08-09-2017
Are your users local i.e. in the /etc/passwd file?
The /etc/default/passwd rules only apply to local users (who have UID!=0).
10 More Discussions You Might Find Interesting
1. Forum Support Area for Unregistered Users & Account Problems
Well, I get this email -
Hello,
You have requested to reset your password on The UNIX Forums forums because you have forgotten your password. If you did not request this, please ignore it. It will expire and become useless in 24 hours time.
To reset your password, please visit the... (1 Reply)
Discussion started by: zyx
1 Replies
2. Solaris
Hi,
I am looking for a simple way to :
- force the user to change his password following the first connexion
- check the complexity of a password (password should has a least 8 characters with 1 special char and 1 alpha...).
Thinks for your help (1 Reply)
Discussion started by: dbsora
1 Replies
3. Shell Programming and Scripting
Hi
I have a script which uses expect and I run it on solaris 10 to set a common password for all users. I run it as `./script password` but when I tried to log into the system then I do not really have to type password, pressing ENTER on keyboard logs the user into system. (ssh)
This below... (2 Replies)
Discussion started by: upengan78
2 Replies
4. Solaris
Hello All,
I have several solaris boxes running Solaris 8. When changing root passwords on them, all will simply ask for the new root password to change and of course to re-type the new password. One of the systems however asks for the existing root password before it will display the new password... (8 Replies)
Discussion started by: tferrazz
8 Replies
5. Solaris
Boot device : /pci@1f,4000/scsi@3/disk@0,0:a File and args: -s cdrom
SunOS Release 5.9 Version Generic_118558-11 64-bit (6 Replies)
Discussion started by: agummad
6 Replies
6. Shell Programming and Scripting
Hello Friends,
I know this issue has been raised many times and hence I tried every resolution provided in the forum before I posted this issue again.
My Password-less RSA authentication was working fine for quite some time. Whenever the remote server password used to change I used to re-do... (5 Replies)
Discussion started by: mehimadri
5 Replies
7. Shell Programming and Scripting
Sorry to post this thread as it has been asked several times. But my question is that I need to write a shell script to transfer a file from machine A to machine B using sftp. I generated pvt-pub key pair and put pub key in machine b and lso make the pub file's permision 600. .ssh directory... (1 Reply)
Discussion started by: vsachan
1 Replies
8. SuSE
Hi,
I am setting password complexity in SLES 11. I am able to do most of things
pam-config -d --pwcheck
pam-config -a --cracklib
pam-config -a --cracklib-minlen=8
pam-config -a --cracklib-dcredit=-1
pam-config -a --cracklib-ocredit=-1
pam-config -a --pwhistory
pam-config -a... (1 Reply)
Discussion started by: solaris_1977
1 Replies
9. UNIX for Dummies Questions & Answers
Hi,
I have followed the below commands for key generation and ssh from one server to another with user mqm
cd /var/mqm/.ssh
mqm@A:~> ssh-keygen -t rsa
<public key creation>
mqm@A:~> ssh mqm@B mkdir -p .ssh
mqm@B's password: <entered_password>
mqm@A:~> cat /var/mqm/.ssh/id_rsa.pub | ssh... (4 Replies)
Discussion started by: Anusha M
4 Replies
10. UNIX for Beginners Questions & Answers
Hello Team,
Please help me to solve my Problem,
By mistake, I give full permission to /(root) directory. by using the following command "chmod -R 777 /"
after this, the client asks for the password to login via ssh. Before that, I an able to Login without a password.
Please help me to retrieve... (5 Replies)
Discussion started by: Shubham1182
5 Replies
vipw(1M) vipw(1M)
NAME
vipw - edit the password file
SYNOPSIS
DESCRIPTION
edits the password file while setting the appropriate locks, and does any necessary processing after the password file is unlocked. If the
password file is already being edited, you will be told to try again later. The editor is used unless the environment variable indicates
an alternate editor.
performs a number of consistency checks on the password entry for and does not allow a password file with an incorrectly formatted root
entry to be installed. To help reduce the possibility of leaving the system in an unbootable state, root's entry is not considered prop-
erly formatted if it has a user ID that is not zero, or if it has a shell other than or
Please refer to passwd(4) and the manual for further details of password file format.
WARNINGS
An file that is not removed when a system crashes prevents further editing of the file using after the system is rebooted. is the standard
lock used by all commands which knowingly modify
Successful execution of is not sufficient for proper system operation. To help maintain consistency with other system databases, editing
of the password file with is generally discouraged. Please use or to edit
AUTHOR
was developed by the University of California, Berkeley.
FILES
SEE ALSO
chfn(1), chsh(1), passwd(1), sam(1M), useradd(1M), usermod(1M), userdel(1M), passwd(4).
vipw(1M)