12-13-2017
Quote:
Originally Posted by
Scott
In Solaris 11, root is defined as a role by default. Meaning you can no longer login as root. You have to login as a user and assume the role to elevate your privs to root.
10 More Discussions You Might Find Interesting
1. Forum Support Area for Unregistered Users & Account Problems
Hi,
I reset my password couple of times. On both the occasions, I get the message that the password is reset and it would be mailed to you. But I have never received the mail. Could you please let me know my password so that I can login.
My user id is ranj@tcs.
Thanks,
Ranjith (1 Reply)
Discussion started by: whyaskedhere
1 Replies
2. Post Here to Contact Site Administrators and Moderators
Hi Moderators,
I forgot the login password and am accessing the forum page through save form password credentials.
Could you please reset my password ?
Thanks,
:) (5 Replies)
Discussion started by: matrixmadhan
5 Replies
3. Forum Support Area for Unregistered Users & Account Problems
Why would a password reset, a provided numerical value thru email, not be accepted when trying to log in with it? I have expired the 5 login attempts twice with still no acceptance. thanks for the help (3 Replies)
Discussion started by: W.A.C.
3 Replies
4. UNIX for Advanced & Expert Users
Can anyone tell me if it is possible to have cron change your password every month from an encrypted list of passwords?I have several servers I hardly ever go near but when I do the password has always expired and it takes a long time to get the administrators to reset it for me. I was thinking... (4 Replies)
Discussion started by: steadyonabix
4 Replies
5. Hardware
HI Guys
I have forgot my ILO password for REDHAT Linux, Its Protriat HP server.
I need to set new password for ILO without installing any RPM like "hponfig"....
I need to set password in terminal. please give me steps to change the password
waiting for ur replys (1 Reply)
Discussion started by: suresh_krish
1 Replies
6. Solaris
Hi ,
How to reset ALOM/SC password for Solaris box Sun Fire T-200
Thanks (5 Replies)
Discussion started by: chetansingh23
5 Replies
7. Shell Programming and Scripting
Hi all,
I am using an command which reset the password for the user, its working fine on Solaris boxes but sometimes the samw was not happening on some of linux boxes.
/bin/echo username | passwd --stdin username
I am new to unix and shell scripting,so it would be very helpful for me... (1 Reply)
Discussion started by: sudharson
1 Replies
8. OS X (Apple)
So my dad bought an iMac from my mom, but she does not know the admin password anymore. I read on the apple forums that I should look here for help on resetting the password. The iMac runs OSX 10.6.3. I would really appreciate any help. Thanks (3 Replies)
Discussion started by: PhsycoDragon
3 Replies
9. Red Hat
Hello -
I want to reset user password in multiple server via root ID. I have passwordless authentication for root between all the servers.
I an use loop to reset the password. I am using below command in loop
echo mypassword | passwd username --stdin
However, if anyone sees history - he... (5 Replies)
Discussion started by: saurabh84g
5 Replies
10. Forum Support Area for Unregistered Users & Account Problems
I was unable to login and so used the "Forgotten Password' process. I was sent a NEWLY-PROVIDED password and a link through which my password could be changed. The NEWLY-PROVIDED password allowed me to login.
Following the provided link I attempted to update my password to one of my own... (1 Reply)
Discussion started by: Rich Marton
1 Replies
LEARN ABOUT SUNOS
pam_roles
pam_roles(5) Standards, Environments, and Macros pam_roles(5)
NAME
pam_roles - Solaris Roles account management module
SYNOPSIS
pam_roles.so.1
DESCRIPTION
The pam_roles module implements pam_sm_acct_mgmt(3PAM). It provides functionality to verify that a user is authorized to assume a role. It
also prevents direct logins to a role. The user_attr(4) database is used to determine which users can assume which roles.
The PAM items PAM_USER and PAM_RUSER are used to determine the outcome of this module. PAM_USER represents the new identity being veri-
fied. PAM_RUSER, if set, represents the user asserting a new identity. If PAM_RUSER is not set, the real user ID of the calling service
implies that the user is asserting a new identity. Notice that root can never have roles.
This module is generally stacked above the pam_unix_account(5) module.
The following options are interpreted:
debug Provides syslog(3C) debugging information at the LOG_DEBUG level.
ERRORS
The following values are returned:
PAM_IGNORE If the type of the new user identity (PAM_USER) is "normal". Or, if the type of the new user identity is "role" and
the user asserting the new identity (PAM_RUSER) has the new identity name in its list or roles.
PAM_USER_UNKNOWN No account is present for user.
PAM_PERM_DENIED If the type of the new user identity (PAM_USER) is "role" and the user asserting the new identity (PAM_RUSER) does
not have the new identity name in its list of roles.
EXAMPLES
Example 1: Using the pam_roles.so.1 module
Here are sample entries from pam.conf(4) demonstrating the use of the pam_roles.so.1 module:
cron account required pam_unix_account.so.1
#
other account requisite pam_roles.so.1
other account required pam_unix_account.so.1
#
The cron service does not invoke pam_roles.so.1. Delayed jobs are independent of role assumption. All other services verify that roles can-
not directly login. The "su" service (covered by the "other" service entry) verifies that if the new user is a role, the calling user is
authorized for that role.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Interface Stability |Evolving |
+-----------------------------+-----------------------------+
|MT Level |MT-Safe with exceptions |
+-----------------------------+-----------------------------+
SEE ALSO
roles(1), su(1M), libpam(3LIB), pam(3PAM), pam_acct_mgmt(3PAM), pam_setcred(3PAM), pam_set_item(3PAM), pam_sm_acct_mgmt(3PAM), syslog(3C),
pam.conf(4), user_attr(4), attributes(5), pam_authtok_check(5), pam_authtok_get(5), pam_authtok_store(5), pam_dhkeys(5),
pam_passwd_auth(5), pam_unix_account(5), pam_unix_auth(5), pam_unix_session(5)
NOTES
The interfaces in libpam(3LIB) are MT-Safe only if each thread within the multi-threaded application uses its own PAM handle.
This module should never be stacked alone. It never returns PAM_SUCCESS, as it never makes a positive decision.
SunOS 5.10 9 Mar 2004 pam_roles(5)