10-06-2001
Help in setting up password without Interaction.
Can anybody tell me how can I create an account without having to enter the password after editing the vipw file. I mean the system should automatically take care of the password encryption in the shadow file and I don't to enter the password again and the Account should be ready to go.
Regards
-Iftikhar
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Can any body help me to write a scripting program for entering a password at run time with out user interaction. (1 Reply)
Discussion started by: kumar_d
1 Replies
2. UNIX for Dummies Questions & Answers
I would like to change the password requirements for all our AIX 5.2 logins but am having trouble finding a place where I can set the rules for everyone at the same time. I know I can go user by user in smit passwords but is there a way to create rules for everyone at the same time?
Thanks,... (2 Replies)
Discussion started by: drathbone
2 Replies
3. UNIX for Advanced & Expert Users
hi all
i am writing a script to create user and group from the input given to script
for eg. script needs to values
1. mode - 1 or 2
2. id - if mode is 1 then id should be 2 char like x1 / v1 / v2
if mode is 2 then id should be 1 char like x / v / e
from these to values group is... (1 Reply)
Discussion started by: zedex
1 Replies
4. Solaris
Hi:
Could I set the:
- Login Time-out Interval
- Password History Count
- Lockout Duration
- Lockout Threshold
for user account in Sun Solaris 5.8.
Thanks for your help (6 Replies)
Discussion started by: mlsun
6 Replies
5. UNIX for Advanced & Expert Users
Hi,
I have installed open ldap according to the order from this video:
YouTube - bowendenning's Channel
sudo apt-get install slapd
sudo apt-get install ldap-utils
sudo apt-get install phpldapadmin
The installaion was good.
However it did NOT ask from me any password.
After I enter to... (0 Replies)
Discussion started by: programAngel
0 Replies
6. AIX
In AIX 5.3 tech level 11:
I want to setup a default password policy to have at least one
of each of the following: alpha character, numeric character, and "special"
character ("!", "&", etc).
The smitty Security and Users --> Passwords --> System Password
Policy screen only offers "MIN... (2 Replies)
Discussion started by: kikwit_phil
2 Replies
7. Solaris
Can anyone kindly explain to me the meaning of the default values of the code below please?
Thank you very much
#MINDIFF=3
#MINALPHA=2
#MINNONALPHA=1
#MINUPPER=0
#MINLOWER=0
#MAXREPEATS=0
#MINSPECIAL=0
#MINDIGIT=0
#WHITESPACE=YES (1 Reply)
Discussion started by: cjashu
1 Replies
8. SuSE
Hi,
I am setting password complexity in SLES 11. I am able to do most of things
pam-config -d --pwcheck
pam-config -a --cracklib
pam-config -a --cracklib-minlen=8
pam-config -a --cracklib-dcredit=-1
pam-config -a --cracklib-ocredit=-1
pam-config -a --pwhistory
pam-config -a... (1 Reply)
Discussion started by: solaris_1977
1 Replies
9. Solaris
Hi All,
I have a problem setting the password when I have to create a user and password as detailed below.
username : gaacj01 password : oshopp01
username : gaacj02 password : oshopp02
username : gaacj03 password : oshopp03
username : gaacj04 password : oshopp04
username : gaacj05 ... (17 Replies)
Discussion started by: kittigolf
17 Replies
10. HP-UX
I need to set password compliance for some servers in my company.
However, the requirements are that we need to set different password policies for 3 different user groups within the company. These are :
System Users: i.e root, etc
Batch/Application Users: oracle, bscs, etc
Standard User:... (0 Replies)
Discussion started by: anaigini45
0 Replies
vipw(1M) vipw(1M)
NAME
vipw - edit the password file
SYNOPSIS
DESCRIPTION
edits the password file while setting the appropriate locks, and does any necessary processing after the password file is unlocked. If the
password file is already being edited, you will be told to try again later. The editor is used unless the environment variable indicates
an alternate editor.
performs a number of consistency checks on the password entry for and does not allow a password file with an incorrectly formatted root
entry to be installed. To help reduce the possibility of leaving the system in an unbootable state, root's entry is not considered prop-
erly formatted if it has a user ID that is not zero, or if it has a shell other than or
Please refer to passwd(4) and the manual for further details of password file format.
WARNINGS
An file that is not removed when a system crashes prevents further editing of the file using after the system is rebooted. is the standard
lock used by all commands which knowingly modify
Successful execution of is not sufficient for proper system operation. To help maintain consistency with other system databases, editing
of the password file with is generally discouraged. Please use or to edit
AUTHOR
was developed by the University of California, Berkeley.
FILES
SEE ALSO
chfn(1), chsh(1), passwd(1), sam(1M), useradd(1M), usermod(1M), userdel(1M), passwd(4).
vipw(1M)