06-06-2011
what about /etc/security/login.cfg. has it been changed? The first error appears to be related to this file and the rest are probably just a consequence of the failure of that one.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
hi, i am on aix. i used smitty to remove a user..
but then found that its directory still exists....
so i have to remove the directory manually...
am i doing it the right way? (2 Replies)
Discussion started by: yls177
2 Replies
2. UNIX for Advanced & Expert Users
Hi all,
I am using Sun Solaris 9 .In this system normal users unable to create files from the command line.I added these users in bin,adm and even root group i found them unable to create a file. (1 Reply)
Discussion started by: mallesh
1 Replies
3. UNIX for Dummies Questions & Answers
I created a user, i login as a root. I add him in the group where he can access and login as a root! I checked it in users' list and in group's list, he is there. My problem is this, I cant login using the username/account I just created! What should i do to use and login the user/account i've just... (5 Replies)
Discussion started by: jerome
5 Replies
4. AIX
Hello
I need to make a mksysb, I try with smitty but I get the next message
0512-017 mksysb: Cannot write to the device /dev/rmt3.
Either write protected or in use.
My tape are ready to write ( dont get protection)
I use the clean tape
and I try with other tapes but I... (6 Replies)
Discussion started by: lo-lp-kl
6 Replies
5. AIX
Hello everyone
I have a question.
Its possible to type smitty mksysb using sudo ?
I have a partition and install sudo I create a user for use sudo.
I make a test with sudo and command line for the mksysb and its ok
sudo mksysb -i /dev/rmt0 and I can make my mksysb.
My question... (1 Reply)
Discussion started by: lo-lp-kl
1 Replies
6. Ubuntu
Hi,
Anyone can help me on how to duplicate privileges and group for useroradb01 to userrootdb01. I have currently using "useroradb01" and create a newly user "userrootdb01".
I want both in the sames privileges and group. Please see the existing users list below;
drwxr-xr-x 53 useroradb01... (0 Replies)
Discussion started by: fspalero
0 Replies
7. Homework & Coursework Questions
first off let me introduce myself. My name is Eric and I am new to linux, I am taking an advanced linux administration class and we are tasked with creating a script to add new users that anyone can run, has to check for the existence of a directory. if the directory does not exist then it has... (12 Replies)
Discussion started by: pbhound
12 Replies
8. AIX
Hello,
in which situations should I use smitty alt_mksysb ? What is the general purpose of this tool.
Thanks for help,
p (1 Reply)
Discussion started by: pitmod
1 Replies
9. Shell Programming and Scripting
What I'm trying to do is write a script in Perl to find a user and if that user exist it would print "User Exist, Pls Try Again". If The user doesn't exist I'm able to create a user with a password.
Any suggestions? (3 Replies)
Discussion started by: GoBoyGo
3 Replies
10. UNIX for Advanced & Expert Users
Hi All,
Im new in aix, anyone can advice is there any way to understand smitty ?:confused:
Thanks.
TCP. (4 Replies)
Discussion started by: tcp01315
4 Replies
LEARN ABOUT HPUX
d_passwd
dialups(4) Kernel Interfaces Manual dialups(4)
NAME
dialups, d_passwd - dialup security control
DESCRIPTION
and are used to control the dialup security feature of (see login(1)). If is present, the first word on each line is compared with the
name of the line upon which the login is being performed (including the as returned by (see ttyname(3C)). If the login is occurring on a
line found in dialup security is invoked. Anything after a space or tab is ignored.
When dialup security is invoked, requests an additional password, and checks it against that found in The command name found in the ``pro-
gram to use as shell'' field of is used to select the password to be used. Each entry in consists of three fields, separated by colons.
The first is the command name, matching an entry in The second is the encrypted password to be used for dialup security for those users
logging in to use that program. The third is commentary, but the second colon is required to delimit the end of the password. A null
password is designated with two adjacent colons. The entry for is used if no other entry matches the command name taken from
FILES
dial-in tty lines
passwords
SEE ALSO
login(1), passwd(4).
dialups(4)