04-13-2009
How to lock the account after consecutive unsuccessful login in SUSE
Hi ,
Can anyone give ur answer for
How to lock the account after consecutive unsuccessful login in SUSE Enterprise 10.2 Linux
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Is there a way to easily change an account to be a non login account (NP in the shadow) file?
I know I can just edit the file but that is not what we want to do. We use access control software and want to provide a way to set an account to be non-login using simple commands that can be mapped... (0 Replies)
Discussion started by: LordJezo
0 Replies
2. SuSE
When we login to any remote connections in SuSE Linux, say for example, telnet , the following line is displayed "Last Login : Date and time is displayed"
I would like to disable this. In SuSE 9, I could find the solution .
Please suggest me a solution to disable the line displayed for SuSE... (3 Replies)
Discussion started by: Laksmi
3 Replies
3. UNIX for Dummies Questions & Answers
I have access to 15+ UNIX boxes at work, and I do not consistently log onto all of them over time. When I do try to access one I havent been on in awhile, my account is locked as the password has expired.
I need to request to the UNIX SA's that the password expiration is 90 days and that if it... (1 Reply)
Discussion started by: stringzz
1 Replies
4. Shell Programming and Scripting
hi
how can I Lock an account, by prepending ”*LK*” to the password field in /etc/shadow.
I dont want to use passwd -l .
Any idea? (3 Replies)
Discussion started by: tjay83
3 Replies
5. Solaris
Dears,
I want to lock the user's account after consecutive unsuccessful login attempts, how can I do this ? (1 Reply)
Discussion started by: mlsun
1 Replies
6. Red Hat
Hello all,
If anyone has time, I have a few questions:
How do I do the following in Linux. We are using Red Hat and Oracle Enterprise Linux, which is based on Red Hat too.
1. How to lock the account after a few (like 3) invalid password attempts?
2. How do you lock a screen after 30... (1 Reply)
Discussion started by: nstarz
1 Replies
7. Cybersecurity
Hi all,
I am having some issues with openssh vers OpenSSH_4.6p1 on SCO unixware 7.1.4
when a user accesses the system via ssh and the password is incorrect and more attempts have been made that the lock out limit I find that although there are messages in the syslog the account does not lock... (0 Replies)
Discussion started by: chlawren
0 Replies
8. AIX
I want to learn AIX. I would like to find someone who would be willing to give me a login to their AIX home lab server. My intent is to poke around and discover the similarities and differences of AIX compared to other *NIXs.
I am a UNIX admin so I can think of what some immediate concerns may... (1 Reply)
Discussion started by: perl_in_my_shel
1 Replies
9. Shell Programming and Scripting
#!/bin/bash
for servers in `cat ~/servers`
do
rosh -l root -n $servers 'if
then
echo $HOSTNAME
else
exit 1
fi'
done
I have few servers in the for loop that is powered off, so whenever I execute my script, it works fine if all the servers are on, but when it tries to execute the script... (1 Reply)
Discussion started by: Rojan Shakya
1 Replies
10. SuSE
hi
i want to enable details of previous successful/ unsuccessful login on screen after successful login in SUSE linux
---------- Post updated 01-17-15 at 10:00 PM ---------- Previous update was 01-16-15 at 11:37 PM ----------
hi guys please reply (1 Reply)
Discussion started by: Idea
1 Replies
getprpw(1M) getprpw(1M)
NAME
getprpw - display protected password database
SYNOPSIS
parm[,parm]] username
DESCRIPTION
displays the user's protected password database settings. This command is available only to the superuser in a trusted system. Normally
it is only used via SAM, see sam(1M).
uses the configuration file default if is not specified. See nsswitch.conf(4).
Options
recognizes the following options.
Specifies to get information from the local user.
Displays the arguments supplied to
in raw format
Displays the database value for the argument passed.
An "invalid-opt" is printed if a list of options passed to contains an invalid option. The rest of the options will be processed.
If is specified without all parameters are displayed in the order given below.
Boolean values are returned as or (for system default values in
Numeric values are specified as positive numbers, 0, or -1. A value of -1 indicates that the field has not been assigned a value in
the database.
Units of time are returned in number of days (>=0), although the database keeps them in seconds. This and other minor differences
between the command parameters and the database fields are consistent with modprpw(1M).
The following parameters for the user can be displayed using the option.
They are listed below in the order shown in The database fields are fully explained in prpwd(4).
user uid
boot authorization flag
audit id
audit flag
minimum time between password changes
maximum password length
password expiration time
password lifetime
last successful password change time
last unsuccessful password change time
account expiration time
last login time interval
password expiration warning time
whether user picks password,
whether system generates pronounceable passwords,
whether password is restricted, i.e, checked for triviality,
NULL passwords are allowed,
Not recommended!
whether system generates passwords having characters only,
whether system generates passwords having letters only,
time of day allowed for login
time of last successful login
time of last unsuccessful login
tty of last successful login
consecutive number of unsuccessful logins so far
tty of last unsuccessful login
maximum unsuccessful login tries
administrator lock,
if on, if off, if not set.
returns the reason for a lockout in a "bit" valued string,
where 0 = condition not present, 1 is present. The position, left to right represents:
1 past password lifetime
2 past last login time (inactive account)
3 past absolute account lifetime
4 exceeded unsuccessful login attempts
5 password required and a null password
6 admin lock
7 password is a *
RETURN VALUE
0 success
1 user not privileged
2 incorrect usage
3 cannot find the password file
4 system is not trusted
EXAMPLES
Displays the database aging fields for user "someusr".
The command displays:
WARNINGS
This command is intended for SAM use only. It may change with each release and can not be guaranteed to be backward compatible.
Several database fields interact with others. The side effects of an individual change may not cause a problem till much later.
Special meanings may apply in the following cases:
o an absent field
o a field without a value
o a field with a zero value
HP-UX 11i Version 3 is the last release to support trusted systems functionality.
AUTHOR
was developed by HP.
FILES
System Password file
Protected Password Database
System Defaults Database
SEE ALSO
modprpw(1M), prpwd(4), nsswitch.conf(4).
TO BE OBSOLETED getprpw(1M)