04-04-2008
Ha, 15+ system - try 400+. And I'm sure others have bigger numbers to contend with.
You explained yourself fine - cut and paste what you put here into an email to your UNIX SA and he/she will understand what you want to do. Of course, that doesn't mean you can get it - it's usually a Security issue - accounts get locked automatically and normally the UNIX SA isn't the one who makes that policy. But it doesn't hurt to ask.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
How can I change the password from an ftp user account on a ssh server?
Please give me simple instructions for a users who hasn't a lot of experience.
:D
Just the words in form of a list thanks a lot. (1 Reply)
Discussion started by: m.seidenberg
1 Replies
2. Solaris
passwd only changes the password but i need to change the user name
tnx (5 Replies)
Discussion started by: umen
5 Replies
3. UNIX for Dummies Questions & Answers
Hi,
I have forgotten my personal account password but I still have the root access to the box.
Please tell me how can I change my other account password by logging as root.
Thanks.
Rakesh :D (4 Replies)
Discussion started by: rakeshou
4 Replies
4. Shell Programming and Scripting
hi
how can I Lock an account, by prepending ”*LK*” to the password field in /etc/shadow.
I dont want to use passwd -l .
Any idea? (3 Replies)
Discussion started by: tjay83
3 Replies
5. Solaris
Dears,
I want to lock the user's account after consecutive unsuccessful login attempts, how can I do this ? (1 Reply)
Discussion started by: mlsun
1 Replies
6. SuSE
Hi ,
Can anyone give ur answer for
How to lock the account after consecutive unsuccessful login in SUSE Enterprise 10.2 Linux (1 Reply)
Discussion started by: karthik04
1 Replies
7. Cybersecurity
Hi all,
I am having some issues with openssh vers OpenSSH_4.6p1 on SCO unixware 7.1.4
when a user accesses the system via ssh and the password is incorrect and more attempts have been made that the lock out limit I find that although there are messages in the syslog the account does not lock... (0 Replies)
Discussion started by: chlawren
0 Replies
8. Shell Programming and Scripting
I was hoping that somebody could help me out with this.
I just deployed a new FTP server and I have a script that creates the new account. How would I go about having it expire 3 days after after creation?
useradd -s /bin/false -m -p $pass $username (7 Replies)
Discussion started by: binary-ninja
7 Replies
9. Forum Support Area for Unregistered Users & Account Problems
Hi there,
I may have had a typo in my email previously provided. I have doublechecked my email for Scott's reply but havent seen it, so I am creating a new post.
My new email can be either one of these: <removed> or <removed>
I beleive my old email was <removed by admin>
thanks for your... (1 Reply)
Discussion started by: AKelam_MagnusA
1 Replies
LEARN ABOUT REDHAT
shadow
SHADOW(5) File Formats Manual SHADOW(5)
NAME
shadow - encrypted password file
DESCRIPTION
shadow contains the encrypted password information for user's accounts and optional the password aging information. Included is
Login name
Encrypted password
Days since Jan 1, 1970 that password was last changed
Days before password may be changed
Days after which password must be changed
Days before password is to expire that user is warned
Days after password expires that account is disabled
Days since Jan 1, 1970 that account is disabled
A reserved field
The password field must be filled. The encryped password consists of 13 to 24 characters from the 64 character alphabet a thru z, A thru
Z, 0 thru 9, . and /. Refer to crypt(3) for details on how this string is interpreted.
The date of the last password change is given as the number of days since Jan 1, 1970. The password may not be changed again until the
proper number of days have passed, and must be changed after the maximum number of days. If the minimum number of days required is greater
than the maximum number of day allowed, this password may not be changed by the user.
An account is considered to be inactive and is disabled if the password is not changed within the specified number of days after the pass-
word expires. An account will also be disabled on the specified day regardless of other password expiration information.
This information supercedes any password or password age information present in /etc/passwd.
This file must not be readable by regular users if password security is to be maintained.
FILES
/etc/passwd - user account information
/etc/shadow - encrypted user passwords
SEE ALSO
chage(1), login(1), passwd(1), su(1), passwd(5), pwconv(8), pwunconv(8), sulogin(8)
AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
SHADOW(5)