08-09-2017
Quote:
Originally Posted by
MadeInGermany
Are your users local i.e. in the /etc/passwd file?
The /etc/default/passwd rules only apply to local users (who have UID!=0).
The UIDs are in the 100-110 range and in the /etc/passwd file.
10 More Discussions You Might Find Interesting
1. Forum Support Area for Unregistered Users & Account Problems
Well, I get this email -
Hello,
You have requested to reset your password on The UNIX Forums forums because you have forgotten your password. If you did not request this, please ignore it. It will expire and become useless in 24 hours time.
To reset your password, please visit the... (1 Reply)
Discussion started by: zyx
1 Replies
2. Solaris
Hi,
I am looking for a simple way to :
- force the user to change his password following the first connexion
- check the complexity of a password (password should has a least 8 characters with 1 special char and 1 alpha...).
Thinks for your help (1 Reply)
Discussion started by: dbsora
1 Replies
3. Shell Programming and Scripting
Hi
I have a script which uses expect and I run it on solaris 10 to set a common password for all users. I run it as `./script password` but when I tried to log into the system then I do not really have to type password, pressing ENTER on keyboard logs the user into system. (ssh)
This below... (2 Replies)
Discussion started by: upengan78
2 Replies
4. Solaris
Hello All,
I have several solaris boxes running Solaris 8. When changing root passwords on them, all will simply ask for the new root password to change and of course to re-type the new password. One of the systems however asks for the existing root password before it will display the new password... (8 Replies)
Discussion started by: tferrazz
8 Replies
5. Solaris
Boot device : /pci@1f,4000/scsi@3/disk@0,0:a File and args: -s cdrom
SunOS Release 5.9 Version Generic_118558-11 64-bit (6 Replies)
Discussion started by: agummad
6 Replies
6. Shell Programming and Scripting
Hello Friends,
I know this issue has been raised many times and hence I tried every resolution provided in the forum before I posted this issue again.
My Password-less RSA authentication was working fine for quite some time. Whenever the remote server password used to change I used to re-do... (5 Replies)
Discussion started by: mehimadri
5 Replies
7. Shell Programming and Scripting
Sorry to post this thread as it has been asked several times. But my question is that I need to write a shell script to transfer a file from machine A to machine B using sftp. I generated pvt-pub key pair and put pub key in machine b and lso make the pub file's permision 600. .ssh directory... (1 Reply)
Discussion started by: vsachan
1 Replies
8. SuSE
Hi,
I am setting password complexity in SLES 11. I am able to do most of things
pam-config -d --pwcheck
pam-config -a --cracklib
pam-config -a --cracklib-minlen=8
pam-config -a --cracklib-dcredit=-1
pam-config -a --cracklib-ocredit=-1
pam-config -a --pwhistory
pam-config -a... (1 Reply)
Discussion started by: solaris_1977
1 Replies
9. UNIX for Dummies Questions & Answers
Hi,
I have followed the below commands for key generation and ssh from one server to another with user mqm
cd /var/mqm/.ssh
mqm@A:~> ssh-keygen -t rsa
<public key creation>
mqm@A:~> ssh mqm@B mkdir -p .ssh
mqm@B's password: <entered_password>
mqm@A:~> cat /var/mqm/.ssh/id_rsa.pub | ssh... (4 Replies)
Discussion started by: Anusha M
4 Replies
10. UNIX for Beginners Questions & Answers
Hello Team,
Please help me to solve my Problem,
By mistake, I give full permission to /(root) directory. by using the following command "chmod -R 777 /"
after this, the client asks for the password to login via ssh. Before that, I an able to Login without a password.
Please help me to retrieve... (5 Replies)
Discussion started by: Shubham1182
5 Replies
shexp(1) General Commands Manual shexp(1)
Name
shexp - display password expiration information for a user
Syntax
shexp [-q] [username]
Description
The command is used to display a user's password expiration information. The specified username, or logname if no username is supplied, is
converted to a UID by searching through the passwd file. The UID is then used to look up the user's entry in the Auth Data Base. The
password expiration information is then printed out in format.
% shexp
Expires Tue Dec 6 10:49:18 EST 1988
If the password has already expired the word Expires will be replaced with the word Expired. If password expiration is disabled for the
particular user in question the output of will be Never expires.
Options
-q Instead of displaying the expiration date and time in format, outputs it as three decimal numbers: the minimum password lifetime, the
maximum password lifetime, and the password modification time. All three numbers are displayed as they are found in the database.
Restrictions
Only the super-user may obtain information about users with UIDs other than the real UID of the invoking process.
Diagnostics
User not found in passwd data base.
There is no entry in for the specified username.
Cannot stat auth file.
The database is missing (security features may not be enabled).
Insufficient privilege.
An insufficiently privileged user is asking for information about a username with a UID different then their current real-UID.
An exit value of 0 indicates a successful operation, any other exit status indicates an error.
Files
See Also
passwd(1), getauthuid(3), auth(5)
Security Guide for Users
shexp(1)