SASLDBLISTUSERS2(8) System Manager's Manual SASLDBLISTUSERS2(8)NAME
sasldblistusers2 - list users in sasldb
SYNOPSIS
sasldblistusers2 [-f file] [-v]
DESCRIPTION
sasldblistusers2 is used to list the users in the SASL password database (usually /etc/sasldb2). This will NOT list all the users in
/etc/passwd, shadow, PAM, etc. only those created by SASL (via saslpasswd2).
OPTIONS -f file
use file for sasldb
-v Print libsasl2 version number and exit.
SEE ALSO saslpasswd2(8)
rfc4422 - Simple Authentication and Security Layer (SASL)
CMU SASL March 7, 2005 SASLDBLISTUSERS2(8)
Check Out this Related Man Page
PLUGINVIEWER(8) System Manager's Manual PLUGINVIEWER(8)NAME
pluginviewer - list loadable SASL plugins and their properties
SYNOPSIS
pluginviewer [-a] [-s] [-c] [-b min=N,max=N] [-e ssf=N,id=ID] [-m MECHS] [-x AUXPROP_MECH] [-f FLAGS] [-p PATH]
DESCRIPTION
pluginviewer can be used by a server administrator to troubleshoot SASL installations. The utility can list loadable (properly configured)
client and server side plugins, as well as auxprop plugins.
OPTIONS -a List auxprop plugins.
-s List server authentication (SASL) plugins.
-c List client authentication (SASL) plugins.
-b min=N1,max=N2
List client authentication (SASL) plugins. Strength of the SASL security layer in bits. min=N1 specifies the minumum strength to
use (1 => integrity protection). max=N2 specifies the maximum strength to use. Only SASL mechanisms which support security layer
with strength M such that N1 <= M <= N2 will be shown.
-e ssf=N,id=ID
Assume that an external security layer (e.g. TLS) with N-bit strength is installed. The ID is the authentication identity used by
the external security layer.
-m MECHS
Limit listed SASL plugins to the ones included in the MECHS (space separated) list.
-x AUXPROP_MECHS
Limit listed auxprop plugins to the one listed in the AUXPROP_MECHS (space separated) list.
-f FLAGS
Set security flags. FLAGS is a comma separated list of one or more of the following security flags: noplain (SASL mechanism doesn't
send password in the clear during authentication), noactive (require protection from active attacks), nodict (require mechanisms
which are secure against passive dictionary attacks), forwardsec (require forward secrecy), passcred (require mechanisms that can
delegate client credentials), maximum (require all security flags).
-p PATH
Specifies a colon-separated search path for plugins.
SEE ALSO
rfc4422 - Simple Authentication and Security Layer (SASL)
CMU SASL Apr 10, 2006 PLUGINVIEWER(8)
Hi everyone,
I know the following questions are noobish questions but I am asking them because I am confused about the basics of history behind UNIX and LINUX.
Ok onto business, my questions are-:
Was/Is UNIX ever an open source operating system ?
If UNIX was... (21 Replies)
Hello and thanks in advance for any help anyone can offer me
I'm trying to learn the find command and thought I was understanding it... Apparently I was wrong. I was doing compound searches and I started getting weird results with the -size test. I was trying to do a search on a 1G file owned by... (14 Replies)
hi all,
i have installed quota on my centos 7 machine and its what im after (setting size limit on users, so they cant fill the hard drive)
i want to now make this part of my create user script for my sftp server so i want to do a echo and a read command so i capture the limit they enter... (0 Replies)
Hi everybody,
Which Unix base OS have best performance for HOST virtualization?
I tested SmartOS but it needs another OS to connect remotely!
Thanks in advance. (11 Replies)
Hi All,
I need to write a shell script which opens a file and increments the version(text) within the file every time the script runs. For example:
$ cat docker_file.yml
version: '3.1'
services:
ui:
image: repo-srv.dev.io:5000/facebook/ui:0.0.2-QA1
$
So, I would like... (6 Replies)
Dear Team
We use DB2 v10.5 and using DBArtisan tool
Can someone please guide how to convert digits to binary numbers using db2 feature.
Ex> for number 9 , binary should be 1001 ( 8+1)
Any help appreciated. Thanks (2 Replies)
hi folks,
how to using tar with exclude directory and compress it using tar.Z
i only know how to exclude dir only with this command below:
tar -cvf /varios/restore/test.tar -X excludefile.txt /jfma/test1/
how to compress it using 1 command?
Thanx
Please use CODE tags as... (6 Replies)
Quite an obscure question I think.
We have a rebuild process for remote sites that allows us to PXE rebuild a till (actually a PC with a touch screen and various fancy bits) running CentOS. The current CentOS5 tills work just fine with a tar image restore and some personalisation. Sadly,... (4 Replies)
Hello All,
I had recently learnt a bit of Docker(which provides containerization process).
Here are some of my learning points from it.
Let us start first with very basic question:
What is Docker:
Docker is a platform for sysadmins and developers to DEPLOY, DEVELOP and RUN applications ... (7 Replies)
What is the point of this? Whenever I close my shell it appends to the history file without adding this. I have never seen it overwrite my history file.
# When the shell exits, append to the history file instead of overwriting it
shopt -s histappend (3 Replies)
Hello... And thanks in advance for any help anyone can offer me
I was trying to work out the differences between displaying modify, access, and change times with the 'ls' command. Everything seems in order when I look at files, but the access time on a directory doesn't seem to change when I... (4 Replies)
Hello everyone,
I am having an issue here with CentOS release 6.6 (Final) that shows all of the space used up, but I can't tell where the space went.
Seemingly I am using up 100%, according to
df -h
Filesystem Size Used Avail Use% Mounted on... (27 Replies)
I'm trying to use a bash script for a psych experiment that involves listening to sound files and responding. If I have something like the code below, how can I make sure that a key press is assigned to RESPONSE only after the second echo statement?
for i in 1 2 3; do
echo "Ready?"
sleep 2
... (10 Replies)
After the success of the jq - tool for parsing and manipulating JSON-Data someone wrote a tool called yq, which aims to be the same for YAML, what jq is for JSON. Seems to work fine. I'll definitely give it a chance in future.
Example YAML-File:
--- !ruby/object:Puppet::Node::Facts
... (1 Reply)
Dear All,
I am very pleased to announce that Dave Munro (gull04) is joining the Moderation Team, after being a very valuable member of UNIX.com for 15+ years.
Dave is an IT Consultant with 30 years of experience this year, has worked in many of the industry vertical market segments and has... (6 Replies)