Sponsored Content
Full Discussion: Multi-factor authentication
Operating Systems HP-UX Multi-factor authentication Post 302772727 by DGPickett on Tuesday 26th of February 2013 02:57:58 PM
Old 02-26-2013
Why would trusted mode be different? It still lets users in with password to specified shell, if so configured, I expect, already, usually.
 

7 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

My partition disappeared!!!! URGENT!! (newbie factor)

I just inst freeBSD boot installation and it didnt work for(probably my lack of knowledge) reasons but i now have to partitions in freeBSD and i really need them back for windows at the moment. i just cant find them. The bad thing is that i only got this bundled version of windows so i cant really... (2 Replies)
Discussion started by: riwa
2 Replies

2. AIX

chvg -t (factor size) - risk?

have machine running AIX 4.3.3ML 11. It's rootvg has about 1GB of space available and is made up of 2 9GB drives. We are going to upgrade it to AIX 5.x but wanted more disk space for the upgrade. So was going to install 2 new 18GB drives. The plan was to bring the 2 18GB drives in as hdisk# and... (2 Replies)
Discussion started by: spattson
2 Replies

3. UNIX for Dummies Questions & Answers

factor [start[stop]

Another question for you guys! This is so fun. So I am playing around with the factor operation. I read in "man factor" that you can actually print a list of primes in between a range, using the syntax factor ] However, every time I enter two values, it just returns the factored value.... (1 Reply)
Discussion started by: statichazard
1 Replies

4. Shell Programming and Scripting

How to substract selective values in multi row, multi column file (using awk or sed?)

Hi, I have a problem where I need to make this input: nameRow1a,text1a,text2a,floatValue1a,FloatValue2a,...,floatValue140a nameRow1b,text1b,text2b,floatValue1b,FloatValue2b,...,floatValue140b look like this output: nameRow1a,text1b,text2a,(floatValue1a - floatValue1b),(floatValue2a -... (4 Replies)
Discussion started by: nricardo
4 Replies

5. Shell Programming and Scripting

shell, read table and write the value for each factor to output

Hey guyz, I have a table like this: 1 A=#;B=#;C=# 2 A=#;C=#;D=#;E=#;E=# 3 B=#;B=#;B=#;D=# # are just some numbers. I want to have the output like this: * 1 2 3 A # # NA B # NA # C # # NA D NA # # E NA # NA So basically, I wanna know in each of the rows in my input (which... (9 Replies)
Discussion started by: @man
9 Replies

6. Shell Programming and Scripting

Help on writing data from 2 different files to one based on a common factor

Hello all, I have 2 text files. For example: File1.txt contains data A B C D ****NEXT**** X Y Z ****NEXT**** L M N and File2.txt contains data (13 Replies)
Discussion started by: vat1kor
13 Replies

7. Cybersecurity

Two Factor Authentication – Best for the UNIX/Linux Server Security

The UNIX/Linux server security is challenging because these servers are at a risk of getting compromised at any point of time by the attackers. In today's enterprise environment, the UNIX and Linux servers are growing popular. With their increased popularity, these servers have become the primary... (1 Reply)
Discussion started by: reve-secure
1 Replies
pwconv(1M)																pwconv(1M)

NAME
pwconv - install, update or check the /etc/shadow file SYNOPSIS
DESCRIPTION
The command installs or appends with information from or checks for any discrepancies between the contents of the two files. The command without options does the following: 1. Creates the file if it does not exist; otherwise, it removes all entries for usernames which are not present in 2. For each entry in move the encrypted password and aging information to Entries in which have no encrypted password or aging information will not overwrite information in 3. Writes an "x" in each password field of the file, to indicate that the password and aging information reside in the file. The command relies on a special value of "x" in the password field of A value different from "x" will prompt to move the password and aging information into the corresponding fields of and then replace the password field in with an "x". If no aging information exists in for a user, none will be added to However, the last change field, which indicates when the password was last modified, will always be updated (default is current date). See shadow(4). Options The following options are recognized: Verbose output. Test mode. prints error information but does not modify nor Notes The command can only be used by the superuser. HP recommends running before See pwck(1M). A system which has been converted to a trusted system has no file. In this case, can be used with no options to update the secure password facility to reflect any changes made in the file. RETURN VALUE
exits with one of the following values: Successful completion. Conversion error occurred. WARNINGS
HP-UX 11i Version 3 is the last release to support trusted systems functionality. FILES
system password file shadow password file secure password facility SEE ALSO
pwck(1M), pwunconv(1M), passwd(4), shadow(4). pwconv(1M)
All times are GMT -4. The time now is 09:26 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy