02-12-2015
My HP-UX is 11.11
![Embarrassment Smilie](https://www.unix.com/images/smilies/redface.gif)
and stores files in
/tcb/files/auth with the various details you are after. The values are stored in seconds since the Epoch (00:00:00 on 1/1/1970)
The problem you will have is that without superuser access, you are not considered trustworthy enough to know this information.
One wonders why you need to know anyway. Can you enlighten us?
Regards,
Robin
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
Anyone know the command which identifies how long a user has before their password expires?
I also need to know how I would write and expr to calculate the difference between 2 dates.
e.g. 28/03/05 - 18/03/05 = 10
I was told there is a date function which shows you no of days since... (1 Reply)
Discussion started by: sureshy
1 Replies
2. HP-UX
We are trying to implement an Password Aging system that will force UNIX Accounts to change their passwords every 3 mons or so. This will be done my our Server Support Provider.
We want to identify UNIX IDs that connects to our server via ftp,scp,sftp and other special connection protocols. IN... (2 Replies)
Discussion started by: tads98
2 Replies
3. Solaris
Hello
can anyone explain where can be found logic for user password expiration on solaris as well as on reliant UNIX??
there is not much help of /etc/security directory..does not exist!
any help? (3 Replies)
Discussion started by: abdulaziz
3 Replies
4. Linux
Hi All,
I have this user on my /etc/shadow:
mysql:$1$vmw4r078$4.lp6z2s0KJYHKXTuPG2x0:13556:0::12:::
The 5 column is blank. Does it mean the user has no password expiration.
Thanks in advance for any idea. (1 Reply)
Discussion started by: itik
1 Replies
5. Solaris
Hi,
How to check user account expiration account in user mode for SunOS 5.10?
In Linux I can use chage command.
I googled for answer for the problem but it was useless.
Oskar (9 Replies)
Discussion started by: oskard
9 Replies
6. Shell Programming and Scripting
Hi All,
Can anybody help me, to find the command to check for the password expiry date for the hp servers.
Thanks,
Deepak (3 Replies)
Discussion started by: dswain
3 Replies
7. AIX
Hi guys,
A simple question. which mecanism send an email to an unix user for the expiration of his password?
Thank you! (4 Replies)
Discussion started by: Chapel
4 Replies
8. UNIX for Advanced & Expert Users
Hello,
I want to write a script to check for the password expiration date in each server for the user by logging to each server and notify user through mail. If password is about to expire or if already expired , it should also be notified to user by mail. Any help or idea to build this will be... (1 Reply)
Discussion started by: baraghun
1 Replies
9. AIX
Hi Admins,
AIX 5.3
I know maxage value tells the system about password expiration policy.
One of the user's maxage is 5 weeks.But he changed the password long backup at 2008 according to lastupdate value.
Since maxage is 5, the password should expire every 5 weeks.But how come... (4 Replies)
Discussion started by: newaix
4 Replies
10. Ubuntu
Hello Team,
I am using Lubuntu & have DRBL remote boot setup with open Ldap authentication. Currently there is no password expire policy. I want to set Password Policy so that user's password will expire after a month & they will get prompt to change their password.
Using PAM we can do it,... (1 Reply)
Discussion started by: paragnehete
1 Replies
LEARN ABOUT OSF1
db_recover
db_recover(8) System Manager's Manual db_recover(8)
NAME
db_recover - Restores the database to a consistent state (Enhanced Security)
SYNOPSIS
/usr/tcb/bin/db_recover [-cv] [-h home]
FLAGS
Failure was catastrophic. Specify a home directory for the database. The correct directory for enhanced security is /var/tcb/files.
Write out the pathnames of all of the database log files, whether or not they are involved in active transactions. Run in verbose mode.
DESCRIPTION
A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide high-performance database sup-
port for critical security files. The DB includes full transactional support and database recovery, using write-ahead logging and check-
pointing to record changes.
The db_recover utility runs after an unexpected system failure to restore the security database to a consistent state. All committed
transactions are guaranteed to appear after db_recover has run, and all uncommitted transactions are completely undone. DB recovery is
normally performed automatically for the security files as part of system startup.
In the case of catastrophic failure, an archival copy, or snapshot of all database files must be restored along with all of the log files
written since the database file snapshot was made. (If disk space is a problem, log files may be referenced by symbolic links).
If the failure was not catastrophic, the files present on the system at the time of failure are sufficient to perform recovery.
If log files are missing, db_recover identifies the missing log files and fails, in which case the missing log files need to be restored
and recovery performed again.
The db_recover utility attaches to one or more of the Berkeley DB shared memory regions. In order to avoid region corruption, it should
always be given the chance to detach and exit gracefully. To cause db_recover to clean up after itself and exit, send it an interrupt sig-
nal (SIGINT).
RETURN VALUES
The db_recover utility exits 0 on success, and >0 if an error occurs.
ENVIRONMENT VARIABLES
If the -h option is not specified and the environment variable DB_HOME is set, it is used as the path of the database home. The home
directory for security is /var/tcb/files.
FILES
/var/tcb/files/auth.db
/var/tcb/files/dblogs/*
RELATED INFORMATION
Commands: db_archive(8), db_checkpoint(8), db_printlog(8), db_dump(8), db_load(8), db_stat(8), secconfig(8) delim off
db_recover(8)