11-02-2012
I thought new users were given an expired password date, and that is why they have to change their pw, part of a security model that protects the admin, as the password the admin gives out is not usable except to set a new one.
10 More Discussions You Might Find Interesting
1. Solaris
Here's the issue. Currently when I run passwd -f "username" on any account, when I try to login with said account I don't get prompted to change my password I just keep getting prompted to input a password. (Of course this works just fine with telnet)Is there something i need to add to... (7 Replies)
Discussion started by: woodson2
7 Replies
2. Solaris
Hi Solaris's expert
I need to change user password on Solaris10 2 servers.
With the same password I can change it just only one.
Try to check everything but not found difference??
password pattern: abcdeFgh9Jk
server1 check all characters but server2 check only first 8 characters.Why??... (10 Replies)
Discussion started by: arm_naja
10 Replies
3. UNIX for Dummies Questions & Answers
Hi, on a lab computer another user (who is a sudoer) changed my password without my permission. I'm pretty positive it was her, though I can't conclusively prove it. I had my friend, who is another sudoer on the machine, fix it and make me a sudoer now too.
So everything is fine, but I want... (0 Replies)
Discussion started by: declannalced
0 Replies
4. Red Hat
Hi,
I am running NIS server on redhat linux 5 and I want to implement password restrictions for the yppasswd, how can I do it.Please help me.
I can implement password restriction for passwd by configuring /etc/pam.d/system-auth and setting crack_lib.so but I don't know how to implent the same... (3 Replies)
Discussion started by: ktrimu
3 Replies
5. Solaris
hi folk,
i try to setup a new password policy for our solaris box user, below are the /etc/default/passwd/, but then when i tried to create a user, it didn't ask for numeric character, and the new password also didn't ask for special characters.
# useradd testing
# passwd testing
New... (7 Replies)
Discussion started by: dehetoxic
7 Replies
6. Ubuntu
Hi linux expert,
i would like to create a script for listing all user with there password policy. It should be in the following format:
Last password change : Sep 19, 2011
Password expires : never
Password inactive : never
Account... (2 Replies)
Discussion started by: yprudent
2 Replies
7. SuSE
Hi,
I use a software which can create account on many system or application.
One of resource which is managed by this soft his a server SUSE Linux Enterprise Server 10 (x86_64). patch level 3.
This application which is an IBM application use ssh to launch command to create account in... (3 Replies)
Discussion started by: scabarrus
3 Replies
8. AIX
I need help. I have set a password policy. But I want to dis allow setting user name as password.
My policy is as below...
min length =8
min diff=2
min alpha=2
max repeats=2
dictionary= /usr/share/dict/words
Still user can set his username as password (i.e. Jackie1234).
Code tags for... (11 Replies)
Discussion started by: powerAIX
11 Replies
9. Linux
Hi
We have a requirement to vary the minimum password criteria by the group to which a user belongs.
For example a standard user should have a password with a minimum length of 12 and containing a mix of characters whereas an administrator should have a password with a minimum length of 14... (1 Reply)
Discussion started by: gregsih
1 Replies
10. Red Hat
Hi,
I am unable to enforce password complexity policy for root user. (other users are working) on RHEL 6.2. Anything wrong with system-auth parameters? PLease help..
vi /etc/pam.d/system-auth
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time... (1 Reply)
Discussion started by: suresh3566
1 Replies
KTUTIL(8) BSD System Manager's Manual KTUTIL(8)
NAME
ktutil -- manage Kerberos keytabs
SYNOPSIS
ktutil [-k keytab | --keytab=keytab] [-v | --verbose] [--version] [-h | --help] command [args]
DESCRIPTION
ktutil is a program for managing keytabs. Supported options:
-v, --verbose
Verbose output.
command can be one of the following:
add [-p principal] [--principal=principal] [-V kvno] [--kvno=kvno] [-e enctype] [--enctype=enctype] [-w password] [--password=password] [-r]
[--random] [-s] [--no-salt] [-H] [--hex]
Adds a key to the keytab. Options that are not specified will be prompted for. This requires that you know the password or the
hex key of the principal to add; if what you really want is to add a new principal to the keytab, you should consider the get
command, which talks to the kadmin server.
change [-r realm] [--realm=realm] [--a host] [--admin-server=host] [--s port] [--server-port=port]
Update one or several keys to new versions. By default, use the admin server for the realm of a keytab entry. Otherwise it will
use the values specified by the options.
If no principals are given, all the ones in the keytab are updated.
copy keytab-src keytab-dest
Copies all the entries from keytab-src to keytab-dest.
get [-p admin principal] [--principal=admin principal] [-e enctype] [--enctypes=enctype] [-r realm] [--realm=realm] [-a admin server]
[--admin-server=admin server] [-s server port] [--server-port=server port] principal ...
For each principal, generate a new key for it (creating it if it doesn't already exist), and put that key in the keytab.
If no realm is specified, the realm to operate on is taken from the first principal.
list [--keys] [--timestamp]
List the keys stored in the keytab.
remove [-p principal] [--principal=principal] [-V -kvno] [--kvno=kvno] [-e -enctype] [--enctype=enctype]
Removes the specified key or keys. Not specifying a kvno removes keys with any version number. Not specifying an enctype removes
keys of any type.
rename from-principal to-principal
Renames all entries in the keytab that match the from-principal to to-principal.
purge [--age=age]
Removes all old versions of a key for which there is a newer version that is at least age (default one week) old.
SEE ALSO
kadmin(8)
HEIMDAL
April 14, 2005 HEIMDAL