I think I'm pretty sure that you can set the password limit here, in your /etc/pam.d/login file (you will have to add this line below):
You can change max value to whatever you want. Going through man pages, max is not documented, but the functionality is there. Also, before any changes make sure you backup your files.
Hi All,
I was wondering, how can I echo password using a character such as '*' in unix?
In my machine, password is not echoed, so it is only blank space when I enter any password.
So, when I enter a command such as "lock", how can I set the echo character to "*" or something else for... (4 Replies)
G'day guys,
Just a simple question:
Is it possible to set user's passwords without numeric characters?
I prefer to have passwords as simple words, but when going through SMC, i get an error that the first six characters must contain at least 2 alphabetic and 1 numeric.
Server is a Sun... (3 Replies)
Good morning!
I am using a shell script to back up user email files to a remote location. The problem is, one (and apparently more than one) users have the symbol "@" in their password. As you can see from the line:
/sbin/mount_smbfs... (5 Replies)
Hi
I have a password stored in a file (which is a user input)
The password is having the special character $
say the password is pw$ord and is stored in the file pw_note
I am using the following statement to store the passowrd in a
variable
$schema_pwd = `cat $dir/pwd_note` ;
Now if i print... (4 Replies)
On SPARC Solaris 10. I set the app account so it's expired. I also want it
so not required to change password at first login, I can do this by
removing the numbers after the password in /etc/shadow.
example using user1
The /etc/shadow file looks like this:
user1:kOmcVXAImRTAY:0::::90::
... (8 Replies)
I'm writing a script that has the need to verify the current user's username and password. I'm not entirely sure how to do this. I've read some things on "dscl" but am not sure that's the correct route for me to go.
The one condition i have is that i really need to have the verification happen... (4 Replies)
I am using the below to random generate a password but I need to have 2 numeric characters and 6 alphabetic chars
head /dev/urandom | tr -dc A-Za-z0-9 | head -c 8 ; echo ''
6USUvqRB
------ Post updated at 04:43 PM ------
Any Help folks - Can the output be passed onto a sed command to... (9 Replies)
Discussion started by: infernalhell
9 Replies
9. Forum Support Area for Unregistered Users & Account Problems
I was unable to login and so used the "Forgotten Password' process. I was sent a NEWLY-PROVIDED password and a link through which my password could be changed. The NEWLY-PROVIDED password allowed me to login.
Following the provided link I attempted to update my password to one of my own... (1 Reply)
Discussion started by: Rich Marton
1 Replies
LEARN ABOUT HPUX
pam_chauthtok
pam_chauthtok(3) Library Functions Manual pam_chauthtok(3)NAME
pam_chauthtok - perform password related functions within the PAM framework
SYNOPSIS
[ flag ... ] file ... [ library ... ]
DESCRIPTION
is called to change the authentication token associated with a particular user referenced by the authentication handle, pamh.
The following flag may be passed in to
The password service should not generate any messages.
The password service should only update those passwords that have aged.
If this flag is not passed, all password services should update their passwords.
Upon successful completion of the call, the authentication token of the user will be changed in accordance with the password service con-
figured in the system through pam.conf(4).
Notes
The flag is typically used by a application which has determined that the user's password has aged or expired. Before allowing the user to
login, the application may invoke with this flag to allow the user to update the password. Typically applications such as passwd(1) should
not use this flag.
performs a preliminary check before attempting to update passwords. This check is performed for each password module in the stack as listed
in pam.conf(4). The check may include pinging remote name services to determine if they are available. If returns then the check has
failed, and passwords are not updated.
APPLICATION USAGE
Refer to pam(3) for information on thread-safety of PAM interfaces.
RETURN VALUE
Upon successful completion, is returned. In addition to the error return values described in pam(3), the following values may be returned:
No permission.
Authentication token manipulation error.
Authentication information cannot be recovered.
Authentication token lock busy.
Authentication token aging disabled.
User unknown to password service.
Preliminary check by password service failed.
SEE ALSO pam(3), pam_start(3), pam_authenticate(3).
pam_chauthtok(3)