<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Password auditing in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866401#M397628</link>
    <description>you can change the system to trusted mode using sam and also you can then edit the password policies as a whole and set them. And the users like root you can select individually later and change them to policy as you wish. &lt;BR /&gt;&lt;BR /&gt;also &lt;BR /&gt;&lt;BR /&gt;/etc/default/security can be like below..&lt;BR /&gt;&lt;BR /&gt;PASSWORD_HISTORY_DEPTH=5&lt;BR /&gt;PASSWORD_MIN_LOWER_CASE_CHARS=2&lt;BR /&gt;PASSWORD_MIN_UPPER_CASE_CHARS=1&lt;BR /&gt;PASSWORD_MIN_DIGIT_CHARS=1&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;And  also check you have all latest security patches installed..&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;Prashant</description>
    <pubDate>Wed, 20 Oct 2004 09:59:32 GMT</pubDate>
    <dc:creator>Prashant Zanwar_4</dc:creator>
    <dc:date>2004-10-20T09:59:32Z</dc:date>
    <item>
      <title>Password auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866396#M397623</link>
      <description>Hi, we're currently going through a security audit, and the old /etc/passwd file is not going to make it. To retain our client base, we need to enforce the following two policies and I'm not sure how to do it:&lt;BR /&gt;1) Maintain at least the last 4 passwords so that they cannot be duplicated.&lt;BR /&gt;2) Lock out account for at least 30 minutes if 6 straight unsuccessful login attempts.&lt;BR /&gt;&lt;BR /&gt;I think the second one can be handled by switching to a trusted system, but I can't find anything on the first. &lt;BR /&gt;(By the way, we're running HP-UX 11i). I would appreciate any pointers, program recommendations, ideas, etc.&lt;BR /&gt;</description>
      <pubDate>Wed, 20 Oct 2004 09:51:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866396#M397623</guid>
      <dc:creator>Gary Hines</dc:creator>
      <dc:date>2004-10-20T09:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: Password auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866397#M397624</link>
      <description>both can be handled by switching to trusted systems.  You can also set the complexity of the password.  I currently have mine set to disable the account after 5 unsuccessful tries at the password.  And It also allows you to set the minimum time between password changes, so i cant change my password 5 times in one day to get back to my original password&lt;BR /&gt;&lt;BR /&gt;Sincerely&lt;BR /&gt;&lt;BR /&gt;--Scott palmer</description>
      <pubDate>Wed, 20 Oct 2004 09:54:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866397#M397624</guid>
      <dc:creator>Scott Palmer_1</dc:creator>
      <dc:date>2004-10-20T09:54:18Z</dc:date>
    </item>
    <item>
      <title>Re: Password auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866398#M397625</link>
      <description>sure, you can achieve both the objectives by converting to a trusted system.&lt;BR /&gt;&lt;BR /&gt;Once the system is converted to a trusted system edit the /etc/default/security file&lt;BR /&gt;&lt;BR /&gt;# vi /etc/default/security&lt;BR /&gt;PASSWORD_HISTORY_DEPTH=4&lt;BR /&gt;#&lt;BR /&gt;&lt;BR /&gt;This will ensure users will not be allowed to use the last 4 passwords.</description>
      <pubDate>Wed, 20 Oct 2004 09:55:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866398#M397625</guid>
      <dc:creator>Sundar_7</dc:creator>
      <dc:date>2004-10-20T09:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: Password auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866399#M397626</link>
      <description>BTW, as far as the second item goes, you can lock the account after N number of unsuccessful login attempts.&lt;BR /&gt;&lt;BR /&gt;But it will remain locked until you manually unlock the user account. You might have to run a script that checks for the locked accounts and unlock them periodically.</description>
      <pubDate>Wed, 20 Oct 2004 09:57:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866399#M397626</guid>
      <dc:creator>Sundar_7</dc:creator>
      <dc:date>2004-10-20T09:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: Password auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866400#M397627</link>
      <description>Trusted systems do maintain a password history, so you can implement the first requirement.&lt;BR /&gt;&lt;BR /&gt;On a trusted system, edit /etc/default/security and change PASSWORD_HISTORY_DEPTH as required.&lt;BR /&gt;&lt;BR /&gt;Password history is stored under /tcb/files/auth/system/pwhist</description>
      <pubDate>Wed, 20 Oct 2004 09:58:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866400#M397627</guid>
      <dc:creator>Simon Hargrave</dc:creator>
      <dc:date>2004-10-20T09:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: Password auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866401#M397628</link>
      <description>you can change the system to trusted mode using sam and also you can then edit the password policies as a whole and set them. And the users like root you can select individually later and change them to policy as you wish. &lt;BR /&gt;&lt;BR /&gt;also &lt;BR /&gt;&lt;BR /&gt;/etc/default/security can be like below..&lt;BR /&gt;&lt;BR /&gt;PASSWORD_HISTORY_DEPTH=5&lt;BR /&gt;PASSWORD_MIN_LOWER_CASE_CHARS=2&lt;BR /&gt;PASSWORD_MIN_UPPER_CASE_CHARS=1&lt;BR /&gt;PASSWORD_MIN_DIGIT_CHARS=1&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;And  also check you have all latest security patches installed..&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;Prashant</description>
      <pubDate>Wed, 20 Oct 2004 09:59:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866401#M397628</guid>
      <dc:creator>Prashant Zanwar_4</dc:creator>
      <dc:date>2004-10-20T09:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: Password auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866402#M397629</link>
      <description>Both can be taken care of.&lt;BR /&gt;&lt;BR /&gt;For first, do man security. This file is /etc/default/security. You need to put option, PASSWORD_HISTORY_DEPTH=4&lt;BR /&gt;&lt;BR /&gt;For 2nd requirement, convert to trusted system, the option you are looking for is umaxlntr, so what happens is after so many tries, the account will get locked. Getting it activated will require some scripting.&lt;BR /&gt;&lt;BR /&gt;Check if account is locked(mlock), check is it locked because of unsuccessful logins(mlock), if yes, unlock after checking last unsuccessful login time(ulogint).&lt;BR /&gt;&lt;BR /&gt;Anil</description>
      <pubDate>Wed, 20 Oct 2004 10:01:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866402#M397629</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2004-10-20T10:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: Password auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866403#M397630</link>
      <description>Thanks to all for the help. I guess it's time to start looking at a trusted system.</description>
      <pubDate>Wed, 20 Oct 2004 10:04:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866403#M397630</guid>
      <dc:creator>Gary Hines</dc:creator>
      <dc:date>2004-10-20T10:04:24Z</dc:date>
    </item>
    <item>
      <title>Re: Password auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866404#M397631</link>
      <description>Thanks again!!</description>
      <pubDate>Wed, 20 Oct 2004 10:05:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/password-auditing/m-p/4866404#M397631</guid>
      <dc:creator>Gary Hines</dc:creator>
      <dc:date>2004-10-20T10:05:16Z</dc:date>
    </item>
  </channel>
</rss>

