Sponsored Content
Top Forums UNIX for Advanced & Expert Users Disable password expire in HP UNIX Post 82348 by Awadhesh on Wednesday 31st of August 2005 05:01:57 AM
Old 08-31-2005
Try !!!!

try /usr/lbin/modprpw commond, if it is trusted system
man modprpw

Regards,
Awadhesh
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

password will expire

login: TEST7 TEST7's Password: Your password will expire: Wed Feb 19 14:28:08 2003 How can I the same information become in a script (as example in the .profile)????????? My login starts with .profile. These File is a menue with 24 lines and the message " Your password ....." disappear to... (8 Replies)
Discussion started by: Erwin Stocker
8 Replies

2. Shell Programming and Scripting

Password expire

Hi, Is there any way to find out the UNIX user's password expire date?. It'll we helpful to inform the users to change the password before it get expires.(FYI - I am not having only admin previlege.) (1 Reply)
Discussion started by: sharif
1 Replies

3. Solaris

Set Password Never Expire

Hello I want to set the password for user never expire through the command line. For your information the box is running under Solaris 8 platform. (2 Replies)
Discussion started by: shamsul
2 Replies

4. Red Hat

set password not to expire

Hi All, Is this true on chage command? -M, MAX_DAYS Passing the number -1 as MAX_DAYS will remove checking a password's validity. Does this means password will not expire anymore? Thanks for any comment you may add. (0 Replies)
Discussion started by: itik
0 Replies

5. Solaris

Problem with password expire and sudo.

Hi, I have a small problem that I need to address regarding the password expiration for a number of different oracle accounts. Currently I have the MAXWEEKS set to 12 in the /etc/default/passwd file for all accounts. I also have sudo installed on the server and users access the oracle accounts... (2 Replies)
Discussion started by: sparcman
2 Replies

6. UNIX for Advanced & Expert Users

SFTP password expire error

Hi, I am using sftp in batch script for which all configuration for public/private keys are done and it works fine without asking a password. No issues till this point. Now I the problem I have is that if the password expires/someone changes the authentication keys at reote server then the... (4 Replies)
Discussion started by: coolwade
4 Replies

7. AIX

Password Expire Message

Does anyone know if the default message displayed when a users password has expired can be changed? I am just assuming the message below is the default one. If so please tell. Using username "justinxx". justinxx@160.23.12.44's password: WARNING: Your password has expired. You must... (2 Replies)
Discussion started by: juredd1
2 Replies

8. Shell Programming and Scripting

Check for Specific Username Password Expire

hey Guys, I haven't posted in a while, But you guys were really helpful alst time. I have had a issue with User Passwords expiring, and since I dont check /var/cron/log on the regular I never know these suers are expiring, making certain nightly jobs not run. With this script, I want to be... (14 Replies)
Discussion started by: gkelly1117
14 Replies

9. Shell Programming and Scripting

Shell script to set user password to never expire in UNIX servers

Hi, I have a requirement where in i need to write a shell script to set users password to never expire. I know the command which is used to perform the same .. which is chage command. But, could not figure out how to do the same in shell script. Could you please help me with the shell... (3 Replies)
Discussion started by: suren424
3 Replies

10. Solaris

Force to reset password after expire

Hi Lads, I would like place the mechanism of force reset password to user when he login to the server after his password expired. Currently, We are resetting users once in every 60 days using cron job but I am thinking is there any other way to force reset passwords after it expires? I am using... (1 Reply)
Discussion started by: Navkreddy
1 Replies
modprpw(1M)															       modprpw(1M)

NAME
modprpw - modify protected password database SYNOPSIS
username value,... ] username DESCRIPTION
updates the user's protected password database settings. This command is available only to the superuser in a trusted system. Usage other than via SAM, and/or modifications out of sync with may result in serious database corruption and the inability to access the system. All updated values may be verified using the command. See getprpw(1M). uses the configuration file default if is not specified. See nsswitch.conf(4). Options sets user's parameters as defined by the options specified. At least one option is required. If a field is not specified in the option then its value remains unchanged in the database. recognizes the following options: To add a new user entry and to return a random password which the new user must use to login the first time. This entry has to be created with the given username and the Error is returned if the user already exists. May be combined with the option. Unlike the command, it does not create nor populate the home directory, and it does not update This option is specified WITHOUT a user name to expire all user's passwords. It goes through the protected password database and zeroes the successful change time of all users. The result is all users will need to enter a new password at their next login. May be combined with the option. This option is specified with a user name to expire the specified user's password. It zeroes the successful change time. May be combined with the and/or options. To unlock/enable a user's account that has become disabled, except when the lock is due to a missing password or * password. May be combined with the and/or options. This option modifies data for a local user, username. This option must be specified with other options. Modify the database field to the specified value and/or resets locks. Valid with one of the following options: or A list of database fields may be used with comma as a delimiter. An "invalid-opt" is printed, and processing terminates, if a list of database fields passed to contains an invalid database field. Boolean values are specified as YES, NO, or DFT for system default values Numeric values are specified as positive numbers, 0, or -1. If the -1 is specified, the numeric value in the database is removed, allowing the system default value to be used. Time values are specified in days, although the database keeps them in seconds. No aging is present if the following 4 database parameters are all zero: Unless specified by all database fields can be set. They are listed below in the order shown in The database fields are fully explained in prpwd(4). DATABASE FIELD database database Set the uid of the user. No sanity checking is done on this value. database database database Set boot authorization privilege, removes it from the user file. database Set audit id. Automatically limited not to exceed the next available id. database Set audit flag. database Set the minimum time interval between password changes (days). 0 = none. Same as non-trusted mode minimum time. database Set the maximum password length for system generated passwords. database Set password expiration time interval (days). 0 = not expired. Same as non-trusted mode maximum time. database Set password life time interval (days). 0 = infinite. database Modified by options maybe database database Set account expiration time interval (days). This interval is added to "now" to form the value in the database (database 0 = no expiration). database Set the last login time interval (days). Used with database Set password expiration warning time interval (days). 0 = none. database Obsoleted field. database Set whether User Picks Password, database Set whether system generates pronounceable passwords, database Set if generated password is restricted, If password will be checked for triviality. database Set whether null passwords are allowed, is not recommended! database Obsolescent field. database Obsoleted field. database Set whether system generates passwords having characters only, database Set whether system generates passwords having letters only, database Set the time-of-day allowed for login. The format is: Where key has the following values: - Monday - Tuesday - Wednesday - Thursday - Friday - Saturday - Sunday - everyday - Monday -> Friday and Starttime and Endtime are in military format: HHMM, where: 00 <= HH <= 23, and 00 <= MM <= 59. database database database database database database Set Maximum Unsuccessful Login tries allowed. 0 = infinite. database Set the administrator lock, This option is specified WITHOUT a user name to "validate/refresh" all user's passwords. It goes through the protected password database and sets the successful change time to the current time for all users. The result is that all user's password aging restarts at the current time. May be combined with the option. This option is specified with a user name to "validate/refresh" the specified user's password. It sets the successful change time to the current time. May be combined with the and/or options. Delete the user's password and return a random password that the user must later supply to the login process to login and pick a new password. Not valid for root. Also resets locks. May be combined with the option. RETURN VALUE
0 Success. 1 User not privileged. 2 Incorrect usage. 3 Can not find the entry or file. 4 Can not change the entry. 5 Not a Trusted System. EXAMPLES
Set the Minimum time between password changes to 12 (days), set the System generates pronounceable password flag to NO, and set the System generates password having characters only flag to YES. The following example is to restrict the times that user joeblow can get on the system on Mondays and Fridays to 5PM-9PM, and Sundays from 5AM-9AM. Other days are not restricted. WARNINGS
This command is intended for SAM use only. It may change with each release and can not be guaranteed to be backward compatible. Several database fields interact with others. Side effects may not be apparent until much later. Special meanings may apply in the following cases: o an absent field, o a field without a value, o a field with a zero value. Very little, if any checking is done to see if values are valid. It is the user's responsibility to range check values. HP-UX 11i Version 3 is the last release to support trusted systems functionality. FILES
System Password file Protected Password Database System Defaults Database AUTHOR
was developed by HP. SEE ALSO
getprpw(1M), prpwd(4), nsswitch.conf(4). TO BE OBSOLETED modprpw(1M)
All times are GMT -4. The time now is 08:53 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy