05-24-2004
if fact i was trying this, but our system is not allowing this to work correctly with the authorization credentials.
is there a way to do this in a script??
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
I'm trying to create a shell to change some user password with random string.
I've tried to use stdin redirection to supply the new password by a response file:
passwd theuser < respfile
but I continue to be prompted for supplying pwd via console keyboard.
Can you help me to... (2 Replies)
Discussion started by: nisant
2 Replies
2. Shell Programming and Scripting
Hi
Can anyone help me in automate a ssh session with password using shell script (7 Replies)
Discussion started by: raghav288
7 Replies
3. Shell Programming and Scripting
I have a database that contains a list of server names, and the password for the root user on several servers (100+). I need to verify the passwords for each of the servers in an automated fashion because the database continues to grow. All of the users that I'm going to test are ROOT. I can't... (1 Reply)
Discussion started by: jbeck22
1 Replies
4. Shell Programming and Scripting
Hi Guru's,
I am trying to write a scripts that will automate my image provisoining process.
Scenario:
I have Linux Image Hosted on cloud which needs to be provisoned before it can be used. Currently we log onto the image through the putty on windows and connect to linux instance. I... (3 Replies)
Discussion started by: taqvia
3 Replies
5. UNIX for Advanced & Expert Users
I have written the below scripts .
ldap_pwd_prompt.ksh
#!/usr/bin/ksh
passwd -r ldap
interactive_pwd_change.exp
#!/usr/local/bin/expect
set timeout 10
set curpass
set newpass
spawn ./ldap_pwd_prompt.ksh
expect "Enter existing login password:"
send "$curpass\r"
expect "New... (6 Replies)
Discussion started by: dr46014
6 Replies
6. UNIX for Dummies Questions & Answers
Could any one tell me , how to start a thread here, i just searching for so long. sorry to post in irrelavent here
---------- Post updated at 08:19 AM ---------- Previous update was at 08:00 AM ----------
Hi,
I got a requirement to automate the process.
We have SLA files, there are... (1 Reply)
Discussion started by: afahmed
1 Replies
7. Shell Programming and Scripting
Hi All,
I have a shell script that is integrated with a fault management system. It periodically monitors the system and raises an alarm. This script has different functions and it accepts input from us on the console. Is there any way to invoke it using a shell script ?
Please advise.
... (2 Replies)
Discussion started by: praviper
2 Replies
8. UNIX for Advanced & Expert Users
Our application runs on AIX and the users of the application do not have a way to land at the prompt/shell by any means. When they login to the box, the application opens up directly. I would like to know of a way to automate the password reset process for these user ids, without them having to... (2 Replies)
Discussion started by: ggayathri
2 Replies
9. UNIX for Beginners Questions & Answers
Hi,
we are running solaris 5.10 and looking for solutions to automate password resets? Plz assist.
Thanks,
Sridhar (6 Replies)
Discussion started by: chvgms
6 Replies
10. Forum Support Area for Unregistered Users & Account Problems
I was unable to login and so used the "Forgotten Password' process. I was sent a NEWLY-PROVIDED password and a link through which my password could be changed. The NEWLY-PROVIDED password allowed me to login.
Following the provided link I attempted to update my password to one of my own... (1 Reply)
Discussion started by: Rich Marton
1 Replies
LEARN ABOUT HPUX
gss_auth_rules
gss_auth_rules(5) Standards, Environments, and Macros gss_auth_rules(5)
NAME
gss_auth_rules - overview of GSS authorization
DESCRIPTION
The establishment of the veracity of a user's credentials requires both authentication (Is this an authentic user?) and authorization (Is
this authentic user, in fact, authorized?).
When a user makes use of Generic Security Services (GSS) versions of the ftp or ssh clients to connect to a server, the user is not neces-
sarily authorized, even if his claimed GSS identity is authenticated, Authentication merely establishes that the user is who he says he is
to the GSS mechanism's authentication system. Authorization is then required: it determines whether the GSS identity is permitted to access
the specified Solaris user account.
The GSS authorization rules are as follows:
o If the mechanism of the connection has a set of authorization rules, then use those rules. For example, if the mechanism is Kerberos,
then use the krb5_auth_rules(5), so that authorization is consistent between raw Kerberos applications and GSS/Kerberos applications.
o If the mechanism of the connection does not have a set of authorization rules, then authorization is successful if the remote user's
gssname matches the local user's gssname exactly, as compared by gss_compare_name(3GSS).
FILES
/etc/passwd
System account file. This information may also be in a directory service. See passwd(4).
ATTRIBUTES
See attributes(5) for a description of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Interface Stability |Evolving |
+-----------------------------+-----------------------------+
SEE ALSO
ftp(1), ssh(1), gsscred(1M), gss_compare_name(3GSS), passwd(4), attributes(5), krb5_auth_rules(5)
SunOS 5.10 13 Apr 2004 gss_auth_rules(5)