If you want it to persist through password changes then script it and put it in roots crontab with all users that you want to not be required to change their passwords. Something like this. As far as i know there is no other way to do it, but i may be wrong.
I have a script running as a cron job in machine A . This script ftps some files everyday from machine A to machine B, and mails me about the status. It works fine for some days....and suddenly stops running. By viewing the log files, I see that the script itself was not invoked by cron on those... (4 Replies)
I could not find an entry for my linux user account in /etc/passwd file. I can remember some time back one of my SA showed the entry line using some other command. Can someone please help me on this to view the details of my linux user account? (3 Replies)
i wonder if there is a tool to read the /etc/passwd or /etc/shadow files in order to reset user accounts to the same one.
By moving (restore) all filessytem and data to another same Sun box, none of the users are able to logon to the new box which i didn't change nothing. But if i reset the user... (1 Reply)
I'm trying to make this work, and it half works. Accounts with password hashes matching the old crypt(3) algorithm work just fine:
JUpfW/w6jo6aw
But accounts with longer password hashes preceded by $1$, such as the following, do not work:
$1$iIcbppdP$HDyjJeVMGgJ.ovLsnjtTR.... (0 Replies)
how unix users able to change their password even if they have only read permissions and how backend process will be happening can u explain me which are files need to involved in this process (3 Replies)
Hi , can anyone explain me the difference between /etc/shadow and /etc/default/passwd . As per my knowledge both the files are used for password aging and control parameters. (2 Replies)
hi, all
I just started on new box where I have to diff passwd working perfectly on the very same account/user. I see that shadow was added recently (I'm not a root in there), I see 'x' in passwd. Not sure how it should work, should I change old passwd for one defined in shadow? Or it's fine to... (20 Replies)
Hi all..
I moved the /etc/shadow and /etc/shadow files to /tmp and then rebooted my PARC machine running 5.10. I did it to see if I could recover from single user mode.
But, I forgot to enable the abort key-sequence which I earlier disabled.
Stuck!
One of my gurus told I had to... (9 Replies)
Hi,
I have a Solaris 10 box where password aging is not functioning properly. Using the passwd command with the -l or -u options causes the lastchg field in the /etc/shadow file to be modified. Therefore, if a user's password is set to expire in 90 days and they are 1 day away, all they have... (4 Replies)
Discussion started by: cschar
4 Replies
LEARN ABOUT ULTRIX
su
su(1) General Commands Manual su(1)Name
su - substitute a user ID
Syntax
su [username]
su - [username]
su -f [username]
Description
The command requests the password of the specified username. If the correct password is given, changes to that username without changing
the current directory. The user environment is unchanged except for HOME and SHELL which are taken from the password file entry for user-
name. The shell that is run is also taken from the password file entry for username. The new user ID stays in force until the shell
exits.
If no username is specified, `root' is assumed. To remind the superuser of his responsibilities, the shell substitutes `#' for its usual
prompt.
Options-f Prevents from executing the .cshrc file, making start up faster.
- Simulates a full login.
Diagnostics
Sorry
An invalid password was supplied for the specified username.
Unknown login: username
The specified username was not found in the passwd database.
No directory
The home directory for the username is not accessible at this time (only with ``-'' argument).
No shell
The shell specified in the passwd database entry for username could not be executed.
Kerberos initialization failure
Consult your system administrator.
If enhanced security features are enabled the following error messages are also possible:
Requires secure terminal
Attempt to su to UID 0 on a line that is not marked secure in
User's password has expired
Access is denied because the password for username is expired.
This account is disabled
Access is denied because the auth entry corresponding to username is marked disabled.
Files
Log file of anyone who became
root, with a date mark.
See Alsocsh(1), sh(1), passwd(5yp), environ(7), edauth(8)
Security Guide for Administrators
Security Guide for Users
su(1)