11-05-2010
That's easy enough, but we are using key authentication without passphrases there is no need for a password but tectia is still asking for a password. I just wanted to check to see if that was all I needed to do or if I had to do something extra. If anyone else has something to add, then that would be great, otherwise, thanks for the response.
10 More Discussions You Might Find Interesting
1. AIX
Hi Everybody,
I have 2 Servers (AIX 4.3), recently I installed SSH in both servers successfuly. I can connect from one server to another using SSH. My problem is when I tried to connect from Windows workstation to one of these servers the connection timed out. I'm using PUTTY to connect to the... (12 Replies)
Discussion started by: aldowsary
12 Replies
2. Shell Programming and Scripting
hi
i am using HP-UX and trying to write some scripting codes but i have to connect to windows and display the contents of a particular directory(in windows). how do i do it.?
Could anyone please help me regarding this !!
Thanks & Regards
guhas (2 Replies)
Discussion started by: guhas
2 Replies
3. AIX
We do not have a console for our box so we are trying to hyperlink in - does anyone know the settings? (9 Replies)
Discussion started by: vbagwell
9 Replies
4. Solaris
dear bro.
I using /usr/X11/bin/xorgconfig command configed xorg, and sync && init 6
but after restarted, used svcs -a to checked services status:
maintenance 23:41:50 svc:/application/x11/xvnc-inetd:default
How to solve this problem and connect to solaris using vncviewer under... (5 Replies)
Discussion started by: P2Baby
5 Replies
5. Shell Programming and Scripting
Hi All,
I need to connect windows server by unix shell script then search the directory for some keyword in all files in that directory...
Windows Server is \\wh01ad04
Please help me and thanks in advance (2 Replies)
Discussion started by: Pratik4891
2 Replies
6. UNIX for Dummies Questions & Answers
I have a home network set up that consists of a few windows clients and 3 centos, and 1 suse client. These are all virtual machines, VMware Workstation. One centos vm is set to be the Samba server. Do I need Samba set up on the other Linux clients?I have no problem seeing the windows clients... (0 Replies)
Discussion started by: ktb231
0 Replies
7. UNIX and Linux Applications
Hi,
I am a newbie to Linux and still trying to learn. Here is my situation.
I have a windows server where I installed Oracle DB. On the same Windows server, I have a VM running linux. I can ping Windows server IP successfully from linux.
I installed sqlplus on linux and trying to access... (4 Replies)
Discussion started by: rach0701
4 Replies
8. Shell Programming and Scripting
Hi
Need help to connect from Ubuntu to Windows using NetCat nc
I can not get my script to send new-line
Her is what I have tried(sleep 2 ; echo user ; sleep 1; echo pass; sleep 2; echo netstat) | nc -t 10.10.10.34 23
gives this outputÿý%ÿûÿûÿý'ÿýÿýÿûWelcome to Microsoft Telnet Service
... (1 Reply)
Discussion started by: Jotne
1 Replies
9. Windows & DOS: Issues & Discussions
Hi,
We are running Linux server and are required to connect to Windows server and fetch the files from windows server.
How can i connect to Windows server from Linux? I have to do this with a automated shell script on Linux
I appreciate your response. (4 Replies)
Discussion started by: reachmexyz
4 Replies
10. Windows & DOS: Issues & Discussions
I am looking to run a Windows utility BitRecover PST Viewer.
To help me read a pst file. Can anybody guide me how can I run this Windows utility on Linux. (3 Replies)
Discussion started by: marktux
3 Replies
LEARN ABOUT SUSE
pam_pwcheck
pam_pwcheck(8) Reference Manual pam_pwcheck(8)
NAME
pam_pwcheck - PAM module for password strength checking
DESCRIPTION
The pam_pwcheck is a PAM module for password strength checking. It makes additional checks upon password changes, but does not perform the
change itself. It only provides functionality for one PAM management group: password changing.
This module works in the following manner: if enabled, it first calls the Cracklib routine to check the strength of the password; if crack
likes the password, the module does an additional set of strength checks. These checks are:
Palindrome
Is the new password a palindrome of the old one?
Case Change Only
Is the new password the old one with only a change of case?
Similar
Is the new password too similar to old one?
Simple Is the new password too short?
Rotated
Is the new password a rotated version of the old password?
Already used
Was the password used in the past? Previously used passwords are to be found in /etc/security/opasswd.
OPTIONS
The following options may be passed to the module:
cracklib=<path to dictionaries>
Use cracklib library for password checks. This parameter also contains the path to the cracklib dictionaries. The default is
/usr/lib/cracklib_dict.
debug A lot of debug information is printed with syslog(3).
maxlen=number
Number of significant characters in the password for crypt(3). A value of zero suppresses this check. The default is 0.
minlen=number
The minimum number of characters in an acceptable password. A new password with fewer characters will be rejected. A value of zero
suppresses this check. The default is 5.
no_obscure_checks
No additional checks will be performed before a new password is accepted. Since the checks performed are fairly simple, their usage
is recommended.
not_set_pass
If this option is given, pam_pwcheck will not make the new password available for other modules.
nullok Normally the account is disabled if no password is set or if the length of the password is zero. With this option you can allow the
user to change his password for such accounts. This option does not overwrite a hardcoded default by the calling process.
tries=number
Maximum number of attempts to change a password if the new ones are rejected because they are too easy.
use_authtok
Set the new password to the one provided by the previously stacked password module. If this option is not set, pam_pwcheck will ask
the user for the new password.
use_first_pass
By default pam_pwcheck tries to get the authentication token from a previous module. If no token is available, the user is asked
for the old password. With this option, pam_pwcheck aborts with an error if no authentication token from a previous module is
available.
remember=XX
Remember the last XX passwords and do not allow the user to reuse any of these for the next XX password changes. XX is a number
between 1 and 400.
enforce_for_root
If this option is set, most of the password check rules are enforced for root, too. Never use this option if you don't know what
you are doing, since it could be as result that root is no longer allowed to login at all.
FILES
/etc/security/opasswd
SEE ALSO
passwd(1), pam.conf(8), pam.d(8), pam(8), rpasswd(1), rpasswdd(8), rpc.yppasswdd(8), yppasswd(1)
pam_pwcheck September 2008 pam_pwcheck(8)