06-26-2014
Secman lockout
Greetings,
I work with a Solaris Sun Server V240 system (GCCS) and have run into a problem where I can't seem to unlock my SECMAN account at the NON-GLOBAL level. I have access to all global accounts to include sysadmin and secman. I have access to the non-global sysadmin account and root (SU) throughout.
To date, I have tried to use the PASSWD command to reset the SECMAN password at both the global (using zlogin to get to the non-global level) and just logging in as sysadmin in the non-global level and working through a terminal window as SU to reset the password there. In ALL cases, even though the password reset implies it was successful, I am unable to log in as SECMAN in the non-global level using the new password.
Is there a way to create a new secman account in the terminal window within the non-global zone? Any help with this issue is greatly appreciated.
v/r Mike
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I am using AIx 4.3.3 and was wondering what the command was to keep users from logging in. I want to be able to do maintenance and keep the users out. Can anyone help? (7 Replies)
Discussion started by: cgillett
7 Replies
2. UNIX for Dummies Questions & Answers
Hi, I am extremely new to UNIX and was recently promoted to administer the system for a small company. Anyhow, the time came for passwords to change, and I made the huge mistake of entering in the command (as root)
passwd -l
After logging out (oblivious to what would happen next), the root... (4 Replies)
Discussion started by: newbieadmin
4 Replies
3. AIX
Hi,
We are using 4.3.3.0 and I would like to make a global change to the "number of failed logins before user account is locked"
Any ideas, other than using SMIT one user at a time.... ???
Thanks... Craig. (2 Replies)
Discussion started by: stumpy
2 Replies
4. AIX
I want to know if there is any easy way of stopping 1 user from using su? perferabily any su but I can make do with not allow him to su to root but allow other user to su to root. (3 Replies)
Discussion started by: daveisme
3 Replies
5. Red Hat
Hi all;
I m using Red Hat Enterprise Linux Server release 5.1 (Tikanga) and I'm trying to setup password lockout policy so that a user account locks out after 3 failed attempts.
Here are the entires of my /etc/pam.d/system-auth
#%PAM-1.0
# This file is auto-generated.
# User changes... (1 Reply)
Discussion started by: maverick_here
1 Replies
6. UNIX and Linux Applications
What is the best way to implement account lockout in openldap? I have an openldap server with Ubuntu desktop client connecting to it for authentication. I want he accounts to locked out after say 5 failed authentication attempts
I have enabled ppolicy layout in slapd.conf.
overlay ppolicy... (0 Replies)
Discussion started by: nitin09
0 Replies
7. Red Hat
On a redhat linux 4 server, how to find if there is an account lockout duration is set. Is it configured under pam or /etc/shadow? what entries I need to find out? Is it pam_time.so module?
I desperately need an answer because on one of the servers, no one was able to login through any account... (4 Replies)
Discussion started by: Tirmazi
4 Replies
8. Red Hat
having account lockout issues with an RHEL 5 server. My users are getting locked out for 10 minutes after one failed login attempt even though /etc/pam.d/sshd is configured for 5 failed attempts:
auth include system-auth
auth required pam_tally2.so deny=5 onerr=fail... (1 Reply)
Discussion started by: nerdalert
1 Replies
9. Red Hat
Good day. I have setup hardening the password (test system so far) prior to doing any work on production. Here is what I have set.
Snippet from /etc/pam.d/system-auth
auth required /lib/security/$ISA/pam_env.so
auth required /lib/security/$ISA/pam_tally.so... (3 Replies)
Discussion started by: smurphy_it
3 Replies
LEARN ABOUT OSX
dsenableroot
dsenableroot(8) BSD System Manager's Manual dsenableroot(8)
NAME
dsenableroot -- enables or disables the root account.
SYNOPSIS
dsenableroot [-d] [-u username] [-p password] [-r rootPassword]
DESCRIPTION
dsenableroot sets the password for the root account if enabling the root user account. Otherwise, if disable [-d] is chosen, the root
account passwords are removed and the root user is disabled.
A list of flags and their descriptions:
-u username
Username of a user that has administrative privileges on this computer.
-p password
Password to use in conjunction with the specified username. If this is not specified, you will be prompted for entry.
-r rootPassword
Password to be used for the root account. If this is not specified for enabling, you will be prompted for entry.
EXAMPLES
-dsenableroot
Your username will be used and you will be queried for both your password and the new root password to be set to enable the root
account.
-dsenableroot -d
Your username will be used and you will be queried for only your password to disable the root account.
-dsenableroot -u username -p userpassword -r rootpassword
The supplied arguments will be used to enable the root account.
-dsenableroot -d -u username -p userpassword
The supplied arguments will be used to disable the root account.
Mac OS August 08 2003 Mac OS