11-17-2008
Post /etc/nsswitch.conf
Try:
passwd -r files username
it should work even with a bad nsswitch.conf
10 More Discussions You Might Find Interesting
1. Solaris
Hi,
We would like to set a password to null for a particular user id.
But it should not prompt for a Password after login prompt.
We tried editing the shadow file by using passwd -d but it still gives messager "Choose a new password, New Password:"
I want it to directly login to shell once I... (4 Replies)
Discussion started by: ssk
4 Replies
2. Solaris
Hello
I want to set the password for user never expire through the command line. For your information the box is running under Solaris 8 platform. (2 Replies)
Discussion started by: shamsul
2 Replies
3. UNIX for Dummies Questions & Answers
If we have it so users accounts need a new password after 90 days is there a way to also say that after 90 days they need to use a new password and not let them use the same one twice? (2 Replies)
Discussion started by: LordJezo
2 Replies
4. Red Hat
Hi All,
Is this true on chage command?
-M, MAX_DAYS
Passing the number -1 as MAX_DAYS will remove checking a password's validity.
Does this means password will not expire anymore?
Thanks for any comment you may add. (0 Replies)
Discussion started by: itik
0 Replies
5. Solaris
Hi Everyone, my name`s Sergio.
I need your help please. I have a problem using Solaris 9. I create an account with the command line "useradd", with this I have no problem.
My problem is I need set the created account to NP (No Password or Non Login). For example:
cat /etc/shadow
... (2 Replies)
Discussion started by: roswell
2 Replies
6. Solaris
hi everybody
i cant set password for user (jam)
i tried to
#passwd jam
enter newpasswd :
after enter it showing
passwd : cannot get default domain:internal yp server or client error
i also check cat /etc/shadow file
jam:*:LK*:........
user is locked ... and i... (4 Replies)
Discussion started by: coolboys
4 Replies
7. Shell Programming and Scripting
okay here I go again...
I have created a script which adds new user to /etc/password and which inturn creating a locked password in /etc/shadow but I am expecting to have *NP* for that particular user.Can someone help me with a script which can set the password for a particular user to NP in... (1 Reply)
Discussion started by: sintilash
1 Replies
8. Shell Programming and Scripting
A situation where i need to create 10 directories and set its 10 passwords.
Since each of the directories contents would be critical, only few users need to access. :wall:
I need to write a script so that it creates 10 directories in no time.
So, how can i explicitly set a password to a... (1 Reply)
Discussion started by: Manjunath B
1 Replies
9. Shell Programming and Scripting
Hi,
I am unable to set the password remotely. I am using the script as below:
ep=`echo "$p" | /usr/lbin/makekey`
ssh -t $i "/usr/local/bin/sudo useradd -c "$user_c" -m -d /home/$user_id -s /bin/ksh $user_id; /usr/local/bin/sudo /usr/sam/lbin/usermod.sam -F -p $ep $user_id"
The... (0 Replies)
Discussion started by: Kits
0 Replies
10. Solaris
I have a Solaris-10 non global zone, on which I am not able to reset password, while counts are matching in /etc/passwd and /etc/shadow. I tried searching its solution in various forums, but nothing is working
# id -a oemagent
uid=56605(oemagent) gid=56595(tess) groups=56595(tess)
# passwd -s... (2 Replies)
Discussion started by: solaris_1977
2 Replies
LEARN ABOUT PLAN9
audit_user
audit_user(4) File Formats audit_user(4)
NAME
audit_user - per-user auditing data file
SYNOPSIS
/etc/security/audit_user
DESCRIPTION
audit_user is an access-restricted database that stores per-user auditing preselection data. You can use the audit_user file with other
authorization sources, including the NIS map audit_user.byname and the NIS+ table audit_user. Programs use the getauusernam(3BSM) routines
to access this information.
The search order for multiple user audit information sources is specified in the /etc/nsswitch.conf file. See nsswitch.conf(4). The lookup
follows the search order for passwd(4).
The fields for each user entry are separated by colons (:). Each user is separated from the next by a newline. audit_user does not have
general read permission. Each entry in the audit_user file has the form:
username:always-audit-flags:never-audit-flags
The fields are defined as follows:
username User's login name.
always-audit-flags Flags specifying event classes to always audit.
never-audit-flags Flags specifying event classes to never audit.
For a complete description of the audit flags and how to combine them, see audit_control(4).
EXAMPLES
Example 1: Using the audit_user File
other:lo,am:io,cl
fred:lo,ex,+fc,-fr,-fa:io,cl
ethyl:lo,ex,nt:io,cl
FILES
/etc/nsswitch.conf
/etc/passwd
/etc/security/audit_user
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Interface Stability | See below |
+-----------------------------+-----------------------------+
The file format stability is evolving. The file content is unstable.
SEE ALSO
bsmconv(1M), getauusernam(3BSM), audit_control(4), nsswitch.conf(4), passwd(4)
NOTES
This functionality is available only if the Basic Security Module (BSM) has been enabled. See bsmconv(1M) for more information.
SunOS 5.10 2 Jan 2003 audit_user(4)