Basically you need to play with the options, to get what you want. But be advised that this is system wide change and you are allowing your users to keep weak passwords which is not at all recommended in a production environment.
There's a very good explanation on the options I stated above on the man page.
Hello,
I just finished adding a bunch of new users to the linux servers I administer. I add users either via command line or via linuxconf, but I can't seem to find out how to force users to change their passwords on their first login to the system.
Anyone know how to do that? My HP-UX... (1 Reply)
All,
I am unable to change a password for the user called : poller
I am logged in as root When I do the following command
passwd poller
New Password:
Permission denied
Whe i enter the new password, it gives the above error.
When i log in as poller and then execute the command, then... (2 Replies)
If we set up FTP only users who can't log in with a shell (/bin/false type of shell) and set them up with a default password, like abc123 or something not secure, is there any way for the user to change their own password once they get on the system? (2 Replies)
Hi!
I'm a bit noob on Unix/Linux world, so sorry any lame question i may make...
Oh.. and my english too.. is not so famous lol..
The deal is to use crontab to change my admin password every weak to something like "mypasswordcurrrentday" that is... i want evey weak to change my password but... (2 Replies)
I am trying to change a user's Password, but I get the error "Password Cannot be changed; see account Administrator". Yet I am logged in as root.
I also cannot access the Accounts Manager facility when SCO when using System Administration screen Error "Unable to get initial list of users" (2 Replies)
I am getting the following error message "passwd: User unknown: username" Permission denied error message when trying to change the password for that given user account.
The user account is within the /etc/passwd file and I can also su to the account without any problems. This is sever is not... (11 Replies)
I have logged into single user mode and
whenever i issue
passwd root
nothing happens the cursor simply returns back without asking new password.
what can be issue? (5 Replies)
Hello guys,
I'm currently working on replacing old server and it's migration from SuSe
SUSE Linux Enterprise Server 10 (x86_64)
VERSION = 10
PATCHLEVEL = 4
to the RedHat
Red Hat Enterprise Linux Server release 6.4 (Santiago)
Problem seems be in migration of users passwords,... (2 Replies)
Hi Gurus,
I am lpad user in some of my server. I need to change password at certain period time. I am wondering what is the command to change the passwd.
last time I asked my unix admin, they gave me a comand I chagned it. (I forgot to keep it in safe place, I lost it). this time when... (2 Replies)
hi
I am not able to change user password from root user.
although it is saying updated successfully.
but still I am not able to login direct to abc user.
however I can login from root user by using su - abc
# passwd abc
Changing password for user abc.
New password:
BAD PASSWORD: it... (2 Replies)
Discussion started by: scriptor
2 Replies
LEARN ABOUT DEBIAN
pam_pwcheck
pam_pwcheck(8) Reference Manual pam_pwcheck(8)NAME
pam_pwcheck - PAM module for password strength checking
DESCRIPTION
The pam_pwcheck is a PAM module for password strength checking. It makes additional checks upon password changes, but does not perform the
change itself. It only provides functionality for one PAM management group: password changing.
This module works in the following manner: if enabled, it first calls the Cracklib routine to check the strength of the password; if crack
likes the password, the module does an additional set of strength checks. These checks are:
Palindrome
Is the new password a palindrome of the old one?
Case Change Only
Is the new password the old one with only a change of case?
Similar
Is the new password too similar to old one?
Simple Is the new password too short?
Rotated
Is the new password a rotated version of the old password?
Already used
Was the password used in the past? Previously used passwords are to be found in /etc/security/opasswd.
OPTIONS
The following options may be passed to the module:
cracklib=<path to dictionaries>
Use cracklib library for password checks. This parameter also contains the path to the cracklib dictionaries. The default is
/usr/lib/cracklib_dict.
debug A lot of debug information is printed with syslog(3).
maxlen=number
Number of significant characters in the password for crypt(3). A value of zero suppresses this check. The default is 0.
minlen=number
The minimum number of characters in an acceptable password. A new password with fewer characters will be rejected. A value of zero
suppresses this check. The default is 5.
no_obscure_checks
No additional checks will be performed before a new password is accepted. Since the checks performed are fairly simple, their usage
is recommended.
not_set_pass
If this option is given, pam_pwcheck will not make the new password available for other modules.
nullok Normally the account is disabled if no password is set or if the length of the password is zero. With this option you can allow the
user to change his password for such accounts. This option does not overwrite a hardcoded default by the calling process.
tries=number
Maximum number of attempts to change a password if the new ones are rejected because they are too easy.
use_authtok
Set the new password to the one provided by the previously stacked password module. If this option is not set, pam_pwcheck will ask
the user for the new password.
use_first_pass
By default pam_pwcheck tries to get the authentication token from a previous module. If no token is available, the user is asked
for the old password. With this option, pam_pwcheck aborts with an error if no authentication token from a previous module is
available.
remember=XX
Remember the last XX passwords and do not allow the user to reuse any of these for the next XX password changes. XX is a number
between 1 and 400.
enforce_for_root
If this option is set, most of the password check rules are enforced for root, too. Never use this option if you don't know what
you are doing, since it could be as result that root is no longer allowed to login at all.
FILES
/etc/security/opasswd
SEE ALSO passwd(1), pam.conf(8), pam.d(8), pam(8), rpasswd(1), rpasswdd(8), rpc.yppasswdd(8), yppasswd(1)pam_pwcheck September 2008 pam_pwcheck(8)