Hi,
I am setting password complexity in SLES 11. I am able to do most of things
Code:
pam-config -d --pwcheck
pam-config -a --cracklib
pam-config -a --cracklib-minlen=8
pam-config -a --cracklib-dcredit=-1
pam-config -a --cracklib-ocredit=-1
pam-config -a --pwhistory
pam-config -a --pwhistory-remember=5
But need help in setting up two parameters except two
- I need to make 1 alpha as compulsury while setting password.
- I need to set account lock out setting to 4.
Can anybody tell me how can I create an account without having to enter the password after editing the vipw file. I mean the system should automatically take care of the password encryption in the shadow file and I don't to enter the password again and the Account should be ready to go.
... (3 Replies)
I would like to change the password requirements for all our AIX 5.2 logins but am having trouble finding a place where I can set the rules for everyone at the same time. I know I can go user by user in smit passwords but is there a way to create rules for everyone at the same time?
Thanks,... (2 Replies)
Hi,
I am looking for a simple way to :
- force the user to change his password following the first connexion
- check the complexity of a password (password should has a least 8 characters with 1 special char and 1 alpha...).
Thinks for your help (1 Reply)
Hi:
Could I set the:
- Login Time-out Interval
- Password History Count
- Lockout Duration
- Lockout Threshold
for user account in Sun Solaris 5.8.
Thanks for your help (6 Replies)
Hi,
I have installed open ldap according to the order from this video:
YouTube - bowendenning's Channel
sudo apt-get install slapd
sudo apt-get install ldap-utils
sudo apt-get install phpldapadmin
The installaion was good.
However it did NOT ask from me any password.
After I enter to... (0 Replies)
In AIX 5.3 tech level 11:
I want to setup a default password policy to have at least one
of each of the following: alpha character, numeric character, and "special"
character ("!", "&", etc).
The smitty Security and Users --> Passwords --> System Password
Policy screen only offers "MIN... (2 Replies)
Can anyone kindly explain to me the meaning of the default values of the code below please?
Thank you very much
#MINDIFF=3
#MINALPHA=2
#MINNONALPHA=1
#MINUPPER=0
#MINLOWER=0
#MAXREPEATS=0
#MINSPECIAL=0
#MINDIGIT=0
#WHITESPACE=YES (1 Reply)
Hi All,
I have a problem setting the password when I have to create a user and password as detailed below.
username : gaacj01 password : oshopp01
username : gaacj02 password : oshopp02
username : gaacj03 password : oshopp03
username : gaacj04 password : oshopp04
username : gaacj05 ... (17 Replies)
I need to set password compliance for some servers in my company.
However, the requirements are that we need to set different password policies for 3 different user groups within the company. These are :
System Users: i.e root, etc
Batch/Application Users: oracle, bscs, etc
Standard User:... (0 Replies)
I have been trying to enable password complexity variables on Solaris 10 by editing the /etc/default/passwd file but none of my changes are taking effect (I'm still able to set passwords that violate the rules I am trying to implement).
I've tried an O/S reboot after the changes but that had no... (6 Replies)
Discussion started by: triggerhippie
6 Replies
LEARN ABOUT DEBIAN
lsh-pam-checkpw
LSH-PAM-CHECKPW(8) lsh manuals LSH-PAM-CHECKPW(8)NAME
lsh-pam-checkpw - program to check a PAM username/password combination
SYNOPSIS
lsh-pam-checkpw username-to-check
DESCRIPTION
This manual page documents briefly the lsh-pam-checkpw command. This manual page was written for the Debian distribution because the orig-
inal program does not have a manual page. Instead, it has documentation in the GNU Info format; see below.
lsh-pam-checkpw is a program that checks if a username and password combination is valid for login by doing a PAM lookup. It is designed to
be used as a password helper program for lshd (8), (eg. --password-helper=/usr/sbin/lsh-pam-checkpw.
lsh-pam-checkpw takes one required argument, which is the username, and reads the password from stdin, then returns 0 if the password is
valid, or 1 otherwise. Note that the password must be supplied exactly, ie. there must be no newline after the password, so if invoking
from a shell, just type "<your-password><CTRL-D>".
SEE ALSO lsh(1), lshd(8). The programs are documented fully by Lsh, available via the Info system.
AUTHOR
This manual page was written by Timshel Knoll <timshel@debian.org>, for the Debian GNU/Linux system (but may be used by others).
lsh-pam-checkpw Jul 05 2002 LSH-PAM-CHECKPW(8)