12-02-2009
Identify which authentication method was used at logon
Experts,
Is there any way to know which authentication method the user used to login into the box? I mean, is possible to identify if an active user had logged using keys or password for example?
Let me clarify: we have a script that we want to allow users to execute only if they have used their private keys to login the machine.
Is there such a thing?
We are using Solaris 10.
Thanks in advance.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I stupidly changed the shell of the root user to one that does not exist, and now when I try to lgon it says it cannot find the path to my shell and will not let me proceed any further. Is there any way I can get round this without re-installing the OS?
Thanks for any replies. (8 Replies)
Discussion started by: SRP
8 Replies
2. UNIX for Dummies Questions & Answers
Hi:
I am wondering if anyone has a logon script to be put in /etc/profile or environments that will display the logged on username and path? (4 Replies)
Discussion started by: capeme
4 Replies
3. Shell Programming and Scripting
hi
how can I know abt the details of current user who are logged on and as well as those users who currently have an account but are not logged on?
Thanks (1 Reply)
Discussion started by: nokia1100
1 Replies
4. Forum Support Area for Unregistered Users & Account Problems
This is probably a dumb question and a pipe dream, but is there (or can there be) an alternate way to logon?
I can access the site from work, but they have blocked the actual login URL. I dont know exactly what the URL is since I can obviously log on from home, but I know it has the word login.... (2 Replies)
Discussion started by: earnstaf
2 Replies
5. Solaris
Hi
I am envountring a problem while I login using ssh on a sun box to a remote box.
I use ssh user@server and it takes long time to ask for a password..
does anyone knows the reason behind this? or is there a way that this could be solved
Thanks,
Antony (8 Replies)
Discussion started by: antointoronto
8 Replies
6. AIX
In /etc/security/user, we can set which authentication method we use for each user. for example:
test:
admin = false
rlogin = false
SYSTEM = "NONE"
I want to test whether SYSTEM=NONE (without ") is acceptable. How can I verify it? and How can we check which... (1 Reply)
Discussion started by: quanba
1 Replies
7. Solaris
After a memory upgrade all network interfaces are misconfigued. How do i resolve this issue. Below are some out puts.thanks.
ifconfig: plumb: SIOCLIFADDIF: eg000g0:2: no such interface
# ifconfig eg1000g0:2 plumb
ifconfig: plumb: SIOCLIFADDIF: eg1000g0:2: no such interface
# ifconfig... (2 Replies)
Discussion started by: andersonedouard
2 Replies
8. IP Networking
Hi experts,
I am not sure in which forum to submit this question. If this is not the correct place then please let me know where to submit this thread.
My requirement is to invoke windows batch scripts from linux shell script. Hence, I have installed openssh in Cygwin on the windows machine.... (2 Replies)
Discussion started by: ahmedwaseem2000
2 Replies
9. UNIX for Dummies Questions & Answers
Hi,
I was wondering if someone may be able to help me with finding out the different *nix logon types.
The different logon types for a Successful Logon event type in Windows (4624) is well documented both on the M$ site and also on many tech related sites, listing the different logon types... (6 Replies)
Discussion started by: urhero
6 Replies
10. Cybersecurity
Hello,
We have mid level infrastructure of all on-premises servers. All windows servers are getting authenticated by Microsoft Active Directory Services, half Unix (Solaris+Linux) servers are getting authentication by NIS and other half by LDAP.
We have plans to migrate from NIS to LDAP, so... (2 Replies)
Discussion started by: solaris_1977
2 Replies
LEARN ABOUT OPENSOLARIS
chkey
chkey(1) User Commands chkey(1)
NAME
chkey - change user's secure RPC key pair
SYNOPSIS
chkey [-p] [-s nisplus | nis | files | ldap]
[-m <mechanism>]
DESCRIPTION
chkey is used to change a user's secure RPC public key and secret key pair. chkey prompts for the old secure-rpc password and verifies that
it is correct by decrypting the secret key. If the user has not already used keylogin(1) to decrypt and store the secret key with key-
serv(1M), chkey registers the secret key with the local keyserv(1M) daemon. If the secure-rpc password does not match the login password,
chkey prompts for the login password. chkey uses the login password to encrypt the user's secret Diffie-Hellman (192 bit) cryptographic
key. chkey can also encrypt other Diffie-Hellman keys for authentication mechanisms configured using nisauthconf(1M).
chkey ensures that the login password and the secure-rpc password(s) are kept the same, thus enabling password shadowing. See shadow(4).
The key pair can be stored in the /etc/publickey file (see publickey(4)), the NIS publickey map, or the NIS+ cred.org_dir table. If a new
secret key is generated, it will be registered with the local keyserv(1M) daemon. However, only NIS+ can store Diffie-Hellman keys other
than 192-bits.
Keys for specific mechanisms can be changed or reencrypted using the -m option followed by the authentication mechanism name. Multiple -m
options can be used to change one or more keys. However, only mechanisms configured using nisauthconf(1M) can be changed with chkey.
If the source of the publickey is not specified with the -s option, chkey consults the publickey entry in the name service switch con-
figuration file. See nsswitch.conf(4). If the publickey entry specifies one and only one source, then chkey will change the key in the
specified name service. However, if multiple name services are listed, chkey can not decide which source to update and will display an
error message. The user should specify the source explicitly with the -s option.
Non root users are not allowed to change their key pair in the files database.
OPTIONS
The following options are supported:
-p Re-encrypt the existing secret key with the user's login password.
-s nisplus Update the NIS+ database.
-s nis Update the NIS database.
-s files Update the files database.
-s ldap Update the LDAP database.
-m <mechanism> Changes or re-encrypt the secret key for the specified mechanism.
FILES
/etc/nsswitch.conf
/etc/publickey
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
SEE ALSO
keylogin(1), keylogout(1), keyserv(1M), newkey(1M), nisaddcred(1M), nisauthconf(1M), nsswitch.conf(4), publickey(4), shadow(4),
attributes(5)
NOTES
NIS+ might not be supported in future releases of the Solaris operating system. Tools to aid the migration from NIS+ to LDAP are available
in the current Solaris release. For more information, visit http://www.sun.com/directory/nisplus/transition.html.
SunOS 5.11 29 Nov 2005 chkey(1)