Sponsored Content
Operating Systems Solaris Passwd -l or -u modifies lastchg field in /etc/shadow file Post 302939412 by rbatte1 on Wednesday 25th of March 2015 10:05:21 AM
Old 03-25-2015
How do they get it unlocked? I would suggest that whomever is doing the unlock needs to do three things in order:-
  1. Unlock the account
  2. Set a new password
  3. Expire the password
It may just be a procedural change. You can easily script these to give the people doing it just one command to run and mask off the other parts.



Does that help?


Robin
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Trying to extract a field from /etc/passwd file..

Hello, was looking for some help on extracting a field from the passwd file. So far I have made a copy of the passwd file and changed my rights so I can edit it. Every user's password is coded as an :x:, and my goal was to change that x to a blank, and then try to extract any user with that field... (2 Replies)
Discussion started by: xBuRnTx
2 Replies

2. UNIX for Dummies Questions & Answers

Impact of shadow file 'lastchg' parameter NULL or 0?

I've encountered shadow files where the "lastchg" parameters are set to NULL and also zero (0) for some Solaris machines (one running v10, one running v8). I was wondering what impact this has on password ageing, and therefore enforced password change. Does the NULL mean the account has never... (0 Replies)
Discussion started by: Lampers
0 Replies

3. UNIX for Dummies Questions & Answers

How to : Identify the the password is encrypted or not in /etc/shadow or /etc/passwd?

Thanks AVKlinux (11 Replies)
Discussion started by: avklinux
11 Replies

4. Solaris

tool to convert /etc/passwd and etc/shadow

i wonder if there is a tool to read the /etc/passwd or /etc/shadow files in order to reset user accounts to the same one. By moving (restore) all filessytem and data to another same Sun box, none of the users are able to logon to the new box which i didn't change nothing. But if i reset the user... (1 Reply)
Discussion started by: lamoul
1 Replies

5. UNIX for Advanced & Expert Users

Converting freebsd (5.2.1) master.passwd to Debian shadow

I'm trying to make this work, and it half works. Accounts with password hashes matching the old crypt(3) algorithm work just fine: JUpfW/w6jo6aw But accounts with longer password hashes preceded by $1$, such as the following, do not work: $1$iIcbppdP$HDyjJeVMGgJ.ovLsnjtTR.... (0 Replies)
Discussion started by: davidstvz
0 Replies

6. Solaris

passwd cmd reenables passwd aging in shadow entry

Hi Folks, I have Solaris 10, latest release. We have passwd aging set in /etc/defalut/passwd. I have an account that passwd should never expire. Acheived by emptying associated users shadow file entries for passwd aging. When I reset the users passwd using passwd command, it re enables... (3 Replies)
Discussion started by: BG_JrAdmin
3 Replies

7. Solaris

difference between /etc/shadow and /etc/default/passwd

Hi , can anyone explain me the difference between /etc/shadow and /etc/default/passwd . As per my knowledge both the files are used for password aging and control parameters. (2 Replies)
Discussion started by: rogerben
2 Replies

8. Solaris

9th field in shadow file

Hi experts, Can somebody explain, what is 9th field in /etc/shadow ? The last digit - (5 Replies)
Discussion started by: solaris_1977
5 Replies

9. UNIX for Advanced & Expert Users

psswd&shadow 2 passwd together?!!

hi, all I just started on new box where I have to diff passwd working perfectly on the very same account/user. I see that shadow was added recently (I'm not a root in there), I see 'x' in passwd. Not sure how it should work, should I change old passwd for one defined in shadow? Or it's fine to... (20 Replies)
Discussion started by: trento17
20 Replies

10. Solaris

Passwd,shadow files deleted and abort sequence disabled

Hi all.. I moved the /etc/shadow and /etc/shadow files to /tmp and then rebooted my PARC machine running 5.10. I did it to see if I could recover from single user mode. But, I forgot to enable the abort key-sequence which I earlier disabled. Stuck! One of my gurus told I had to... (9 Replies)
Discussion started by: satish51392111
9 Replies
SYSTEMKEYCHAIN(8)					    BSD System Manager's Manual 					 SYSTEMKEYCHAIN(8)

NAME
systemkeychain -- creates system keychains and allows keychains to unlock keychains SYNOPSIS
systemkeychain [-fv] [-k filename] [-C] [password] systemkeychain [-fvc] [-k filename] [-s] [file ...] systemkeychain [-v] [-k filename] [-t] DESCRIPTION
The systemkeychain can be used to create a system keychain, make it possible for a keychain to unlock another keychain, or test unlocking a keychain. The options are as follows: -C Create a keychain and establish it in the system as the primary system keychain whose unlocking is automatically handled by the sys- tem. The new keychain is empty. If the optional password argument is given, the keychain can be also be unlocked with that; other- wise, the keychain has no password and can only be unlocked by the system. The optional password option is generally used for test- ing purposes, and using it is not recommended. -s Extract the master secret from source keychain(s) and install them in a destination keychain to allow unlocking. -t Test unlocking the system keychain. -k systemKeychain Use a keychain other than the default as the destination system keychain. -c Create the target keychain if necessary. -f Force creation of a system keychain or overwriting of an existing key for keychain unlocking keychain operations. -v Turn on verbose mode. By default, systemkeychain works with the keychain file stored at /Library/Keychains/System.keychain . Use of the -k option can specify a different target file. Use of the -s option allows keychains to be setup to unlock other keychains. Chains of keychain unlocks can be setup in this manner to make a series of keychains unlock while only needing to manually unlock the first one. This functionality can be verified with the -t (test unlock) option. FILES
/Library/Keychains/System.keychain DIAGNOSTICS
The systemkeychain utility exits 0 on success, and >0 if an error occurs. HISTORY
The systemkeychain command appeared in Mac OS 10.2.0 . BSD
March 14, 2006 BSD
All times are GMT -4. The time now is 04:56 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy