** If you have /lib/security/pam_pwdb.so
append below to your /etc/pwdb.conf in client
change like below to /etc/nsswitch.conf
append like below to /etc/pam.d/passwd
** if you have not pam_pwdb.so then append like below to /etc/pam.d/passwd
** if you dont success for these methods then u can try this module for nis PAM NIS authorisation module
Hi all of you..............
I am using openldap on ubuntu server . i want to apply password policy for user's to set password length , expire date , ......etc.
can anybody guide me to configure this. (1 Reply)
Hi Solaris's expert
I need to change user password on Solaris10 2 servers.
With the same password I can change it just only one.
Try to check everything but not found difference??
password pattern: abcdeFgh9Jk
server1 check all characters but server2 check only first 8 characters.Why??... (10 Replies)
Today i was going through some of security guides written on linux .
Under shadow file security following points were mentioned.
1)The encrypted password stored under /etc/shadow file should have more than 14-25 characters.
2)Usernames in shadow file must satisfy to all the same rules as... (14 Replies)
hi folk,
i try to setup a new password policy for our solaris box user, below are the /etc/default/passwd/, but then when i tried to create a user, it didn't ask for numeric character, and the new password also didn't ask for special characters.
# useradd testing
# passwd testing
New... (7 Replies)
Hi linux expert,
i would like to create a script for listing all user with there password policy. It should be in the following format:
Last password change : Sep 19, 2011
Password expires : never
Password inactive : never
Account... (2 Replies)
Hi Experts,
i would like to know the description of the following:
Minimum: 0
Maximum: 90
Warning: 7
Inactive: -1
Last Change: Never
Password Expires: Never
Password Inactive: Never
Account Expires: Never
Does this means that... (2 Replies)
Hello All,
I have Sun DSEE7 (11g) on Solaris 10.
I have run idsconfig and initialized ldap client with profile created using idsconfig.
My ldap authentication works. Here is my pam.conf
# Authentication management
#
# login service (explicit because of pam_dial_auth)
#
login ... (3 Replies)
Hello Team,
I am using Lubuntu & have DRBL remote boot setup with open Ldap authentication. Currently there is no password expire policy. I want to set Password Policy so that user's password will expire after a month & they will get prompt to change their password.
Using PAM we can do it,... (1 Reply)
I need help. I have set a password policy. But I want to dis allow setting user name as password.
My policy is as below...
min length =8
min diff=2
min alpha=2
max repeats=2
dictionary= /usr/share/dict/words
Still user can set his username as password (i.e. Jackie1234).
Code tags for... (11 Replies)
Hi,
I am unable to enforce password complexity policy for root user. (other users are working) on RHEL 6.2. Anything wrong with system-auth parameters? PLease help..
vi /etc/pam.d/system-auth
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time... (1 Reply)
Discussion started by: suresh3566
1 Replies
LEARN ABOUT OSF1
yppasswdd
yppasswdd(8) System Manager's Manual yppasswdd(8)NAME
yppasswdd, rpc.yppasswdd - server daemon for modifying the Network Information Service (NIS) password file
SYNOPSIS
/usr/sbin/rpc.yppasswdd file [-m arg1 arg2...]
DESCRIPTION
The yppasswdd daemon is a server that handles password change requests from yppasswd(1). It changes a password entry in the specified file,
which is assumed to be in the same format described in passwd(4). An entry in file will be changed only if the password presented by
yppasswd(1) matches the encrypted password of that entry.
If the -m option is given, then after file is modified, a make(1) will be performed in /var/yp. Any arguments following the option will be
passed to make. The -m option should be set only at a NIS master server machine.
This server is not run by default, nor can it be started up from inetd(8). If it is desired to enable remote password updating for the
NIS, then an entry for yppasswdd should be put in the /sbin/init.d/nis file of the host serving as the master for the NIS passwd file.
SECURITY NOTE
When enhanced security is installed and NIS is used to distribute the protected password authentication database, the yppasswdd daemon man-
ages writes to that database. A strict C2 security policy, which is optionally configurable using enhanced security, requires each
user login or login failure to be recorded in the protected password authentication database. These updates, in combination with password
changes and system administration functions affecting user accounts, are coordinated by the daemon.
EXAMPLES
If the NIS password file is stored as /var/yp/src/passwd, then to have password changes propagated immediately, the server should be
invoked as: /usr/sbin/rpc.yppasswdd /var/yp/src/passwd -m passwd DIR= /var/yp/src
FILES SEE ALSO
Commands: yppasswd(1), ypmake(8)
Files: passwd(4), ypfiles(4)yppasswdd(8)