Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Doubt over Uid and User name. Post 302203521 by ThobiasVakayil on Monday 9th of June 2008 04:23:59 AM
Old 06-09-2008
$ ypcat passwd | grep 1212
 

10 More Discussions You Might Find Interesting

1. AIX

User ID (UID) in AIX

what is the upper limit for UID is AIX 5.3 ? (1 Reply)
Discussion started by: learner
1 Replies

2. UNIX for Advanced & Expert Users

doubt regarding user password expiry in unix

I want to know the command through which we can know the expiry date of the password. I tried chage but it is not working on my system please provide necessary information I am not using root I need info on user level (2 Replies)
Discussion started by: irshad
2 Replies

3. Shell Programming and Scripting

NIS User UID Change

Hi All, I need to change the UID numbers of many NIS users, is there any command to modify the UID in NIS maps ? ( like usermod) so that their file permissions will be same even with their new UID. If not, how to check all the files owned by particular user in a computer and change the... (1 Reply)
Discussion started by: RAA
1 Replies

4. UNIX for Dummies Questions & Answers

Doubt User Log

How can I identify usernames on UNIX, when these users don't access the server, they access folders on this server. Is it possible? :confused: (4 Replies)
Discussion started by: DyDyLc
4 Replies

5. UNIX for Dummies Questions & Answers

How to get the username if I know only the user's UID?

Hi, I know the user's UID, but I need to know the user's username which has this UID. How can I do it?? Any ideas? Thanks! (7 Replies)
Discussion started by: rodrigoroma
7 Replies

6. Shell Programming and Scripting

awk script doubt in extracting and comparing uid

Hi, I need to get the value of 'uid' from a line in file f1. For example, in the line below, I need to get the value '150', from the 'anonuid=150' key, and I need to verify that this is a valid uid by checking it against /etc/passwd (i.e) I want to compare this uid, 150 (or more if there are any... (2 Replies)
Discussion started by: royalibrahim
2 Replies

7. Shell Programming and Scripting

Create user if UID not exist; else, exit the script

Hi, I want to write a script to check whether an user ID is used in my server and then create that user. If the user ID is not used, I will echo something like "OK, continue" and then continue to execute the script. Else, I will echo something like "Used, exit" and then exit the script. As... (4 Replies)
Discussion started by: dirkaulo
4 Replies

8. UNIX for Advanced & Expert Users

UID of user accounts on *nix systems

Hi, As the /etc/passwd file contents all system and other users accounts on a linux/unix system, can anyone tell me what is the User ID values range for human user accounts (not system user accounts) on a linux (Red Hat/SuSE etc) and Unix (Solaris) OS. I heard below number 100, all users are... (2 Replies)
Discussion started by: sanzee007
2 Replies

9. Shell Programming and Scripting

Ps - list where UID is numeric or name and for current user

Hi, 'ps -ef' returns output of the following format UID PID PPID C STIME TTY TIME CMD root 17573 1 0 Sep12 tty6 00:00:00 /sbin/mingetty tty6 hpsmh 18150 14864 0 Sep12 ? 00:00:00 /opt/hp/hpsmh/sbin/hpsmhd -DSSL -f /opt/hp/hpsmh/conf/smhpd.conf root ... (3 Replies)
Discussion started by: ysrini
3 Replies

10. AIX

UID & GID instead of user name and group name

Hi Everyone, We are encountering the following issue on AIX 5.3. When we do ls -ltr the list displays only user id and group id instead of user name and group name. This is happening for all users except root. Whe we do ls -ltr with root user it shows perfectly fine. When we searched... (25 Replies)
Discussion started by: madhav.kunapa
25 Replies
gsscred(1M)															       gsscred(1M)

NAME
gsscred - add, remove and list gsscred table entries SYNOPSIS
user oid] uid]] comment] user oid]] uid] mech] user oid]] uid] mech] DESCRIPTION
The utility is used to create and maintain a mapping between a security principal name and a local UNIX uid. The format of the user name is assumed to be You can use the option to specify the object identifier of the name type. The OID must be specified in dot-separated notation, for example: The table is used on server machines to lookup the uid of incoming clients connected using When adding users, if no user name is specified, an entry is created in the table for each user from the passwd table. If no comment is specified, the utility inserts a comment that specifies the user name as an ASCII string and the GSS-API security mechanism that applies to it. The security mechanism will be in string representation as defined in the file. The parameters are interpreted the same way by the utility to delete users as they are to create users. At least one of the following options must be specified: or If no security mechanism is specified, then all entries will be deleted for the user identified by either the uid or user name. If only the security mechanism is specified, then all user entries for that security mechanism will be deleted. Again, the parameters are interpreted the same way by the utility to search for users as they are to create users. If no options are spec- ified, then the entire table is returned. If the user name or uid is specified, then all entries for that user are returned. If a secu- rity mechanism is specified, then all user entries for that security mechanism are returned. Options Add a table entry. Insert comment about this table entry. Search table for entry. Specify the mechanism for which this name is to be translated. Specify the optional principal name. Specify the OID indicating the name type of the user. Remove the entry from the table. Specify the uid for the user if the user is not local. EXAMPLES
Example 1: Creating a gsscred Table The following shows how to create a table for the Kerberos Security Mechanism(V5). obtains user names and uid's from the passwd table to populate the table. Example 2: Adding an Entry The following shows how to add an entry for with a specified uid of 0 for the Kerberos Security Mechanism(V5). Example 3: Listing All User Mappings The following lists all user mappings for the Kerberos Security Mechanism(V5). Example 4: Lising All Mappings for a Specified User The following lists all mappings for all security mechanisms for the user EXIT STATUS
The following exit values are returned: 0 Successful completion. >0 An error occurred. FILES
The mapping table. Tables of GSS-API based security mechanism installed. SEE ALSO
gssd(1M), gsscred_clean(1M). gsscred(1M)
All times are GMT -4. The time now is 03:56 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy