10-17-2008
Check this file:
/etc/pam.d/common-password
Look for:
password required pam_unix.so nullok obscure min=4 max=8 md5
Linux systems have 256 character limit. Also, you can change and/or extend the limit to 10 characters in Unices (I think!).
HTH,
Sorry for all these edits....
Nitin
Last edited by nitin; 10-17-2008 at 01:45 PM..
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi All,
I was wondering, how can I echo password using a character such as '*' in unix?
In my machine, password is not echoed, so it is only blank space when I enter any password.
So, when I enter a command such as "lock", how can I set the echo character to "*" or something else for... (4 Replies)
Discussion started by: mukluk
4 Replies
2. Shell Programming and Scripting
edited and removed (0 Replies)
Discussion started by: mdpalow
0 Replies
3. Solaris
G'day guys,
Just a simple question:
Is it possible to set user's passwords without numeric characters?
I prefer to have passwords as simple words, but when going through SMC, i get an error that the first six characters must contain at least 2 alphabetic and 1 numeric.
Server is a Sun... (3 Replies)
Discussion started by: drchris
3 Replies
4. Shell Programming and Scripting
Good morning!
I am using a shell script to back up user email files to a remote location. The problem is, one (and apparently more than one) users have the symbol "@" in their password. As you can see from the line:
/sbin/mount_smbfs... (5 Replies)
Discussion started by: PittWolfBW
5 Replies
5. UNIX for Dummies Questions & Answers
Hi
I have a password stored in a file (which is a user input)
The password is having the special character $
say the password is pw$ord and is stored in the file pw_note
I am using the following statement to store the passowrd in a
variable
$schema_pwd = `cat $dir/pwd_note` ;
Now if i print... (4 Replies)
Discussion started by: ssuresh1999
4 Replies
6. Shell Programming and Scripting
On SPARC Solaris 10. I set the app account so it's expired. I also want it
so not required to change password at first login, I can do this by
removing the numbers after the password in /etc/shadow.
example using user1
The /etc/shadow file looks like this:
user1:kOmcVXAImRTAY:0::::90::
... (8 Replies)
Discussion started by: TKD
8 Replies
7. OS X (Apple)
I'm writing a script that has the need to verify the current user's username and password. I'm not entirely sure how to do this. I've read some things on "dscl" but am not sure that's the correct route for me to go.
The one condition i have is that i really need to have the verification happen... (4 Replies)
Discussion started by: TheDrizzle
4 Replies
8. Shell Programming and Scripting
I am using the below to random generate a password but I need to have 2 numeric characters and 6 alphabetic chars
head /dev/urandom | tr -dc A-Za-z0-9 | head -c 8 ; echo ''
6USUvqRB
------ Post updated at 04:43 PM ------
Any Help folks - Can the output be passed onto a sed command to... (9 Replies)
Discussion started by: infernalhell
9 Replies
9. Forum Support Area for Unregistered Users & Account Problems
I was unable to login and so used the "Forgotten Password' process. I was sent a NEWLY-PROVIDED password and a link through which my password could be changed. The NEWLY-PROVIDED password allowed me to login.
Following the provided link I attempted to update my password to one of my own... (1 Reply)
Discussion started by: Rich Marton
1 Replies
LEARN ABOUT HPUX
pam_chauthtok
pam_chauthtok(3) Library Functions Manual pam_chauthtok(3)
NAME
pam_chauthtok - perform password related functions within the PAM framework
SYNOPSIS
[ flag ... ] file ... [ library ... ]
DESCRIPTION
is called to change the authentication token associated with a particular user referenced by the authentication handle, pamh.
The following flag may be passed in to
The password service should not generate any messages.
The password service should only update those passwords that have aged.
If this flag is not passed, all password services should update their passwords.
Upon successful completion of the call, the authentication token of the user will be changed in accordance with the password service con-
figured in the system through pam.conf(4).
Notes
The flag is typically used by a application which has determined that the user's password has aged or expired. Before allowing the user to
login, the application may invoke with this flag to allow the user to update the password. Typically applications such as passwd(1) should
not use this flag.
performs a preliminary check before attempting to update passwords. This check is performed for each password module in the stack as listed
in pam.conf(4). The check may include pinging remote name services to determine if they are available. If returns then the check has
failed, and passwords are not updated.
APPLICATION USAGE
Refer to pam(3) for information on thread-safety of PAM interfaces.
RETURN VALUE
Upon successful completion, is returned. In addition to the error return values described in pam(3), the following values may be returned:
No permission.
Authentication token manipulation error.
Authentication information cannot be recovered.
Authentication token lock busy.
Authentication token aging disabled.
User unknown to password service.
Preliminary check by password service failed.
SEE ALSO
pam(3), pam_start(3), pam_authenticate(3).
pam_chauthtok(3)