You need to be root to do this but there is no single command available. From the /etc/security/passwd you get the information when the password for a particular user was set ("lastupdate"). You'd then check the user's attributes to find the intervall for a forced password change. With those two values and the current date you can calculate when the current password will be expired. Thus a script would probably be written around the following commands:
Search the script forum to find how to convert a date into seconds from epoch for easy comparison. You might even find several complete scripts there for accomplishing your aim.
Hi,
Is there any way of sending an email to a number of users indicating that the passwords of user accounts will expire?
Currently we have a test server with a number of oracle test accounts on it. Each of these accounts correspond to an instance of Oracle on the server. These... (2 Replies)
Hi,
Is there any way of sending an email to a number of users indicating that the passwords of user accounts will expire?
Currently we have a test server with a number of oracle test accounts on it. Each of these accounts correspond to an instance of Oracle on the server. These... (2 Replies)
Hi Gurus
I have a few Sol 5.9 servers and i have enabled password less authentication between them for my user ID. Often i have found that when my password has expired,the login fails.
Resetting my password reenables the keys.
Do i need to do something to avoid this scenario or is this... (2 Replies)
Hi All,
I want to write a script that will send the alert when linux server password expiry for user 'x' is less than 12 days.
I have written the below script but this is not working for expiry date 04 july
script;-
P_EXPIRY_DATE=`chage -l msdp| grep 'Password expires' | awk ' {... (2 Replies)
Hi,
I would like to know is there command which will tell me when password will be expire and when last password was changed ?
like on linux chage -l <username? (2 Replies)
Hi,
Here's the version of unix that we are working on.
> uname -a
AIX yyyyyyyy 1 6 00F613E24C00
@:on(cluster303)/iishomea/kmani00->
i have application id: aaabbb
Now i need to check whether the password for the application id set to non expiry type or not.
Moreover, with that unix... (3 Replies)
Discussion started by: kmanivan82
3 Replies
LEARN ABOUT DEBIAN
nwbols
NWBOLS(1) nwbols NWBOLS(1)NAME
nwbols - List NetWare Bindery Objects
SYNOPSIS
nwbols [ -h ] [ -S server ] [ -U user name ] [ -P password | -n ] [ -C ] [ -t type ] [ -o pattern ] [ -v ]
DESCRIPTION
nwbols lists the specified NetWare Bindery Objects visible for the user.
nwbols looks up the file $HOME/.nwclient to find a file server, a user name and possibly a password. See nwclient(5) for more information.
Please note that the access permissions of $HOME/.nwclient MUST be 600 for security reasons.
OPTIONS -h
-h is used to print out a short help text.
-S server
server is the name of the server you want to use.
-U user
user is the user name to use for login.
-P password
password is the password to use for login. If neither -n nor -P are given, and the user has no open connection to the server, nwbols
prompts for a password.
-n
-n should be given if no password is required for the login.
-C
By default, passwords are converted to uppercase before they are sent to the server, because most servers require this. You can turn off
this conversion by -C.
-t type
You can restrict the objects listed by specifying the type of the objects to be listed. type must be given as a decimal number.
-o pattern
Specifying a pattern is another way to restrict the objects listed. Please note that this pattern is evaluated by the NetWare server.
grep would be a better candidate for complex patterns.
-v
By default, the object's name, its ID and its type are listed by nwbols. In the verbose mode, activated by -v, the object flags, its
security byte and the properties flag is also listed.
AUTHORS
nwbols was written by Volker Lendecke. See the Changes file of ncpfs for other contributors.
nwbols 7/9/1996 NWBOLS(1)