In 69 posts to these forums, suresh3566 has been warned a dozen times to properly format posts with reminders similar to the following:
Quote:
To keep the forums high quality for all users, please take the time to format your posts correctly.
First of all, use Code Tags when you post any code or data samples so others can easily read your code. You can easily do this by highlighting your code and then clicking on the # in the editing menu. (You can also type code tags [code] and [/code] by hand.)
Second, avoid adding color or different fonts and font size to your posts. Selective use of color to highlight a single word or phrase can be useful at times, but using color, in general, makes the forums harder to read, especially bright colors like red.
Third, be careful when you cut-and-paste, edit any odd characters and make sure all links are working property.
Thank You.
The UNIX and Linux Forums
suresh3566 has been placed in read-only mode for three days hoping that suresh3566 can use this time to review the rules agreed to when joining The UNIX and Linux Forums. More infractions by this user may lead to a permanent banishment from these forums.
Hello All,
I have several solaris boxes running Solaris 8. When changing root passwords on them, all will simply ask for the new root password to change and of course to re-type the new password. One of the systems however asks for the existing root password before it will display the new password... (8 Replies)
Hi Solaris's expert
I need to change user password on Solaris10 2 servers.
With the same password I can change it just only one.
Try to check everything but not found difference??
password pattern: abcdeFgh9Jk
server1 check all characters but server2 check only first 8 characters.Why??... (10 Replies)
Today i was going through some of security guides written on linux .
Under shadow file security following points were mentioned.
1)The encrypted password stored under /etc/shadow file should have more than 14-25 characters.
2)Usernames in shadow file must satisfy to all the same rules as... (14 Replies)
Hi,
I am running NIS server on redhat linux 5 and I want to implement password restrictions for the yppasswd, how can I do it.Please help me.
I can implement password restriction for passwd by configuring /etc/pam.d/system-auth and setting crack_lib.so but I don't know how to implent the same... (3 Replies)
hi folk,
i try to setup a new password policy for our solaris box user, below are the /etc/default/passwd/, but then when i tried to create a user, it didn't ask for numeric character, and the new password also didn't ask for special characters.
# useradd testing
# passwd testing
New... (7 Replies)
Hi linux expert,
i would like to create a script for listing all user with there password policy. It should be in the following format:
Last password change : Sep 19, 2011
Password expires : never
Password inactive : never
Account... (2 Replies)
Hi Experts,
i would like to know the description of the following:
Minimum: 0
Maximum: 90
Warning: 7
Inactive: -1
Last Change: Never
Password Expires: Never
Password Inactive: Never
Account Expires: Never
Does this means that... (2 Replies)
Hello All,
I have Sun DSEE7 (11g) on Solaris 10.
I have run idsconfig and initialized ldap client with profile created using idsconfig.
My ldap authentication works. Here is my pam.conf
# Authentication management
#
# login service (explicit because of pam_dial_auth)
#
login ... (3 Replies)
Hello Team,
I am using Lubuntu & have DRBL remote boot setup with open Ldap authentication. Currently there is no password expire policy. I want to set Password Policy so that user's password will expire after a month & they will get prompt to change their password.
Using PAM we can do it,... (1 Reply)
I need help. I have set a password policy. But I want to dis allow setting user name as password.
My policy is as below...
min length =8
min diff=2
min alpha=2
max repeats=2
dictionary= /usr/share/dict/words
Still user can set his username as password (i.e. Jackie1234).
Code tags for... (11 Replies)
Discussion started by: powerAIX
11 Replies
LEARN ABOUT CENTOS
security_load_policy
security_load_policy(3) SELinux API documentation security_load_policy(3)NAME
security_load_policy - load a new SELinux policy
SYNOPSIS
#include <selinux/selinux.h>
int security_load_policy(void *data, size_t len);
int selinux_mkload_policy(int preservebools);
int selinux_init_load_policy(int *enforce);
DESCRIPTION
security_load_policy() loads a new policy, returns 0 for success and -1 for error.
selinux_mkload_policy() makes a policy image and loads it. This function provides a higher level interface for loading policy than
security_load_policy(), internally determining the right policy version, locating and opening the policy file, mapping it into memory,
manipulating it as needed for current boolean settings and/or local definitions, and then calling security_load_policy to load it. pre-
servebools is a boolean flag indicating whether current policy boolean values should be preserved into the new policy (if 1) or reset to
the saved policy settings (if 0). The former case is the default for policy reloads, while the latter case is an option for policy reloads
but is primarily used for the initial policy load. selinux_init_load_policy() performs the initial policy load. This function determines
the desired enforcing mode, sets the enforce argument accordingly for the caller to use, sets the SELinux kernel enforcing status to match
it, and loads the policy. It also internally handles the initial selinuxfs mount required to perform these actions.
It should also be noted that after the initial policy load, the SELinux kernel code cannot anymore be disabled and the selinuxfs cannot be
unmounted using a call to security_disable(3). Therefore, after the initial policy load, the only operational changes are those permitted
by security_setenforce(3) (i.e. eventually setting the framework in permissive mode rather than in enforcing one).
RETURN VALUE
Returns zero on success or -1 on error.
AUTHOR
This manual page has been written by Guido Trentalancia <guido@trentalancia.com>
SEE ALSO selinux(8), security_disable(3), setenforce(8)guido@trentalancia.com 3 November 2009 security_load_policy(3)