Sponsored Content
Full Discussion: No users can login
Operating Systems HP-UX No users can login Post 302327071 by methyl on Friday 19th of June 2009 01:48:46 PM
Old 06-19-2009
It is quite easy to convert or unconvert trusted with SAM by accident. If you are intentionally trusted beware that the reverse convert loses all the user account passwords. As "vbe" states you need to know whether your system is normally trusted or not.
SAM has a log and a log viewer.

Code:
/usr/sam/bin/samlog_viewer

Also check that you don't have a file called /etc/nologin (with NOLOGIN=1 in /etc/default/security). It will give these symptoms.

Is inetd running?
Anything unusual in syslog?
 

9 More Discussions You Might Find Interesting

1. AIX

Change users login name

Hi, I need to change some users login name in AIX. With solaris i donīt had problems, i have used "usermod". But in AIX the usermod command donīt have the same behavior. Can someone give me a tip on how to perform these changes? Thanks in advance. (9 Replies)
Discussion started by: spacewalker
9 Replies

2. Linux

Users with login privileges

Hi. I need the name for one command which I cant remember. This command displays all users which can log in to the system, wether they are stored in /etc/passwd, NIS og LDAP. Does anyone remember what command this is? (2 Replies)
Discussion started by: sprellari
2 Replies

3. HP-UX

error occurs while some users login

hi all, i have a problem that while some of the users trying to login the following error occurs and the session is automatically closed. ssl error: RAND_status reported there wasn't enough randomness for the PRNG. ssl error: You need to specify RandomFile or EGDFile to obtain the randomness.... (0 Replies)
Discussion started by: rrlog
0 Replies

4. UNIX for Dummies Questions & Answers

last login date and time for all users

I need a command that will list all the users and their last login date & time. I was trying the last command and the who command, but can't get exactly what I need. I just need the output to be user name and last login date . Thanks for your help! (3 Replies)
Discussion started by: igidttam
3 Replies

5. Shell Programming and Scripting

users login

Hello everyone I need to send to a file the last command from all users who log in and log out by week or month. My questions are I can do it with the command or I need to do a script ? If the answer is I need to do a script, someone can help me because Im complete new to make a... (3 Replies)
Discussion started by: lo-lp-kl
3 Replies

6. Programming

how can get users list and their login time?

i'm sorry if yesterday i posted this thread in unix for dummies forums, :D i am a newbie in C programming i want to get active users list and their login time... i have search and learn about passwd and utmp, but i only can get user list without their login time... do you have an idea... (2 Replies)
Discussion started by: alif
2 Replies

7. Solaris

Passwordless Login between users

Hi Gurus, Wanted to know if there is a way to enable passwordless login between specific users in a Solaris (5.9)server. I copied the public key of first user into the $HOME/.ssh/authorized_keys file of the second user. But it didn't work out. Note - Am talking about users in the same... (9 Replies)
Discussion started by: Hari_Ganesh
9 Replies

8. Shell Programming and Scripting

Script to list users and their last login?

hi all, I'm trying to write a script to create a file with a list of all users, their gid, gecos field and their last login time e.g. fairly new to scripting, this is what I've got so far #!/bin/sh( userlist= cat /etc/passwd | awk -F: '{print $1," ",$4," ",$5}' for name in $userlist... (3 Replies)
Discussion started by: tanngo
3 Replies

9. Solaris

Disable users to direct login

Hi all, how can I disable direct login to a Solaris system not only for root user but also for other accounts? Looking in google I came to the following: For telnet (/etc/default/login): disable root access> CONSOLE=/dev/console disable generic user> ? For ssh... (5 Replies)
Discussion started by: Evan
5 Replies
getprpw(1M)															       getprpw(1M)

NAME
getprpw - display protected password database SYNOPSIS
parm[,parm]] username DESCRIPTION
displays the user's protected password database settings. This command is available only to the superuser in a trusted system. Normally it is only used via SAM, see sam(1M). uses the configuration file default if is not specified. See nsswitch.conf(4). Options recognizes the following options. Specifies to get information from the local user. Displays the arguments supplied to in raw format Displays the database value for the argument passed. An "invalid-opt" is printed if a list of options passed to contains an invalid option. The rest of the options will be processed. If is specified without all parameters are displayed in the order given below. Boolean values are returned as or (for system default values in Numeric values are specified as positive numbers, 0, or -1. A value of -1 indicates that the field has not been assigned a value in the database. Units of time are returned in number of days (>=0), although the database keeps them in seconds. This and other minor differences between the command parameters and the database fields are consistent with modprpw(1M). The following parameters for the user can be displayed using the option. They are listed below in the order shown in The database fields are fully explained in prpwd(4). user uid boot authorization flag audit id audit flag minimum time between password changes maximum password length password expiration time password lifetime last successful password change time last unsuccessful password change time account expiration time last login time interval password expiration warning time whether user picks password, whether system generates pronounceable passwords, whether password is restricted, i.e, checked for triviality, NULL passwords are allowed, Not recommended! whether system generates passwords having characters only, whether system generates passwords having letters only, time of day allowed for login time of last successful login time of last unsuccessful login tty of last successful login consecutive number of unsuccessful logins so far tty of last unsuccessful login maximum unsuccessful login tries administrator lock, if on, if off, if not set. returns the reason for a lockout in a "bit" valued string, where 0 = condition not present, 1 is present. The position, left to right represents: 1 past password lifetime 2 past last login time (inactive account) 3 past absolute account lifetime 4 exceeded unsuccessful login attempts 5 password required and a null password 6 admin lock 7 password is a * RETURN VALUE
0 success 1 user not privileged 2 incorrect usage 3 cannot find the password file 4 system is not trusted EXAMPLES
Displays the database aging fields for user "someusr". The command displays: WARNINGS
This command is intended for SAM use only. It may change with each release and can not be guaranteed to be backward compatible. Several database fields interact with others. The side effects of an individual change may not cause a problem till much later. Special meanings may apply in the following cases: o an absent field o a field without a value o a field with a zero value HP-UX 11i Version 3 is the last release to support trusted systems functionality. AUTHOR
was developed by HP. FILES
System Password file Protected Password Database System Defaults Database SEE ALSO
modprpw(1M), prpwd(4), nsswitch.conf(4). TO BE OBSOLETED getprpw(1M)
All times are GMT -4. The time now is 05:27 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy