03-25-2015
Dear All,
It got resolved as we added the hostname and ip in etc/hosts file.
Thanks all
9 More Discussions You Might Find Interesting
1. AIX
Does anyone have a good script / cron job that handles this?
I have looked in smit and see it is clearing this count with:
chsec -f /etc/security/lastlog -a "unsuccessful_login_count=0" -s '{userid}'
However when I looked around to find ways to automate this I have not found an easy... (0 Replies)
Discussion started by: Keith Johnson
0 Replies
2. Shell Programming and Scripting
Hi
How to check invalid user account?
invalid condition:
1. without home directory
2. home directory is empty
3. no home directory
4. no shell
5. no passwd
user1:x:6000:6000:user1app:/DB/user1:/bin/ksh (5 Replies)
Discussion started by: geoffry
5 Replies
3. UNIX for Advanced & Expert Users
Helo ,
I m using linux pam library for user and its password authentication.
I m creating new user and giving its password.I m giving password of 10 characters.now when I login in as that newly created user its ask me
$ su - ram
Password:
You are required to change your password immediately... (12 Replies)
Discussion started by: amitpansuria
12 Replies
4. AIX
Hi AIX Gurus,
I've purchased a second hand pSeries and don't know the root password. I've used the following instruction to reset root password and everything seems just fine. However, after it reboots, the system still says the root password I used is invalid. I really don't know why. I did... (12 Replies)
Discussion started by: aixlover
12 Replies
5. Solaris
Hello,
We run solaris 8 with nis+, when I do niscat, I can see the user's information, but when I do id from the domain it is saying invalid user. What may be the problem?
id: invalid user name: "abyu789" (1 Reply)
Discussion started by: mokkan
1 Replies
6. Red Hat
Hello all,
If anyone has time, I have a few questions:
How do I do the following in Linux. We are using Red Hat and Oracle Enterprise Linux, which is based on Red Hat too.
1. How to lock the account after a few (like 3) invalid password attempts?
2. How do you lock a screen after 30... (1 Reply)
Discussion started by: nstarz
1 Replies
7. UNIX for Dummies Questions & Answers
hi guys
I have Centos 5.4
The idea is lock the user account for 3 minutes after he has entered his password incorrectly 3 times.
I've modified /etc/pam.d/system-auth
auth required pam_tally.so onerr=fail per_user deny=3
account required pam_tally.so resetbesides... (3 Replies)
Discussion started by: kopper
3 Replies
8. AIX
I have four AIX 6.1.7.4 systems freshly built and ready for our DBAs to do their work. Of the three one runs into an odd issue while logging in as himself, using Putty with ssh protocols. He logs in successfully, but also gets the following error message:
: 3004-300 You entered an invalid login... (2 Replies)
Discussion started by: Mike Brendan
2 Replies
9. Windows & DOS: Issues & Discussions
Hi all,
For one of our server (Windows 2008R2), we sometimes will received "login failed username password is incorrect" when login in as domain account (the username & password is correct).
Only after a reboot of the server (using local account), we can login without the above error.
Can... (2 Replies)
Discussion started by: beginningDBA
2 Replies
LEARN ABOUT CENTOS
hosts.equiv
HOSTS.EQUIV(5) Linux Programmer's Manual HOSTS.EQUIV(5)
NAME
/etc/hosts.equiv - list of hosts and users that are granted "trusted" r command access to your system
DESCRIPTION
The hosts.equiv file allows or denies hosts and users to use the r-commands (e.g., rlogin, rsh or rcp) without supplying a password.
The file uses the following format:
[ + | - ] [hostname] [username]
The hostname is the name of a host which is logically equivalent to the local host. Users logged into that host are allowed to access
like-named user accounts on the local host without supplying a password. The hostname may be (optionally) preceded by a plus (+) sign. If
the plus sign is used alone it allows any host to access your system. You can explicitly deny access to a host by preceding the hostname
by a minus (-) sign. Users from that host must always supply a password. For security reasons you should always use the FQDN of the host-
name and not the short hostname.
The username entry grants a specific user access to all user accounts (except root) without supplying a password. That means the user is
NOT restricted to like-named accounts. The username may be (optionally) preceded by a plus (+) sign. You can also explicitly deny access
to a specific user by preceding the username with a minus (-) sign. This says that the user is not trusted no matter what other entries
for that host exist.
Netgroups can be specified by preceding the netgroup by an @ sign.
Be extremely careful when using the plus (+) sign. A simple typographical error could result in a standalone plus sign. A standalone plus
sign is a wildcard character that means "any host"!
FILES
/etc/hosts.equiv
NOTES
Some systems will honor the contents of this file only when it has owner root and no write permission for anybody else. Some exceptionally
paranoid systems even require that there be no other hard links to the file.
Modern systems use the Pluggable Authentication Modules library (PAM). With PAM a standalone plus sign is considered a wildcard character
which means "any host" only when the word promiscuous is added to the auth component line in your PAM file for the particular service
(e.g., rlogin).
SEE ALSO
rhosts(5), rlogind(8), rshd(8)
COLOPHON
This page is part of release 3.53 of the Linux man-pages project. A description of the project, and information about reporting bugs, can
be found at http://www.kernel.org/doc/man-pages/.
Linux 2003-08-24 HOSTS.EQUIV(5)