03-09-2005
get the most accurate/correct copy of /etc/passwd and /etc/shadow from 1 of the servers and propagate that to the rest of the machines ... make sure your users know that they are to use the same account from that point forward to login to all the servers .... then migrate them to NIS+ (or whichever option you like) .... and then remove the local server accounts ....
or .....
create your NIS+ environment now (or whichever option you like) ... create the user accounts like they're supposed to be done ... set the passwords ... have the users login to a test machine that doesn't have their local accounts but references NIS+ ... if that works ... migrate them over to NIS+ completely ... then remove the local accounts ...
![Cool Smilie](https://www.unix.com/images/smilies/cool.gif)
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Is there a way to do remote administration on my Sun/Solaris 2.5? I have a server that is running an old copy of ARCServe 2.2 and I need to do monthly administration on it. The only way to use it is from the server so I want to use a VNC type product to do it. Since I know zip about unix, I am... (1 Reply)
Discussion started by: athpam
1 Replies
2. UNIX for Dummies Questions & Answers
I have an application that runs on Unix and the user administration is managed at a Unix level. The application has an application ID which is linked to the user ids which are created at Unix level. Can you please help if I can be able to track which user used the Application ID and what action was... (0 Replies)
Discussion started by: Kopano
0 Replies
3. UNIX for Dummies Questions & Answers
Hey guys how do you check if an account is locked in tru64, and how do you unlock it? (1 Reply)
Discussion started by: sbn
1 Replies
4. Solaris
hi '
i am creating a primary group and a secondary group for a user.
#groupadd -g 101 test
#groupadd -g 102 test1
#useradd -d /export/home/user1 -m -s /bin/ksh -g test -G test user1
in /etc/passwd i can find the username as user1 and group name as test
and where can i find the... (4 Replies)
Discussion started by: madhudeepan
4 Replies
5. Solaris
Hi All.....
How many maximum no of users can be created in solaris 10.0
Waiting for the reply ..... (2 Replies)
Discussion started by: sendhils13
2 Replies
6. Solaris
unable to run smgroup / smadd command to create or modify the users and directories. (1 Reply)
Discussion started by: sendhils13
1 Replies
7. Shell Programming and Scripting
Dear All,
I need to restrict the users in our server.
1.History & history -c command working all groups & others.So i need to restrict history -c option for groups & others .
2.Any option available to view user activity with all
Eg--->user1 Jul22 10:20:11 date
3.Any other Special... (7 Replies)
Discussion started by: kpoobathi
7 Replies
8. Red Hat
How do I confirm if a user logged in, is remote or local? In the case if the user is remote, how to be sure what authentication/method is it using, like LDAP, NIS or other? (2 Replies)
Discussion started by: kirtikjr
2 Replies
9. AIX
Dear All
Please how can I create a user which would be only able to manage queue printer like creating, release, hold etc a printer queue. He would for example be able to enter commands like :
- lpstat -pprintqueue where printqueue is an existing queue on the server
- enable printqueue... (0 Replies)
Discussion started by: sobnc
0 Replies
chsh(1) General Commands Manual chsh(1)
NAME
chsh - change login shell
SYNOPSIS
chsh [-D binddn] [-P path] [-s shell] [-l] [-q] [-u] [-v] [user]
DESCRIPTION
chsh is used to change the user login shell. A normal user may only change the login shell for their own account, the super user may
change the login shell for any account.
If a shell is not given on the command line, chsh operates in an interactive fashion, prompting the user with the current login shell.
Enter the new value to change the field, or leave the line blank to use the current value. Enter none to remove the current value. The
current value is displayed between a pair of [ ] marks.
The only restrictions placed on the login shell is that the command name must be listed in /etc/shells, unless the invoker is the super-
user, and then any value may be added. An account with a restricted login shell may not change their login shell.
This version of chsh is able to change the shell of local, NIS, NIS+ and LDAP accounts , if the permissions allow it.
OPTIONS
-D, --binddn binddn
Use the Distinguished Name binddn to bind to the LDAP directory. The user will be prompted for a password for simple authentica-
tion.
-P, --path path
The passwd file is located below the specified directory path. chsh will use this files, not /etc/passwd. This is useful for exam-
ple on NIS master servers, where you do not want to give all users in the NIS database automatic access to your NIS server and the
NIS map is build from special files.
-s, --shell
Specify your login shell.
-l, --list-shells
Print the list of shells listed in /etc/shells and exit.
-q, --quite
Don't be verbose.
-u, --usage
Print a usage message and exit.
--help
Print a more verbose help text and exit.
-v, --version
Print version information and exit.
FILES
/etc/passwd - user account information
/etc/shells - list of valid login shells
SEE ALSO
chfn(1), passwd(5), shells(5)
AUTHOR
Thorsten Kukuk <kukuk@suse.de>
pwdutils February 2004 chsh(1)