05-26-2008
Quote:
Originally Posted by
frustrated1
...Is there anyway to avoid this happening?
No, of course not- that's the whole idea of /etc/default/passwd, it sets the
default rules for
everyone's passwords. You cannot have it both ways. I gave you the method with the least work- you will still have to override the passwd settings of each user that is to not have an expiring password.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
After Configuring a brand new netraT1, It appears, the only way you can log in as root is throught the Serial Port (console). I believe there is a file in /etc which can be edited to allow root to access login via other methods
eg: telnet, ssh, etc.
My Question:
Which file contains... (2 Replies)
Discussion started by: SmartJuniorUnix
2 Replies
2. UNIX for Dummies Questions & Answers
I have this unix version 3.0
"UNIX_SV server 4.0 3.0 3425 Pentium II(TM)-ISA/PCI"
can i delete or disable the system generated account as "daemon";"uucp";"sys";"adm";"listen";"bin"
and if yes how can i do it?
Regards (1 Reply)
Discussion started by: sak900354
1 Replies
3. HP-UX
I want to temporarily disable a user account on HP-UX at the start of a script and renable the account at the end of the script. What would be the best method on HP-UX to temporarily disable a user account? I know of the passwd -l option that will lock the account, but I do not see a flag for... (4 Replies)
Discussion started by: scotbuff
4 Replies
4. AIX
Hi, yesterday, I changed root's shell in /etc/passwd, cause a mistake then I can not log in root account (can't find correct shell). I attempted to log in single-mode, however, it prompted for single-mode's password then I type root's password but still can not log in.
I'm using AIX 5L version 5.2... (2 Replies)
Discussion started by: neikel
2 Replies
5. UNIX for Dummies Questions & Answers
I am able to disable direct root login through telnet. But when I add the rlogin = false into the /etc/security/user file. I am unable to log in as root from ssh. I uncommented the "PermitRootLogin yes" in the sshd_config file. Still can't log in. Can anyone help? (0 Replies)
Discussion started by: james0125
0 Replies
6. SuSE
Hi,
We are going to create the new user, using that user we are automate the work, but every 90 days password get expired how can i create or avoid the expiry the password. (1 Reply)
Discussion started by: kingganesh04
1 Replies
7. Solaris
Hi
How do i disable password expiration on ldap?
It runs on Solaris 10 machine. Thanks in advance. (3 Replies)
Discussion started by: hrist
3 Replies
8. Solaris
HI i am trying to give su access to some users say X Y and Z to a account AB . I am able to give them su access to root with the help of sudoers file but i want to give them password less access to AB account which i am not able to do .
I want to this
when user X fires "su - AB" he is not... (9 Replies)
Discussion started by: rishiraaz
9 Replies
9. Solaris
can an user see the expiry date of its own account,also can the user know whether it is having peer access or not.
Thanks,
Megh (2 Replies)
Discussion started by: megh
2 Replies
10. Red Hat
Hi Guys
In red hat linux server is there a way to alert via email when the root password is about to expire ?
As per security policy in our environment root password will expire in 90 days.
Example : It would be better if we receive a email on 7th november stating that the root password... (1 Reply)
Discussion started by: newtoaixos
1 Replies
LEARN ABOUT NETBSD
passwd
PASSWD(1) BSD General Commands Manual PASSWD(1)
NAME
passwd -- modify a user's password
SYNOPSIS
passwd [user]
passwd [-d files | -l] [user]
passwd [-d nis | -y] [user]
passwd [-d krb5 | -k] [principal]
DESCRIPTION
passwd changes the user's password. First, the user is prompted for their current password. If the current password is correctly typed, a
new password is requested. The new password must be entered twice to avoid typing errors.
The new password should be at least six characters long and not purely alphabetic. Its total length must be less than _PASSWORD_LEN (cur-
rently 128 characters). Numbers, upper case letters and meta characters are encouraged.
All options may not be available on all systems.
-d database
This option specifies the password database that should be updated. The following databases are supported:
files This specifies that the password change should be applied to the local password file. When changing only the local password,
passwd uses pwd_mkdb(8) to update the password databases.
nis This specifies that the password change should be applied to the NIS password database. The rpc.yppasswdd(8) daemon should be
running on the master NIS server.
krb5 This specifies that the user's Kerberos 5 password should be changed. The host must be configured to use Kerberos. See
krb5.conf(5).
-l This is the equivalent of -d files.
-y This is the equivalent of -d nis.
-k This is the equivalent of -d krb5.
If a password database is not specified, passwd will change the password database as determined by the Pluggable Authentication Module (PAM)
library.
The type of cipher used to encrypt the password depends on the configuration in passwd.conf(5). It can be different for local and NIS pass-
words.
FILES
/etc/master.passwd The user database
/etc/passwd A Version 7 format password file
/etc/passwd.XXXXXX Temporary copy of the password file
SEE ALSO
chpass(1), login(1), pwhash(1), passwd(5), passwd.conf(5), pam(8), pwd_mkdb(8), vipw(8)
Robert Morris and Ken Thompson, UNIX password security.
HISTORY
A passwd command appeared in Version 6 AT&T UNIX.
BSD
February 25, 2005 BSD