06-30-2010
One side note -
You do not want accounts like oracle, root, or other major resource owners accounts locked on a production system. If you have people hacking accounts on a production system you should consider other approaches - than lockout.
This User Gave Thanks to jim mcnamara For This Post:
10 More Discussions You Might Find Interesting
1. Solaris
passwd only changes the password but i need to change the user name
tnx (5 Replies)
Discussion started by: umen
5 Replies
2. UNIX for Dummies Questions & Answers
I have access to 15+ UNIX boxes at work, and I do not consistently log onto all of them over time. When I do try to access one I havent been on in awhile, my account is locked as the password has expired.
I need to request to the UNIX SA's that the password expiration is 90 days and that if it... (1 Reply)
Discussion started by: stringzz
1 Replies
3. UNIX for Dummies Questions & Answers
Thanks
AVKlinux (3 Replies)
Discussion started by: avklinux
3 Replies
4. Debian
hello friends,
one user is created named "user1"
I login as "user1" . Now when i do "su -" to be root user I have to give password for root .
Is there any way through which we can skip giving the password to root.
i.e.
user1@work:~$ su -
Password: xxxxxx
work:~$
I don't want that... (1 Reply)
Discussion started by: pradeepreddy
1 Replies
5. Shell Programming and Scripting
I am trying to create a shell script that will:
check if a specific user already exists
if not, create a specific group and create the user in that group
assign a password to that user, where the password is passed in as a parameter to the script
The problem that I need help with is 3 on... (4 Replies)
Discussion started by: killuane
4 Replies
6. Solaris
Hi Everyone, my name`s Sergio.
I need your help please. I have a problem using Solaris 9. I create an account with the command line "useradd", with this I have no problem.
My problem is I need set the created account to NP (No Password or Non Login). For example:
cat /etc/shadow
... (2 Replies)
Discussion started by: roswell
2 Replies
7. Shell Programming and Scripting
Hi All,
I have one requirment..
I need to change my id to some sudo account in a server.. Actually our username/passwd will be stored in one gip file like below...
$cat .a.gz #It's hidden file
username
passwd
$
So I tried the below script to pass the password when i sudo to... (7 Replies)
Discussion started by: raghu.iv85
7 Replies
8. Shell Programming and Scripting
I need some help creating a condition for looking up hosts. I have this master host file that has data in the following columns:
FQDN primary IP secondary IP third IP
I need the hostnames to feed into another script I use for provisioning users. The FQDN doesn't always work for... (2 Replies)
Discussion started by: MaindotC
2 Replies
9. Red Hat
Dear All ,
I have created a user named X and gave sudo permissions for it , So that it can access some commands as root.
This particular user can login to the server using SSH login through putty any where with in the network.
But there is some issue , when the same user is trying from... (4 Replies)
Discussion started by: jegaraman
4 Replies
10. Forum Support Area for Unregistered Users & Account Problems
Neo
Thanks for your reply to my original post, entitled "Problem changing the email address associated with my unix.com account".
I am unable to reply to you in that thread, as I am unable to log-on to unix.com!
From what you said about purging dormant accounts, it is likely that my account... (1 Reply)
Discussion started by: irb
1 Replies
LEARN ABOUT REDHAT
hosts.equiv
HOSTS.EQUIV(5) Linux Programmer's Manual HOSTS.EQUIV(5)
NAME
/etc/hosts.equiv - list of hosts and users that are granted "trusted" r command access to your system
DESCRIPTION
The hosts.equiv file allows or denies hosts and users to use the r-commands (e.g. rlogin, rsh or rcp) without supplying a password.
The file uses the following format:
[ + | - ] [hostname] [username]
The hostname is the name of a host which is logically equivalent to the local host. Users logged into that host are allowed to access like-
named user accounts on the local host without supplying a password. The hostname may be (optionally) preceded by a plus (+) sign. If the
plus sign is used alone it allows any host to access your system. You can expicitly deny access to a host by preceding the hostname by a
minus (-) sign. Users from that host must always supply a password. For security reasons you should always use the FQDN of the hostname
and not the short hostname.
The username entry grants a specific user access to all user accounts (except root) without supplying a password. That means the user is
NOT restricted to like-named accounts. The username may be (optionally) preceded by a plus (+) sign. You can also explicitly deny access to
a specific user by preceding the username with a minus (-) sign. This says that the user is not trusted no matter what other entries for
that host exist.
Netgroups can be specified by preceding the netgroup by an @ sign.
Be extremely careful when using the plus (+) sign. A simple typographical error could result in a standalone plus sign. A standalone plus
sign is a wildcard character that means "any host"!
FILES
/etc/hosts.equiv
NOTE
Some systems will only honor the contents of this file when it has owner root and no write permission for anybody else. Some exceptionally
paranoid systems even require that there be no other hard links to the file.
SEE ALSO
rhosts(5), rshd(8), rlogind(8)
Linux 1995-01-29 HOSTS.EQUIV(5)