Sponsored Content
Operating Systems Solaris Identify which authentication method was used at logon Post 302376785 by incredible on Wednesday 2nd of December 2009 09:27:20 AM
Old 12-02-2009
This can be checked either from the syslog or messages file. You can script to to grep certain keywords or phrases like "logon" , "Failed" etc
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Can't logon

I stupidly changed the shell of the root user to one that does not exist, and now when I try to lgon it says it cannot find the path to my shell and will not let me proceed any further. Is there any way I can get round this without re-installing the OS? Thanks for any replies. (8 Replies)
Discussion started by: SRP
8 Replies

2. UNIX for Dummies Questions & Answers

Logon script

Hi: I am wondering if anyone has a logon script to be put in /etc/profile or environments that will display the logged on username and path? (4 Replies)
Discussion started by: capeme
4 Replies

3. Shell Programming and Scripting

About Logon

hi how can I know abt the details of current user who are logged on and as well as those users who currently have an account but are not logged on? Thanks (1 Reply)
Discussion started by: nokia1100
1 Replies

4. Forum Support Area for Unregistered Users & Account Problems

Alternate Logon Method?

This is probably a dumb question and a pipe dream, but is there (or can there be) an alternate way to logon? I can access the site from work, but they have blocked the actual login URL. I dont know exactly what the URL is since I can obviously log on from home, but I know it has the word login.... (2 Replies)
Discussion started by: earnstaf
2 Replies

5. Solaris

ssh logon

Hi I am envountring a problem while I login using ssh on a sun box to a remote box. I use ssh user@server and it takes long time to ask for a password.. does anyone knows the reason behind this? or is there a way that this could be solved Thanks, Antony (8 Replies)
Discussion started by: antointoronto
8 Replies

6. AIX

AIX: How to check which authentication method we are using for a user?

In /etc/security/user, we can set which authentication method we use for each user. for example: test: admin = false rlogin = false SYSTEM = "NONE" I want to test whether SYSTEM=NONE (without ") is acceptable. How can I verify it? and How can we check which... (1 Reply)
Discussion started by: quanba
1 Replies

7. Solaris

svc:/network/physical:default: Method "/lib/svc/method/net-physical" failed with exit status 96. [ n

After a memory upgrade all network interfaces are misconfigued. How do i resolve this issue. Below are some out puts.thanks. ifconfig: plumb: SIOCLIFADDIF: eg000g0:2: no such interface # ifconfig eg1000g0:2 plumb ifconfig: plumb: SIOCLIFADDIF: eg1000g0:2: no such interface # ifconfig... (2 Replies)
Discussion started by: andersonedouard
2 Replies

8. IP Networking

Cygwin remote ssh with key authentication method

Hi experts, I am not sure in which forum to submit this question. If this is not the correct place then please let me know where to submit this thread. My requirement is to invoke windows batch scripts from linux shell script. Hence, I have installed openssh in Cygwin on the windows machine.... (2 Replies)
Discussion started by: ahmedwaseem2000
2 Replies

9. UNIX for Dummies Questions & Answers

UNIX Logon/Authentication Types

Hi, I was wondering if someone may be able to help me with finding out the different *nix logon types. The different logon types for a Successful Logon event type in Windows (4624) is well documented both on the M$ site and also on many tech related sites, listing the different logon types... (6 Replies)
Discussion started by: urhero
6 Replies

10. Cybersecurity

Looking for suggestion on authentication method for UNIX/Windows

Hello, We have mid level infrastructure of all on-premises servers. All windows servers are getting authenticated by Microsoft Active Directory Services, half Unix (Solaris+Linux) servers are getting authentication by NIS and other half by LDAP. We have plans to migrate from NIS to LDAP, so... (2 Replies)
Discussion started by: solaris_1977
2 Replies
dce_login(1m)															     dce_login(1m)

NAME
dce_login - Validates a principal's identity and obtains the principal's network credentials SYNOPSIS
dce_login [principal_name] [password] [-c | -k keytable] [-r] [-f | +f] [-e[xec] cmd_string] OPTIONS
Causes the principal's identity to be certified. If you do not specify -c, the principal's identity is validated only. Retrieves the authentication key from keytable. Refreshes and validates the current login ID. Enables DCE TGT to be forwardable. Disables DCE TGT to be forwardable. Executes the command supplied as cmd_string. ARGUMENTS
The name of the principal to log in as. The password for principal_name. DESCRIPTION
The dce_login command is supplied for use in DCE configuration. It validates a principal's identity and obtains the principal's network credentials. If the -c option is supplied, the command also certifies the principal's identity, and, if the principal is able to be certified, creates an entry for the principal in the machine's local registry. If the principal is not able to be certified, the command attempts to log the principal in via the local registry. The -exec option executes the command specified by cmd_string after login. If cmd_string is specified without a full pathname, the path prefix is obtained by searching the directories according to the PATH variable. If you do not supply the name of the principal to validate, either on the command line with the principal_name argument or through the -r option that retrieves the principal name from the current login context, dce_login prompts for the principal name. If you do not supply the principal's authentication key either on the command line with password argument or through the -k option that retrieves the principal authentication key from the specified keytable, dce_login prompts for the password. If you supply the principal name and password on the command line, you must specify the principal name first, followed by the password. If you supply the principal_name argument and the -r option, the named principla must be the principal of the current network identity. If you supply the -f option, the forwardable TGT attribute is then turned on for this login context. Then when forwarding a user's DCE TGT from machine A to machine B, it enables the user from machine A to reuse their Kerberos credentials on machine B. The option +f turns off the forwardable TGT attribute. -f and +f can be used in conjunction with -r to change the forwardable TGT attribute for the current login context. The dce_login command executes the shell specified in the SHELL environment variable. Note that if the clocks on the Security server and client machines are not synchronized to within 2 or 3 minutes of each other, you may receive a password validation error and be unable to be validated. dce_login(1m)
All times are GMT -4. The time now is 01:08 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy