Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

pwunconv(8) [suse man page]

pwunconv(8)						      System Manager's Manual						       pwunconv(8)

NAME
pwunconv - convert from shadow account SYNOPSIS
pwunconv [-P path] DESCRIPTION
pwunconv moves the passwords from /etc/shadow to /etc/passwd. The shadow file will be removed afterwards. All password aging informations will go lost. OPTIONS
-P, --path path The passwd and shadow files are located below the specified directory path. pwunconv will use this files, not /etc/passwd and /etc/shadow. FILES
passwd - user account information shadow - shadow user account information SEE ALSO
passwd(1), passwd(5), shadow(5), pwck(8), pwconv(8) AUTHOR
Thorsten Kukuk <kukuk@suse.de> pwdutils January 2004 pwunconv(8)

Check Out this Related Man Page

vipw(8) 						      System Manager's Manual							   vipw(8)

NAME
vipw,vigr - edit the password, group or shadow file SYNOPSIS
vipw [-g|-p|-s] vigr [-g|-p|-s] DESCRIPTION
vipw/vigr edits the passwd,group or shadow file after setting the appropriate locks to prevent file corruption. vipw edits per default the /etc/passwd file, vigr the /etc/group file. Extended attributes (like ACLs or security attributes) are preserved. ENVIRONMENT
EDITOR If the environment variable exists, the editor specified by this variable is used instead of the default vi(1). OPTIONS
-g, --group Edit /etc/group. -p, --passwd Edit /etc/passwd. -s, --shadow Edit /etc/shadow. -u, --usage Print a usage message and exit. --help Print a more verbose help text and exit. Print version information and exit. FILES
/etc/group - group account information /etc/passwd - user account information /etc/shadow - shadow account information SEE ALSO
attr(5), passwd(1), passwd(5), shadow(5), vi(1) AUTHOR
Thorsten Kukuk <kukuk@suse.de> pwdutils October 2003 vipw(8)

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Shadow

Can some one explain to me how to disable the Shadow file or disconnect it from the passwd file. I am trying to configure a UNIX SCO box to use NIS and it continues to look at its own Shadow file. Thanks (5 Replies)
Discussion started by: mokie44
5 Replies

2. UNIX for Advanced & Expert Users

Authentication token error?!?!

Hi all, I have upgraded my old RedHat 6.2 box to RedHat 7.3. I had couple hundreds of users on that box so i just migrated all the user account to a new box by transfering home directories, and appending to /etc/passwd /etc/shadow /etc/group. I have preserved all permittions. Everything works... (8 Replies)
Discussion started by: solvman
8 Replies

3. HP-UX

No users can login

Dear Forum, I had this case before, all of sudden all users including root can't login. What done is by connecting to console port and resetting root password, "pwunconv" command, reboot server. My question is, how this can happen??? thanks :confused: (3 Replies)
Discussion started by: irda
3 Replies

4. Linux

Convert MD5 password to SHA-512?

Hi, Is it possible to convert MD5 passwords to SHA-512? I'm about to migrate an old slackware server to Debian, then I noticed that they don't use same encryption method. I'm aware that I can change the encryption method in Debian to MD5, but as far as I understand SHA-512 is more secure,... (2 Replies)
Discussion started by: urandom
2 Replies

5. UNIX for Advanced & Expert Users

Converting system to trusted

Hi, I need to convert few HP-UX (V 11.31) machines from un-trusted to trusted. I used the HP SMH to do this on one server. However when I click on "Yes" to proceed with the conversion, I get this error : The attempt to convert this system to a trusted system failed. The command return value... (2 Replies)
Discussion started by: anaigini45
2 Replies

Featured Tech Videos