconv
DESCRIPTION
The pwconv command creates and updates /etc/shadow with information from /etc/passwd.
pwconv relies on a special value of 'x' in the password field of /etc/passwd. This value of 'x' indicates that the password for the user is
already in /etc/shadow and should not be modified.
If the /etc/shadow file does not exist, this command will create /etc/shadow with information from /etc/passwd. The command populates
/etc/shadow with the user's login name, password, and password aging information. If password aging information does not exist in
/etc/passwd for a given user, none will be added to /etc/shadow. However, the last changed information will always be updated.
If the /etc/shadow file does exist, the following tasks will be performed:
Entries that are in the /etc/passwd file and not in the /etc/shadow file will be added to the /etc/shadow file.
Entries that are in the /etc/shadow file and not in the /etc/passwd file will be removed from /etc/shadow.
Password attributes (for example, password and aging information) that exist in an /etc/passwd entry will be moved to the corre-
sponding entry in /etc/shadow.
The pwconv command can only be used by the super-user.
FILES
/etc/opasswd
/etc/oshadow
/etc/passwd
/etc/shadow
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
SEE ALSO
passwd(1), passmgmt(1M), usermod(1M), passwd(4), attributes(5)
DIAGNOSTICS
pwconv exits with one of the following values:
0 SUCCESS.
1 Permission denied.
2 Invalid command syntax.
3 Unexpected failure. Conversion not done.
4 Unexpected failure. Password file(s) missing.
5 Password file(s) busy. Try again later.
6 Bad entry in /etc/shadow file.
SunOS 5.10 9 Mar 1993 pwconv(1M)