03-23-2015
yes , rudi , access granted in the Linux Server.
There is no problem in the user connecting with putty.
When he tries with HP tool GUI with hardcoded passwords , it is not able to connect and connection refused.
9 More Discussions You Might Find Interesting
1. AIX
Does anyone have a good script / cron job that handles this?
I have looked in smit and see it is clearing this count with:
chsec -f /etc/security/lastlog -a "unsuccessful_login_count=0" -s '{userid}'
However when I looked around to find ways to automate this I have not found an easy... (0 Replies)
Discussion started by: Keith Johnson
0 Replies
2. Shell Programming and Scripting
Hi
How to check invalid user account?
invalid condition:
1. without home directory
2. home directory is empty
3. no home directory
4. no shell
5. no passwd
user1:x:6000:6000:user1app:/DB/user1:/bin/ksh (5 Replies)
Discussion started by: geoffry
5 Replies
3. UNIX for Advanced & Expert Users
Helo ,
I m using linux pam library for user and its password authentication.
I m creating new user and giving its password.I m giving password of 10 characters.now when I login in as that newly created user its ask me
$ su - ram
Password:
You are required to change your password immediately... (12 Replies)
Discussion started by: amitpansuria
12 Replies
4. AIX
Hi AIX Gurus,
I've purchased a second hand pSeries and don't know the root password. I've used the following instruction to reset root password and everything seems just fine. However, after it reboots, the system still says the root password I used is invalid. I really don't know why. I did... (12 Replies)
Discussion started by: aixlover
12 Replies
5. Solaris
Hello,
We run solaris 8 with nis+, when I do niscat, I can see the user's information, but when I do id from the domain it is saying invalid user. What may be the problem?
id: invalid user name: "abyu789" (1 Reply)
Discussion started by: mokkan
1 Replies
6. Red Hat
Hello all,
If anyone has time, I have a few questions:
How do I do the following in Linux. We are using Red Hat and Oracle Enterprise Linux, which is based on Red Hat too.
1. How to lock the account after a few (like 3) invalid password attempts?
2. How do you lock a screen after 30... (1 Reply)
Discussion started by: nstarz
1 Replies
7. UNIX for Dummies Questions & Answers
hi guys
I have Centos 5.4
The idea is lock the user account for 3 minutes after he has entered his password incorrectly 3 times.
I've modified /etc/pam.d/system-auth
auth required pam_tally.so onerr=fail per_user deny=3
account required pam_tally.so resetbesides... (3 Replies)
Discussion started by: kopper
3 Replies
8. AIX
I have four AIX 6.1.7.4 systems freshly built and ready for our DBAs to do their work. Of the three one runs into an odd issue while logging in as himself, using Putty with ssh protocols. He logs in successfully, but also gets the following error message:
: 3004-300 You entered an invalid login... (2 Replies)
Discussion started by: Mike Brendan
2 Replies
9. Windows & DOS: Issues & Discussions
Hi all,
For one of our server (Windows 2008R2), we sometimes will received "login failed username password is incorrect" when login in as domain account (the username & password is correct).
Only after a reboot of the server (using local account), we can login without the above error.
Can... (2 Replies)
Discussion started by: beginningDBA
2 Replies
LEARN ABOUT CENTOS
pwmake
PWMAKE(1) General Commands Manual PWMAKE(1)
NAME
pwmake - simple tool for generating random relatively easily pronounceable passwords
SYNOPSIS
pwmake <entropy-bits>
DESCRIPTION
pwmake is a simple configurable tool for generating random and relatively easily pronounceable passwords. The tool allows you to specify
the number of entropy bits that are used to generate the password.
The entropy is pulled from /dev/urandom.
The minimum number of bits is 56 which is usable for passwords on systems/services where brute force attacks are of very limited rate of
tries. The 64 bits should be adequate for applications where the attacker does not have direct access to the password hash file. For situ-
ations where the attacker might obtain the direct access to the password hash or the password is used as an encryption key 80 to 128 bits
should be used depending on your level of paranoia.
OPTIONS
The first and only argument is the number of bits of entropy used to generate the password.
FILES
/etc/security/pwquality.conf - The configuration file for the libpwquality library.
RETURN CODES
pwmake returns 0 on success, non zero on error.
SEE ALSO
pwscore(1), pam_pwquality(8)
AUTHORS
Tomas Mraz <tmraz@redhat.com>
Red Hat, Inc. 10 Nov 2011 PWMAKE(1)