06-09-2008
$ ypcat passwd | grep 1212
10 More Discussions You Might Find Interesting
1. AIX
what is the upper limit for UID is AIX 5.3 ? (1 Reply)
Discussion started by: learner
1 Replies
2. UNIX for Advanced & Expert Users
I want to know the command through which we can know the expiry date
of the password.
I tried chage but it is not working on my system please provide
necessary information
I am not using root
I need info on user level (2 Replies)
Discussion started by: irshad
2 Replies
3. Shell Programming and Scripting
Hi All,
I need to change the UID numbers of many NIS users, is there any command to modify the UID in NIS maps ? ( like usermod) so that their file permissions will be same even with their new UID.
If not, how to check all the files owned by particular user in a computer and change the... (1 Reply)
Discussion started by: RAA
1 Replies
4. UNIX for Dummies Questions & Answers
How can I identify usernames on UNIX, when these users don't access the server, they access folders on this server. Is it possible? :confused: (4 Replies)
Discussion started by: DyDyLc
4 Replies
5. UNIX for Dummies Questions & Answers
Hi,
I know the user's UID, but I need to know the user's username which has this UID. How can I do it?? Any ideas?
Thanks! (7 Replies)
Discussion started by: rodrigoroma
7 Replies
6. Shell Programming and Scripting
Hi,
I need to get the value of 'uid' from a line in file f1. For example, in the line below, I need to get the value '150', from the 'anonuid=150' key, and I need to verify that this is a valid uid by checking it against /etc/passwd (i.e) I want to compare this uid, 150 (or more if there are any... (2 Replies)
Discussion started by: royalibrahim
2 Replies
7. Shell Programming and Scripting
Hi, I want to write a script to check whether an user ID is used in my server and then create that user.
If the user ID is not used, I will echo something like "OK, continue" and then continue to execute the script. Else, I will echo something like "Used, exit" and then exit the script.
As... (4 Replies)
Discussion started by: dirkaulo
4 Replies
8. UNIX for Advanced & Expert Users
Hi,
As the /etc/passwd file contents all system and other users accounts on a linux/unix system, can anyone tell me what is the User ID values range for human user accounts (not system user accounts) on a linux (Red Hat/SuSE etc) and Unix (Solaris) OS.
I heard below number 100, all users are... (2 Replies)
Discussion started by: sanzee007
2 Replies
9. Shell Programming and Scripting
Hi,
'ps -ef' returns output of the following format
UID PID PPID C STIME TTY TIME CMD
root 17573 1 0 Sep12 tty6 00:00:00 /sbin/mingetty tty6
hpsmh 18150 14864 0 Sep12 ? 00:00:00 /opt/hp/hpsmh/sbin/hpsmhd -DSSL -f /opt/hp/hpsmh/conf/smhpd.conf
root ... (3 Replies)
Discussion started by: ysrini
3 Replies
10. AIX
Hi Everyone,
We are encountering the following issue on AIX 5.3. When we do ls -ltr the list displays only user id and group id instead of user name and group name.
This is happening for all users except root. Whe we do ls -ltr with root user it shows perfectly fine.
When we searched... (25 Replies)
Discussion started by: madhav.kunapa
25 Replies
gsscred(1M) gsscred(1M)
NAME
gsscred - add, remove and list gsscred table entries
SYNOPSIS
user oid] uid]] comment]
user oid]] uid] mech]
user oid]] uid] mech]
DESCRIPTION
The utility is used to create and maintain a mapping between a security principal name and a local UNIX uid. The format of the user name
is assumed to be You can use the option to specify the object identifier of the name type. The OID must be specified in dot-separated
notation, for example:
The table is used on server machines to lookup the uid of incoming clients connected using
When adding users, if no user name is specified, an entry is created in the table for each user from the passwd table. If no comment is
specified, the utility inserts a comment that specifies the user name as an ASCII string and the GSS-API security mechanism that applies to
it. The security mechanism will be in string representation as defined in the file.
The parameters are interpreted the same way by the utility to delete users as they are to create users. At least one of the following
options must be specified: or If no security mechanism is specified, then all entries will be deleted for the user identified by either the
uid or user name. If only the security mechanism is specified, then all user entries for that security mechanism will be deleted.
Again, the parameters are interpreted the same way by the utility to search for users as they are to create users. If no options are spec-
ified, then the entire table is returned. If the user name or uid is specified, then all entries for that user are returned. If a secu-
rity mechanism is specified, then all user entries for that security mechanism are returned.
Options
Add a table entry.
Insert comment about this table entry.
Search table for entry.
Specify the mechanism for which this name is to be translated.
Specify the optional principal name.
Specify the OID indicating the name type of the user.
Remove the entry from the table.
Specify the uid for the user if the user is not local.
EXAMPLES
Example 1: Creating a gsscred Table
The following shows how to create a table for the Kerberos Security Mechanism(V5). obtains user names and uid's from the passwd table to
populate the table.
Example 2: Adding an Entry
The following shows how to add an entry for with a specified uid of 0 for the Kerberos Security Mechanism(V5).
Example 3: Listing All User Mappings
The following lists all user mappings for the Kerberos Security Mechanism(V5).
Example 4: Lising All Mappings for a Specified User
The following lists all mappings for all security mechanisms for the user
EXIT STATUS
The following exit values are returned:
0 Successful completion.
>0 An error occurred.
FILES
The mapping table.
Tables of GSS-API based security mechanism installed.
SEE ALSO
gssd(1M), gsscred_clean(1M).
gsscred(1M)