08-18-2011
Hi Zaxxon - The doubt was regarding login class of a particular user in Unix. Using Java I need to update this (which is not an issue).
It should be some user parameter like user's home directory OR password etc... Have you heard this (login class) in Unix?
10 More Discussions You Might Find Interesting
1. HP-UX
Dear All,
how to check the unix log file which mean how many(who) user has been log in the server for the day, when they log in & when they log out? (8 Replies)
Discussion started by: whl123
8 Replies
2. SCO
We have made numerous requests to our system administrator to add new employees at login screen ( passwords not required ) to no avail.
I can login into root but not sure how to proceed from there.
We have a 10 yr. old version of SCO
Can anyone help?
I know very few unix commands okay... (1 Reply)
Discussion started by: houseostyle
1 Replies
3. Solaris
I get the following error when running /usr/bin/ps on Solaris 10 as a particular non-privileged user:
ld.so.1: ps: fatal: /usr/dt/lib/libXm.so.3: wrong ELF class: ELFCLASS32
Killed
However I can run /usr/bin/ps successfuly as root or as any other non-privileged user. What could it be about this... (5 Replies)
Discussion started by: aussieos
5 Replies
4. Programming
Is is possible to make STL-Iterator to work with user defined class ,like the one below?
#include <iostream>
#include <stdexcept>
using namespace std;
template <class T>
class Array
{
public:
T& operator (unsigned i) throw(out_of_range)
{ return data_; }
protected:
... (2 Replies)
Discussion started by: johnbach
2 Replies
5. Solaris
Hello World ~
HW : SUN Fire V240
OS : Solaris 8
Error message prompts 'rmclomv ... SC login failure ...' on terminal.
and
Error Message prompts continually 'SC Login Failure for user Please login:' on Single Mode(init S)
The System is in normal operation, though
In case of rain, Can... (1 Reply)
Discussion started by: lifegeek
1 Replies
6. UNIX for Advanced & Expert Users
Hello,
I created a user in my AIX 5.3 system and i modified /etc/passwd file in and assigned this user the uid=0 like root user.
The problem is that when this user log into the system through putty it asks for root password instead of the user password.
As a result of this, if i reset the... (4 Replies)
Discussion started by: omonoiatis9
4 Replies
7. Programming
I have a program that accepts user input. For example I have mdacc that the user sets the value. I then have a class which stores the value set by the user. I use set_param to set the values in the class. I pass through it the list of user defines arguments from argv. What would be the opinion on... (0 Replies)
Discussion started by: kristinu
0 Replies
8. Shell Programming and Scripting
Hi Every body,
I would need a shell script program to login as different user and perform some copy commands in the script.
example: Supppose ora_toms is the active user
ora_toms should be able to run a script where user: ftptomsp pass: XXX should login through and run the commands
... (9 Replies)
Discussion started by: ujjwal27
9 Replies
9. AIX
I want to learn AIX. I would like to find someone who would be willing to give me a login to their AIX home lab server. My intent is to poke around and discover the similarities and differences of AIX compared to other *NIXs.
I am a UNIX admin so I can think of what some immediate concerns may... (1 Reply)
Discussion started by: perl_in_my_shel
1 Replies
10. Shell Programming and Scripting
Hi.
I inject my tracklogin.sh script in the profile of each user.
$ more .profile
./tracklogin.sh
# This is the default standard profile provided to a user.
MAIL=/usr/mail/${LOGNAME:?}
bash-3.2$ more tracklogin.sh
#!/bin/bash
tdate=$(date +"%d%m%y")
mkdir -p /tmp/root_log... (20 Replies)
Discussion started by: mohtashims
20 Replies
CHPASS(1) General Commands Manual CHPASS(1)
NAME
chpass - add or change user database information
SYNOPSIS
chpass [ -a list ] [ user ]
DESCRIPTION
Chpass allows editing of the user database information associated with user or, by default, the current user. The information is formatted
and supplied to an editor for changes. The vi editor will be used unless the environmental variable EDITOR selects an alternate editor.
When the editor terminates, the information is re-read and used to update the user database itself. Only the user, or the super-user, may
edit the information associated with the user.
Only the information that the user is allowed to change is displayed.
Possible display items are as follows:
Login: user's login name
Password: user's encrypted password
Uid: user's id
Gid: user's login group id
Change: password change time
Expire: account expiration time
Class: user's general classification
Home Directory: user's home directory
Shell: user's login shell
Full Name: user's real name
Location: user's normal location
Home Phone: user's home phone
Office Phone: user's office phone
The login field is the user name used to access the computer account.
The password field contains the encrypted form of the user's password.
The uid field is the number associated with the login field. Both of these fields should be unique across the system (and often across a
group of systems) as they control file access.
While it is possible to have multiple entries with identical login names and/or identical user id's, it is usually a mistake to do so.
Routines that manipulate these files will often return only one of the multiple entries, and that one by random selection.
The group field is the group that the user will be placed in upon login. Since this system supports multiple groups (see groups(1)) this
field currently has little special meaning. This field may be filled in with either a number or a group name (see group(5)).
The change field is the date by which the password must be changed.
The expire field is the date on which the account expires.
Both the change and expire fields should be entered in the form ``month day year'' where month is the month name (the first three charac-
ters are sufficient), day is the day of the month, and year is the year.
The class field is currently unused. In the near future it will be a key to a termcap(5) style database of user attributes.
The user's home directory is the full UNIX path name where the user will be placed on login.
The shell field is the command interpreter the user prefers. If the shell field is empty, the Bourne shell (/bin/sh) is assumed.
When altering a login shell, and not the super-user, the user must select an approved shell from the list in /etc/shells.
The last four fields are for storing the user's full name, office location, and home and work telephone numbers.
The super-user is also allowed to directly supply a user database entry, in the format specified by passwd(5), as an argument to the -a
option. This argument must be a colon (``:'') separated list of all the user database fields, although they may be empty.
Once the information has been verified, chpass uses mkpasswd(8) to update the user database. This is run in the background, and, at very
large sites could take several minutes. Until this update is completed, the password file is unavailable for other updates and the new
information will not be available to programs.
FILES
/etc/master.passwd The user database /etc/shells The list of approved shells
SEE ALSO
login(1), finger(1), getusershell(3), passwd(5), mkpasswd(8), vipw(8)
Robert Morris and Ken Thompson, UNIX password security
BUGS
User information should (and eventually will) be stored elsewhere.
4th Berkeley Distribution March 12, 1989 CHPASS(1)