How to login with other set of credentials while remote logging?
Below is the code.
I need to login into the router if the 1st set of credentials are correct..
if wrong... then it has to check with 2nd set of credentials..
=> if the credentials are correct... then it should continue..
=> if the credentials are wrong(should not check for 2nd time... then it should check with other set of credentials(mentioned in the program..
Could anyone please help ...
---------- Post updated 04-25-13 at 05:57 AM ---------- Previous update was 04-24-13 at 08:58 AM ----------
Could anyone please help me on this ?
Thanks in advance...
Regards,
J
---------- Post updated at 05:57 AM ---------- Previous update was at 05:57 AM ----------
Hello again!
When I log in to my computer (Ultra 5 running Solaris 8) from a pc (FTP or Telnet) I have to wait forever (about 30 seconds) before I can log in. Is this some kind of security thing? Can I turn it of? How?
Anders (8 Replies)
Hi,
I want to log-in to a remote server using shell script.
The server requires the following while allowing a connection:
username
password
one - letter authorisation.
How can i implement this in my script?
thanks,
abey (6 Replies)
Hi All,
I am using a script for remotely logging into a rhost using telnet and shutdown a server. The script is as follows.
IP = 10.24.12.23; export IP
UNAME = username ; export UNAME
PWD = password; export PWD
CRDIR = /etc/rc.d/init.d ; export CRDIR
echo "logging into remote... (4 Replies)
how to login with ssh to remote system with out applying the remote root/user password
with rlogin we can ujse .rhosts file
but with ssh howits possible
plz guide (2 Replies)
Holla!
Sorry to spam the board with all my Solaris 2.6 questions (I just found this forum). My most recent problem is that not ALL failed log-ins are getting logged in /var/log/authlog. It seems to work fine for the "su" command from a non-root user, but the actual "login" command or a desktop... (4 Replies)
Hello,
I am trying to write log from sco box to a remote host.
We already have that setting working for linux server using syslog.
With this setting(on LINUX)
*.* @remote-host for sco I have this
*.debug /usr/adm/syslog
*.* ... (3 Replies)
If I run the below code... it will login into the router and then changes to privilege mode and then stores the running configuration information to an array.
In this program, I have included the username and password .
In case the username and password is wrong.. it will re login for 2 times... (0 Replies)
I am trying to put the below in a file .vimrc and sourced the file, however when i vi any file it is not showing/reflecting color scheme i wanted, Is there any way i can make this work? we use common application account to log in and by default it is CSH and later we change the shell to KSH. I want... (3 Replies)
Hi there,
I am sorry to ask that kind of beginner thing, but all the code I found online didnt work for me.
All I want to do is: Check via SSH if a File exists on my webserver. The SSH login has to be with username and password.
So I would be very thankful if somebody could write the line.... (8 Replies)
Discussion started by: Jens885544
8 Replies
LEARN ABOUT CENTOS
pam_setcred
PAM_SETCRED(3) Linux-PAM Manual PAM_SETCRED(3)NAME
pam_setcred - establish / delete user credentials
SYNOPSIS
#include <security/pam_appl.h>
int pam_setcred(pam_handle_t *pamh, int flags);
DESCRIPTION
The pam_setcred function is used to establish, maintain and delete the credentials of a user. It should be called to set the credentials
after a user has been authenticated and before a session is opened for the user (with pam_open_session(3)). The credentials should be
deleted after the session has been closed (with pam_close_session(3)).
A credential is something that the user possesses. It is some property, such as a Kerberos ticket, or a supplementary group membership that
make up the uniqueness of a given user. On a Linux system the user's UID and GID's are credentials too. However, it has been decided that
these properties (along with the default supplementary groups of which the user is a member) are credentials that should be set directly by
the application and not by PAM. Such credentials should be established, by the application, prior to a call to this function. For example,
initgroups(2) (or equivalent) should have been performed.
Valid flags, any one of which, may be logically OR'd with PAM_SILENT, are:
PAM_ESTABLISH_CRED
Initialize the credentials for the user.
PAM_DELETE_CRED
Delete the user's credentials.
PAM_REINITIALIZE_CRED
Fully reinitialize the user's credentials.
PAM_REFRESH_CRED
Extend the lifetime of the existing credentials.
RETURN VALUES
PAM_BUF_ERR
Memory buffer error.
PAM_CRED_ERR
Failed to set user credentials.
PAM_CRED_EXPIRED
User credentials are expired.
PAM_CRED_UNAVAIL
Failed to retrieve user credentials.
PAM_SUCCESS
Data was successful stored.
PAM_SYSTEM_ERR
A NULL pointer was submitted as PAM handle, the function was called by a module or another system error occured.
PAM_USER_UNKNOWN
User is not known to an authentication module.
SEE ALSO pam_authenticate(3), pam_open_session(3), pam_close_session(3), pam_strerror(3)Linux-PAM Manual 09/19/2013 PAM_SETCRED(3)