Sponsored Content
Top Forums Shell Programming and Scripting How to store the passwords securely and use in scripts? Post 303034023 by karumudi7 on Tuesday 16th of April 2019 09:55:09 PM
Old 04-16-2019
How to store the passwords securely and use in scripts?

I want to store the passwords in a global file, so that all the users will not use them to login but a process should use it. One way is to keep the passwords in a .ini file and execute the file in the start of the script and use that variable.

But with this, one can echo the variable in the script and see the value.

How are you guys storing, let's say production database password, and use that in the script while writing the database connect statements.
 

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

How to pass passwords to bash scripts?

I'm finding the following command very tedious to type in all the time, so I created a one line bash script called mount.bash with the following contents: mount -t cifs //mark/C\$ -o unc=//mark\\C$,ip=10.1.1.33,user=Administrator,password=$1 /mnt/mark I don't like the fact that I have to put... (5 Replies)
Discussion started by: siegfried
5 Replies

2. Shell Programming and Scripting

Checking passwords - scripts

Hi Unix experts.... I am in the process checking user and root password of more than 1000 servers manulay. I am very pissed of checking these many servers manualy. Could some one of you help me how can i check the passwords just by runing some scripts..! Need Help Guys..! :confused: (5 Replies)
Discussion started by: bullz26
5 Replies

3. Solaris

installing solaris securely

Ok, I am trying to install solaris, but I would like as a lean installation as possible (while still having a shread of functionality). If I chose the minimal install I have little if no utilities to do work on the box. My question is what installation method do most admins take? ... (7 Replies)
Discussion started by: liven
7 Replies

4. Shell Programming and Scripting

Oracle Passwords in Unix scripts

Hi Most of the shell scripts I am dealing with have to connect to oracle database . The username password is stored in a environment file which sets the variables for username and password . Set user id do not work on AIX so users who will execute these scripts need to have read or execute... (5 Replies)
Discussion started by: clifford
5 Replies

5. Shell Programming and Scripting

SSH - Passing Unix login passwords through shell scripts

Hi All , I need to call a script runscript_B.sh on server A, the runscript_B.sh script locating in server B. The runscript_B.sh in calls another script runscript_A on server A itself. it seend, i need to be connect from Server A to Server B using ssh. I have tryed like this in... (3 Replies)
Discussion started by: koti_rama
3 Replies

6. UNIX for Advanced & Expert Users

When did UNIX start using encrypted passwords, and not displaying passwords when you type them in?

I've been using various versions of UNIX and Linux since 1993, and I've never run across one that showed your password as you type it in when you log in, or one that stored passwords in plain text rather than encrypted. I'm writing a script for work for a security audit, and two of the... (5 Replies)
Discussion started by: Anne Neville
5 Replies

7. AIX

When did AIX start using /etc/security/passwd instead of /etc/passwd to store encrypted passwords?

Does anyone know when AIX started using /etc/security/passwd instead of /etc/passwd to store encrypted passwords? (1 Reply)
Discussion started by: Anne Neville
1 Replies

8. UNIX for Advanced & Expert Users

Store passwords , accounts, IPs, hostnames

Hi, this question is not specially unix related, but I expect advanced and expert unix users to have a solution for this, and I've found no other subforum that fits ;) what do you use to store accounts, customer ids, ip addresses, users and specially passwords, to access them from... (6 Replies)
Discussion started by: funksen
6 Replies
auth(5) 							File Formats Manual							   auth(5)

Name
       auth - auth database

Description
       The  database is a repository of security-relevant information about each user of the system. This database contains the encrypted password
       associated with the user's account in addition to a list of assorted capabilities.  The database is stored as an database in the files  and
       Records are retrieved with the library routine.	Access to the database is restricted to the superuser and members of the group

       Auth records may be converted to an ASCII representation whose format is:
       1000:4KvidFYwovnwp3j8lll78dC1:1920129:3600:2678400:03:0:1000:0:00:00
       The first field is the UID of the entry that is used as the key into the database. Then follows:

       Encrypted Password
		      This  is the user's encrypted password. Whether this password or the one from the file is actually used is determined by the
		      security level that the system is running at.

       Password Modification Time
		      This is the time(2) the password was last set.

       Minimum Password Lifetime
		      This is the minimum number of seconds which must elapse between setting passwords.

       Maximum Password Lifetime
		      This is the maximum period of time for which the password will be valid.

       Account Mask   These are capabilities pertaining to the account itself.	They are:

			 1 A_ENABLE: this account is enabled.
			 2 A_CHANGE_PASSWORD: The user can change his or her password.
			 4 A_ENTER_PASSWORD: The user is not required to use machine-generated passwords.

       Login Failure Count
		      This is the count of unsuccessful login attempts since the last successful login.

       Audit ID       Positive integer identifier used in generating audit records for the user.

       Audit Control  See the reference page, SET_APROC_CNTL section for more information.

       Audit Mask     Determines which events will be audited for the user. See the and reference pages for more information.

Restrictions
       Only the superuser and members of the group may read information from the auth database.  Only the superuser may modify the auth database.

Files
See Also
       audcntl(2), getauthuid(3), getpwent(3), edauth(8)

																	   auth(5)
All times are GMT -4. The time now is 09:44 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy