10 More Discussions You Might Find Interesting
1. AIX
I am running AIX 7.1 and currently we have samba 3.6.25 installed on the server. As it stands some AIX folders are shared that can be accessed by certain Windows users.
The problem is that since Windows 10 the guest feature no longer works so users have to manually type in their Windows login/pwd... (14 Replies)
Discussion started by: linuxsnake
14 Replies
2. UNIX for Advanced & Expert Users
Using below below command i'm able to connect or authenticate server, In below command password contains special characters
sshpass -v -p 'ASJBA%hs76)#' ssh -q -o ConnectTimeout=5 hostname
But If I pass password as a variable I'm not able to connect or authenticate server, can you please help... (1 Reply)
Discussion started by: sam@sam
1 Replies
3. SuSE
We are having an issue with slow password prompts via SSH login on all of our SLES 11.2 boxes. The output from a ssh -v login attempt shows a delay here:
debug1: SSH2_MSG_SERVICE_ACCEPT receivedThis issue only happens on the first logon of the day; subsequent logons are normal. Adding the client's... (8 Replies)
Discussion started by: j_aix
8 Replies
4. UNIX for Dummies Questions & Answers
Hi!
Im trying to set access from ServerA(SunOS) to ServerB(Some custom Linux with Keyboard Interactive login) with SSH Keys. As a proof of concept I was able to do it between 2 virtual machines. Now in my real life scenario it isnt working.
I created the keys in ServerA, copied them to... (7 Replies)
Discussion started by: RedSpyder
7 Replies
5. Solaris
Hi,
I am facing strange problem in solaris 10.
My requirement is that on server A using user test, any user which is created on Server B will be able to login wihtout password (ssh) from Server A
All the users which are on Server B are able able to login from Server A using test user.
... (8 Replies)
Discussion started by: manoj.solaris
8 Replies
6. Shell Programming and Scripting
Hello Friends,
I know this issue has been raised many times and hence I tried every resolution provided in the forum before I posted this issue again.
My Password-less RSA authentication was working fine for quite some time. Whenever the remote server password used to change I used to re-do... (5 Replies)
Discussion started by: mehimadri
5 Replies
7. Solaris
I can able to SFTP from my web server unix to apps server unix end. but the other way from APPS server to Web server is still asking me the password. I have done same procedure both side. still i am having same problem. Any one help on this. thanks, regards (3 Replies)
Discussion started by: vijill
3 Replies
8. Solaris
I am using solaris unix 8.2 version. I want to bypass password authentication for sftp. Can you please give some ideas on this. thanks.Regards. (4 Replies)
Discussion started by: vijill
4 Replies
9. Solaris
Hello;
I am moving a customer from Solaris 2.6 to Solaris 2.8. The customer has requested the following two requirements also be implemented:
1. Lock a user account out for X number of days after 3 unsuccessful login attempts.
2. No reuse of the last 5-10 passwords. Also referred to... (1 Reply)
Discussion started by: rambo15
1 Replies
10. Cybersecurity
I would like to know how to validate an unix password from shell script (If is possible)
Thanks very much
;) (3 Replies)
Discussion started by: juan_o_morillo
3 Replies
pam_unix2(8) Reference Manual pam_unix2(8)
NAME
pam_unix2 - Standard PAM module for traditional password authentication
DESCRIPTION
The pam_unix2 PAM module is for traditional password authentication. It uses standard calls from the glibc NSS libraries to retrieve and
set account information as well as authentication. Usually this is obtained from the the local files /etc/passwd and /etc/shadow or from a
NIS map.
The options can be added in the PAM configuration files for every single service. /etc/default/passwd defines, which password encryption
algorithm should be used in case of a password change.
OPTIONS
The following options may be passed to all types of management groups except session:
debug A lot of debug informations are printed with syslog(3).
nullok Normally the account is disabled if no password is set or if the length of the password is zero. With this option the user is
allowed to change the password for such accounts. This option does not overwrite a hardcoded default by the calling process.
use_first_pass
The default is, that pam_unix2 tries to get the authentication token from a previous module. If no token is available, the user is
asked for the old password. With this option, pam_unix2 aborts with an error if no authentication token from a previous module is
available.
The following additional options may be passed to the passwd rules of this modules:
nisdir=<path>
This options specifies a path to the source files for NIS maps on a NIS master server. If this option is given, the passwords of NIS
accounts will not be changed with yppasswd(1), instead the local passwd and shadow files below <path> will be modified. In conjunc-
tion with rpasswdd(8) and pam_make rpc.yppasswdd(8) can be replaced with a more secure solution on the NIS master server.
use_authtok
Set the new password to the one provided by the previously stacked password module. If this option is not set, pam_unix2 would ask
the user for the new password.
One of the following options may be passed to the session rules of this modules:
debug Some messages (login time, logout time) are logged to syslog with priority LOG_DEBUG.
trace Some messages (login time, logout time) are logged to syslog with priority LOG_NOTICE.
none No messages are logged. This is the default.
The acct management does not recognize any additional options. For root, password and login expire are ignored, only on aging warning is
printed. If no shadow information exists, it always returns success.
FILES
/etc/default/passwd
SEE ALSO
login(1), passwd(1), pam.conf(8), pam.d(8), pam_pwcheck(8), pam(8), rpasswd(1), rpasswdd(8), rpc.yppasswdd(8), yppasswd(1)
pam_unix2 August 2006 pam_unix2(8)