Hi,
/etc/passwd file has write permission only for the root user.
Now when a normal user changes the its own password using passwd command, how this information has been written to the /etc/passwd file when the user is not having write permission to this file.
~santosh (2 Replies)
Hey guys just wondering how i could lock a specific acount by prepending LK
to the password field in the /etc/shadow file.
it cannot be done through a command since the script gets called by a menu driven interface so i cant use "passwd". Is there a way where i can search for a specific account... (11 Replies)
Besides doing some shell-script which loops through /etc/passwd, I was wondering if there was some command that would tell me, like an enhanced version of getent.
The Operating system is Solaris 10 (recent-ish revision) using Sun DS for LDAP. (5 Replies)
I have a file on UNIX system from where I want to grep the list of all users associated to the particular repository.If the user's list is in single line then I fetch all list but if it is in two separate lines it doesn't.I use the below command
a=KESTREL-DEV;b=users;cat access_file|grep... (1 Reply)
Hi,
I've a user alias file in the below format.. I need to change all the ID's that come after the = sign (with some multiple ID's which are separated by comma's) to their respective users that are contained in the passwords file.. Whats the best way to go about this.. Some sort of sed command in... (2 Replies)
I have logged into a box with some userid,but in this box der is no entry for this userid in /etc/passwd file.this box is used by multiple users but none of them have their enteries in passwd file but for each user there is a directory in /home
like for user1 /home/user1
for user2... (5 Replies)
I have some users in one unix system and i want to search some files with specific to user and then i want to find some content inside that file so can u help me how we can implement it?
File location is as below.
/pools/home_unix/cmadireddy/work/models/model/
cmadireddy is user name.
now... (6 Replies)
Hi all ,
The FTP user defind in my passwd file has ! in the hash password field and i want to know way is that its usually either
MD5(Unix) hash or * can anyone explain to me i'm new for unix and want to learn
this how my passwd file looks :
... (2 Replies)
Hello,
I have a a directory dir1 with permissions 700 (yes wantedly) and is owned by user1:group1
rwx------ user1 group1 dir1I need to give permissions to user2 (belongs to group2) on dir1 and its files, so I granted the permissions using setfacl ; instead of adding the user to groups and... (3 Replies)
Discussion started by: karumudi7
3 Replies
LEARN ABOUT HPUX
chsh
chsh(1) General Commands Manual chsh(1)NAME
chsh - change default login shell
SYNOPSIS
login-name [shell]
login-name [shell]
login-name [shell]
login-name [shell]
DESCRIPTION
The command changes the login-shell for a user's login name in the repository (see passwd(1)).
The DCE repository is only available if Integrated Login has been configured; see auth.adm(1M). If Integrated Login has been configured,
other considerations apply. A user with appropriate DCE privileges is capable of modifying a user's shell; this is not dependent upon
superuser privileges.
If the repository is not specified (as in [login-name]), the login shell is changed in the file only.
Run after running to make sure the information was processed correctly.
Notes
The command is a hard link to the command. When is executed, actually the command gets executed with appropriate arguments to change the
user login shell in the repository specified in command line. If no repository is specified, the login shell is changed in the file.
Arguments
login-name A login name of a user.
shell The absolute path name of a shell. If the file exists, the new login shell must be listed in that file. Otherwise, you
can specify one of the standard shells listed in the getusershell(3C) manual entry. If shell is omitted, it defaults to
the POSIX shell,
Options
The following option is recognized:
Specify the repository to which the operation is to be applied.
Supported repositories include and
Security Restrictions
You must have appropriate privileges to use the optional login-name argument to change another user's login shell.
NETWORKING FEATURES
NFS
File can be implemented as a Network Information Service (NIS) database.
EXAMPLES
To change the login shell for user to the default:
To change the login shell for user to the C shell:
To change the login shell for user to the Korn shell in the DCE registry:
WARNINGS
If two or more users try to write the file at the same time, a passwd locking mechanism was devised. If this locking fails after subse-
quent retrying, terminates.
AUTHOR
was developed by HP and the University of California, Berkeley.
FILES SEE ALSO chfn(1), csh(1), ksh(1), passwd(1), sh(1), sh-posix(1), getusershell(3C), pam(3), passwd(4), shells(4).
chsh(1)