09-16-2009
Increase Password length
Hello All,
I am using RHEL 4. Currently maximum password length limit is set to 8 on my system.
Please tell what do i need to change to increase this limit to say 20. I changed the login.defs and included the following line -
"
PASS_MAX_LEN 20
"
but this dint work.
I further modified /etc/pam.d/system-auth file and added there too as-
"
password sufficient /lib/security/$ISA/pam.unix.so nullok maxlen=20 use_authtok md5 shadow
"
but this too doest work.
Can anyone please tell me how to increase the password length.
Thanks and Regards,
Shamik.
9 More Discussions You Might Find Interesting
1. AIX
hi friends,
anybody know how many character of password length in aix5.3? please help me
TIA
bong (1 Reply)
Discussion started by: bong02
1 Replies
2. HP-UX
Dear frnds,
how i can make the password 5chs minimum length in hp-ux 11i ? pls help
regards (3 Replies)
Discussion started by: jestinabel
3 Replies
3. UNIX for Dummies Questions & Answers
Hi,
I need to create a file of record length more than 300 characters.
But in my unix box, i am able to create a file only with a maximum of 256 characters per record.
Is there anyway i can create a file with more than 300 characters in this case?
Or How to increase the maximum record... (1 Reply)
Discussion started by: mahish20
1 Replies
4. AIX
Hi All,
How can I make the password of only two userid with 6 length while others are using regular policy of 8 or more length.
Please help. Thanks. (2 Replies)
Discussion started by: itik
2 Replies
5. Solaris
I would like to enforce the users to use 15 character passwords. I have edited the /etc/default/passwd and given PASSLENGTH=15. What i noticed is that when user changes the password next time, it will enforce the a 15 character password but during the next logon, it verifies only first 8... (5 Replies)
Discussion started by: uxadmin007
5 Replies
6. Red Hat
Hello all,
If anyone has time, I have a few questions:
How do I do the following in Linux. We are using Red Hat and Oracle Enterprise Linux, which is based on Red Hat too.
1. How to lock the account after a few (like 3) invalid password attempts?
2. How do you lock a screen after 30... (1 Reply)
Discussion started by: nstarz
1 Replies
7. UNIX for Advanced & Expert Users
Hi,
This is my first post to this site. So kindly forgive if I am writing in a wrong section.
My query is that...
I want to modify the max username length size. I guess it is 32/64 on CentOS. Now I want to change it to 128. Is there any way to do that?
Thanks in advance!! :) (4 Replies)
Discussion started by: ajay303
4 Replies
8. Shell Programming and Scripting
Hello Everyone,
I am stuck with one issue while working on abstract flat file which i have to use as input and load data to table.
Input Data-
------ ------------------------ ---- -----------------
WFI001 Xxxxxx Control Work Item A Number of Records
------ ------------------------... (5 Replies)
Discussion started by: sonali.s.more
5 Replies
9. Shell Programming and Scripting
I have a ksh shell script and i need to pass arguments which are generated by data pulled from a database.
When the argument to the shell script is too long (about 4000 charecters) the below is the issue observed.
I copy the command which is 4000 charecters long from the logs and paste it... (7 Replies)
Discussion started by: mohtashims
7 Replies
LEARN ABOUT LINUX
pam_pwhistory
PAM_PWHISTORY(8) Linux-PAM Manual PAM_PWHISTORY(8)
NAME
pam_pwhistory - PAM module to remember last passwords
SYNOPSIS
pam_pwhistory.so [debug] [use_authtok] [enforce_for_root] [remember=N] [retry=N] [authtok_type=STRING]
DESCRIPTION
This module saves the last passwords for each user in order to force password change history and keep the user from alternating between the
same password too frequently.
This module does not work together with kerberos. In general, it does not make much sense to use this module in conjunction with NIS or
LDAP, since the old passwords are stored on the local machine and are not available on another machine for password history checking.
OPTIONS
debug
Turns on debugging via syslog(3).
use_authtok
When password changing enforce the module to use the new password provided by a previously stacked password module (this is used in the
example of the stacking of the pam_cracklib module documented below).
enforce_for_root
If this option is set, the check is enforced for root, too.
remember=N
The last N passwords for each user are saved in /etc/security/opasswd. The default is 10.
retry=N
Prompt user at most N times before returning with error. The default is 1.
authtok_type=STRING
See pam_get_authtok(3) for more details.
MODULE TYPES PROVIDED
Only the password module type is provided.
RETURN VALUES
PAM_AUTHTOK_ERR
No new password was entered, the user aborted password change or new password couldn't be set.
PAM_IGNORE
Password history was disabled.
PAM_MAXTRIES
Password was rejected too often.
PAM_USER_UNKNOWN
User is not known to system.
EXAMPLES
An example password section would be:
#%PAM-1.0
password required pam_pwhistory.so
password required pam_unix.so use_authtok
In combination with pam_cracklib:
#%PAM-1.0
password required pam_cracklib.so retry=3
password required pam_pwhistory.so use_authtok
password required pam_unix.so use_authtok
FILES
/etc/security/opasswd
File with password history
SEE ALSO
pam.conf(5), pam.d(5), pam(8) pam_get_authtok(3)
AUTHOR
pam_pwhistory was written by Thorsten Kukuk <kukuk@thkukuk.de>
Linux-PAM Manual 06/04/2011 PAM_PWHISTORY(8)