Sponsored Content
Full Discussion: Password set to null
Operating Systems Solaris Password set to null Post 76194 by zazzybob on Sunday 26th of June 2005 08:21:30 AM
Old 06-26-2005
Hmmm... but surely that will allow anybody to access the box without a password? Is that really what you want??

Cheers
ZB
 

10 More Discussions You Might Find Interesting

1. Solaris

Set Password Never Expire

Hello I want to set the password for user never expire through the command line. For your information the box is running under Solaris 8 platform. (2 Replies)
Discussion started by: shamsul
2 Replies

2. UNIX for Dummies Questions & Answers

Can we set it so people can't use the same password twice?

If we have it so users accounts need a new password after 90 days is there a way to also say that after 90 days they need to use a new password and not let them use the same one twice? (2 Replies)
Discussion started by: LordJezo
2 Replies

3. Solaris

Not able to (re)set the Password

I have installed Solaris 10 x86 in VMware 5.5.I logged in as root user and trying to create new user and also reset the password for existing user, i am getting "Permission Denied Error". I checked the /etc/shadow file, looks fine permission is 400. Earlier i was able to do it but suddenly it... (2 Replies)
Discussion started by: khagendra
2 Replies

4. Red Hat

set password not to expire

Hi All, Is this true on chage command? -M, MAX_DAYS Passing the number -1 as MAX_DAYS will remove checking a password's validity. Does this means password will not expire anymore? Thanks for any comment you may add. (0 Replies)
Discussion started by: itik
0 Replies

5. Solaris

Set Password Account to NP or NL

Hi Everyone, my name`s Sergio. I need your help please. I have a problem using Solaris 9. I create an account with the command line "useradd", with this I have no problem. My problem is I need set the created account to NP (No Password or Non Login). For example: cat /etc/shadow ... (2 Replies)
Discussion started by: roswell
2 Replies

6. Solaris

cant set password for user

hi everybody i cant set password for user (jam) i tried to #passwd jam enter newpasswd : after enter it showing passwd : cannot get default domain:internal yp server or client error i also check cat /etc/shadow file jam:*:LK*:........ user is locked ... and i... (4 Replies)
Discussion started by: coolboys
4 Replies

7. Shell Programming and Scripting

script to set the password from *LK* to *NP*

okay here I go again... I have created a script which adds new user to /etc/password and which inturn creating a locked password in /etc/shadow but I am expecting to have *NP* for that particular user.Can someone help me with a script which can set the password for a particular user to NP in... (1 Reply)
Discussion started by: sintilash
1 Replies

8. Shell Programming and Scripting

How do i set a password to a directory?

A situation where i need to create 10 directories and set its 10 passwords. Since each of the directories contents would be critical, only few users need to access. :wall: I need to write a script so that it creates 10 directories in no time. So, how can i explicitly set a password to a... (1 Reply)
Discussion started by: Manjunath B
1 Replies

9. Shell Programming and Scripting

Script to set password in HP-UX 11.31

Hi, I am unable to set the password remotely. I am using the script as below: ep=`echo "$p" | /usr/lbin/makekey` ssh -t $i "/usr/local/bin/sudo useradd -c "$user_c" -m -d /home/$user_id -s /bin/ksh $user_id; /usr/local/bin/sudo /usr/sam/lbin/usermod.sam -F -p $ep $user_id" The... (0 Replies)
Discussion started by: Kits
0 Replies

10. Solaris

Not able to set password

I have a Solaris-10 non global zone, on which I am not able to reset password, while counts are matching in /etc/passwd and /etc/shadow. I tried searching its solution in various forums, but nothing is working # id -a oemagent uid=56605(oemagent) gid=56595(tess) groups=56595(tess) # passwd -s... (2 Replies)
Discussion started by: solaris_1977
2 Replies
GSHADOW(5)						   File Formats and Conversions 						GSHADOW(5)

NAME
gshadow - shadowed group file DESCRIPTION
/etc/gshadow contains the shadowed information for group accounts. This file must not be readable by regular users if password security is to be maintained. Each line of this file contains the following colon-separated fields: group name It must be a valid group name, which exist on the system. encrypted password Refer to crypt(3) for details on how this string is interpreted. If the password field contains some string that is not a valid result of crypt(3), for instance ! or *, users will not be able to use a unix password to access the group (but group members do not need the password). The password is used when an user who is not a member of the group wants to gain the permissions of this group (see newgrp(1)). This field may be empty, in which case only the group members can gain the group permissions. A password field which starts with a exclamation mark means that the password is locked. The remaining characters on the line represent the password field before the password was locked. This password supersedes any password specified in /etc/group. administrators It must be a comma-separated list of user names. Administrators can change the password or the members of the group. Administrators also have the same permissions as the members (see below). members It must be a comma-separated list of user names. Members can access the group without being prompted for a password. You should use the same list of users as in /etc/group. FILES
/etc/group Group account information. /etc/gshadow Secure group account information. SEE ALSO
gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1). shadow-utils 4.1.5.1 05/25/2012 GSHADOW(5)
All times are GMT -4. The time now is 04:00 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy