can be called from the standard library
exists on trusted systems. You can test existence with
You did not
mention your OS version - so there may be a better approach for it.
Thanks jim, I am using 1131 version. Is there a possibility for /.secure/etc/passwd existence when the hpux is converted to standard mode?
Hi All,
Some questions on PAM (Pluggable Authentication Modulues) and Trusted mode in HP-UX.
As default, when I turn on trusted mode (need shadow password only), the PAM is atomatically installed(not sure the word "installed" is appropriate or not). Can we turn on the trusted mode only,... (0 Replies)
Hi All,
I used to have my suse linux(VM) server in graphic mode but not anymore since morning. I cant rolback since i loose somuch work. Any idea how to it back to normal. Thanks (6 Replies)
I think that if the directory /tcb exists, HP-UX is in trusted mode and the passwd data is somewhere in /tcb/files/auth. But that's all I remember.
Also I think recent versions of HP-UX can have a /etc/shadow file. (0 Replies)
I'm sharing this in case anybody needs it. Modified from the original solaris pwage script. This modified hpux script will check /etc/password file on hpux trusted systems search /tcb and grep the required u_succhg field. Calculate days to expiry and notify users via email.
original solaris... (2 Replies)
Hi All,
Can please let me know what is the difference between the single line mode and multi line mode in regular expresions?
Thanks,
Chidhambaram B (3 Replies)
I try a static ip assign mode while i installed the Solaris 10(U 8). But i can't access the internet, i try the ifconfig -a command and see my configuration is correct in the interface. So i want to get my ip using dhcp. I search from internet. They give me the suggestions.
ifconfig interface... (1 Reply)
I have tried every possibilty that I can think of and cant get rdesktop using single application mode to work. I have tried with paths and without.
Testing other apps:
rdesktop -u username -p password -d localdomain.local -g 1024x768 -s 'notepad.exe' 10.7.0.14
rdesktop -g 1024x768... (0 Replies)
:confused:
when i tried to look the status of DNS-client, it is in maintenance mode.....
Please tell me how to bring it back to online mode...PLEASE TELL ME STEP BY STEP.... PLEASE...
:wall: (2 Replies)
I need some help in finding which users have the audit setting turned on in the standard mode on a hpux OS 1131 from my application.
I am using audusr from the C code in trusted mode. Need help what to do in standard mode. (0 Replies)
Discussion started by: einsteinBrain
0 Replies
LEARN ABOUT HPUX
pam_sm_acct_mgmt
pam_sm_acct_mgmt(3) Library Functions Manual pam_sm_acct_mgmt(3)NAME
pam_sm_acct_mgmt() - service provider implementation for pam_acct_mgmt
SYNOPSIS
[flag]... file... [library]...
DESCRIPTION
In response to a call to pam_acct_mgmt(3), the PAM framework calls from the modules listed in the pam.conf(4) file. The account management
provider supplies the back-end functionality for this interface function. The applications should not call this API directly.
The function, determines whether the current user's account and password are valid. This includes checking for password and account expi-
ration, valid log-in times, etc. The user in question is specified by a prior call to and is referenced by the authentication handle,
pamh, which is passed as the first argument to The following flags may be set in the flags field:
The account management service should not generate any messages.
The account management service should return
if the user has a null authentication token.
The argc argument represents the number of module options passed in from the configuration file pam.conf(4). argv specifies the module
options, which are interpreted and processed by the account management service. Please refer to the specific module man pages for the var-
ious available options. If an unknown option is passed to the module, an error should be logged through syslog(3C) and the option ignored.
If an account management module determines that the user password has aged or expired, it should save this information as state in the
authentication handle, pamh, using uses this information to determine which passwords have expired.
APPLICATION USAGE
Refer to pam(3) for information on thread-safety of PAM interfaces.
RETURN VALUE
If there are no restrictions to logging in, is returned. The following error values may also be returned upon error:
User not known to underlying authentication module.
New authentication token required.
User account has expired.
User denied access to account at this time.
Ignore underlying account module regardless of whether the control
flag is or
User account has been disabled (trusted mode only).
Terminal has been disabled (trusted mode only).
User is not authorized for terminal access (trusted mode only).
Wrong time to login (trusted mode only).
WARNINGS
HP-UX 11i Version 3 is the last release to support trusted systems functionality.
SEE ALSO pam(3), pam_acct_mgmt(3), syslog(3C), pam.conf(4).
pam_sm_acct_mgmt(3)