shexp(1) [ultrix man page]
shexp(1) General Commands Manual shexp(1) Name shexp - display password expiration information for a user Syntax shexp [-q] [username] Description The command is used to display a user's password expiration information. The specified username, or logname if no username is supplied, is converted to a UID by searching through the passwd file. The UID is then used to look up the user's entry in the Auth Data Base. The password expiration information is then printed out in format. % shexp Expires Tue Dec 6 10:49:18 EST 1988 If the password has already expired the word Expires will be replaced with the word Expired. If password expiration is disabled for the particular user in question the output of will be Never expires. Options -q Instead of displaying the expiration date and time in format, outputs it as three decimal numbers: the minimum password lifetime, the maximum password lifetime, and the password modification time. All three numbers are displayed as they are found in the database. Restrictions Only the super-user may obtain information about users with UIDs other than the real UID of the invoking process. Diagnostics User not found in passwd data base. There is no entry in for the specified username. Cannot stat auth file. The database is missing (security features may not be enabled). Insufficient privilege. An insufficiently privileged user is asking for information about a username with a UID different then their current real-UID. An exit value of 0 indicates a successful operation, any other exit status indicates an error. Files See Also passwd(1), getauthuid(3), auth(5) Security Guide for Users shexp(1)
Check Out this Related Man Page
getauth(8) System Manager's Manual getauth(8) Name getauth, setauth, rmauth - auth database maintenance Syntax getauth [username] setauth rmauth username Description The command takes as it's only argument a user name or UID. If a user name is supplied it is converted to a UID by searching through The UID is then used to look up the users entry in the database. If an entry is found it is converted to an ASCII string with a syntax resem- bling that of the passwd file and printed out as a single line. If no entry is found nothing is printed and an exit status of `1' is returned. # getauth username 1000:idvidfy8d:1920129:3600:2678400:0e:0:1000:0:00:00 The first field is the UID of the entry which is used as the key into the database. Then follows: the encrypted password, password modifi- cation time, minimum password lifetime, maximum password lifetime, account mask, login failure count, audit ID, audit control, audit mask, and a reserved field. If the optional username argument is not supplied to getauth it will produce an output line for every entry in the auth database. The command expects one or more lines from the standard input which must be of a form identical to that produced by the command. The com- mand converts and stores these lines into the database, one entry per line, replacing any entry already existing for the given UID. By piping the output of the command into the input of the command an expensive NOP can be produced: # /usr/etc/sec/getauth | /usr/etc/sec/setauth The command expects exactly one argument, the user name or UID of an auth entry to be deleted. If the entry is found it is erased and deleted. If it is not found no action is taken and an exit status of 1 is returned. Restrictions Only the superuser and members of the group may read information from the auth database. Only the superuser may modify the auth database. Diagnostics An exit value of 0 indicates a successful operation. An exit status of 1 indicates the entry was not found on a lookup or deletion opera- tion. Any other exit status indicates an error. Files See Also getauthuid(3), getpwent(3), auth(5), edauth(8) Security Guide for Administrators getauth(8)