05-12-2008
Who all has access to the server you can controll with the /etc/passwd and the /etc/shadow together.
Just take all the user from /etc/passwd and look in the shadow which one is expired or locked and you have your list.
cheers
gnom
7 More Discussions You Might Find Interesting
1. Linux
Hi,
I want to know the command for finding out the list of active/disabled users in Linux System.
Model:x86_64. Rev:2.6.9
Thanks in advance for your help
Mike (1 Reply)
Discussion started by: Mike1234
1 Replies
2. AIX
Hi all,
I am new to HACMP. So sorry for the newie question. But I did search the forum and it seems that no one asks this before.
So if a 2-node cluster runs in active-active mode (and the same application), what is the benefit of using HACMP ?
If it runs in active-stanby, it is easy to... (9 Replies)
Discussion started by: qiulang
9 Replies
3. UNIX for Dummies Questions & Answers
Hello,
I've configured an user authentication against Active Directory (Windows Server 2008 R2) on AIX V6 with LDAP. It works fine.
And here's my problem:
How can I control ldap user permissions on the local AIX machine?
E.g. an AD user should be able to write all files of local sys... (1 Reply)
Discussion started by: xia777
1 Replies
4. Solaris
Hi,
I need to configure 4 ip address (same subnet and mask) in one ipmp group (two interfaces) in an active active formation (link based). Can some one provide the steps or a tutorial link.
Thanks (2 Replies)
Discussion started by: Mack1982
2 Replies
5. AIX
First, let me start off saying this is not spam. This is me trying to help out other AIX Admins with MS AD servers. If it is not applicable to you, someone else will find it useful.
As long as the "KDC" service is running on your AD server, these steps should work. There should be no... (3 Replies)
Discussion started by: kah00na
3 Replies
6. Shell Programming and Scripting
#!/bin/bash
for digit in $(seq 1 10)
do
if ping -c1 -w2 192.168.1.$digit &> /dev/null
then
echo "192.168.1.$digit is UP"
else
echo "192.168.1.$digit is DOWN"
fi
done (3 Replies)
Discussion started by: fusetrips
3 Replies
7. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
Send a fortune to all active/logged in users
2. Relevant commands, code, scripts, algorithms:
So I understand... (8 Replies)
Discussion started by: kjcraig77
8 Replies
pwconv(8) System Manager's Manual pwconv(8)
NAME
pwconv - convert to shadow account
SYNOPSIS
pwconv [-P path]
DESCRIPTION
pwconv installs and updates /etc/shadow with information from /etc/passwd. It relies on the special password 'x' in the password field of
the account. This value indicates that the password for the user is already in /etc/shadow and should not be modified.
If /etc/shadow does not exist, pwconv creates this file, moves the user password to it and creates default aging informations with the help
of the values of PASS_MIN_DAYS, PASS_MAX_DAYS and PASS_WARN_AGE from /etc/login.defs. The password field in /etc/passwd is replaced with
the special character 'x'.
If the /etc/shadow does exist, entries that are in the /etc/passwd file and not in the /etc/shadow file are added to the /etc/shadow file.
Accounts, which only exist in /etc/passwd, are added to /etc/shadow. Entries that are in /etc/shadow and not in /etc/passwd are removed
from /etc/shadow. All passwords from /etc/passwd are moved to /etc/shadow and replaced with the special character 'x'.
pwconv can be used for initial conversion and for updates later.
OPTIONS
-P, --path path
The passwd and shadow files are located below the specified directory path. pwconv will use this files, not /etc/passwd and
/etc/shadow.
FILES
passwd - user account information
shadow - shadow user account information
SEE ALSO
passwd(1), login.defs(5), passwd(5), shadow(5), pwck(8), pwunconv(8)
AUTHOR
Thorsten Kukuk <kukuk@suse.de>
pwdutils January 2004 pwconv(8)