<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HPUX Security - Password complexity in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494449#M740993</link>
    <description>Francis,&lt;BR /&gt;&lt;BR /&gt;Sometimes 'compliance' means you have to do a couple of manual steps to fully become compliant.  (Compliance = Able to make compliant.  ;)  )&lt;BR /&gt;&lt;BR /&gt;In your case, adding some of the rules Pete pointed out should get you there.&lt;BR /&gt;&lt;BR /&gt;P.S.  I don't think you have to call him "Mr. Randall", Pete will do.  I certainly don't wantanyone calling me Mr. Payne.&lt;BR /&gt;&lt;BR /&gt;John</description>
    <pubDate>Mon, 28 Feb 2005 22:47:35 GMT</pubDate>
    <dc:creator>John Payne_2</dc:creator>
    <dc:date>2005-02-28T22:47:35Z</dc:date>
    <item>
      <title>HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494443#M740987</link>
      <description>Hi all,&lt;BR /&gt;&lt;BR /&gt;Quick question I hope...&lt;BR /&gt;&lt;BR /&gt;I have many trusted mode systems and I would like to enforce password complexiity.&lt;BR /&gt;&lt;BR /&gt;Everything was fine until I discovered that many users are not using very strong passwords i.e. "abc123"&lt;BR /&gt;&lt;BR /&gt;My question is:&lt;BR /&gt;How come password complexity does not kick in at the moment users are entering their passwords.&lt;BR /&gt;&lt;BR /&gt;I give them a temp password and make sure the "passwd -f $USER" is executed before they login but still they can put "abc123" as their password.&lt;BR /&gt;&lt;BR /&gt;P.S. I know that I did not give points before when I asked questions but I will do it from now on.&lt;BR /&gt;&lt;BR /&gt;TIA&lt;BR /&gt;&lt;BR /&gt;Francis</description>
      <pubDate>Mon, 28 Feb 2005 12:40:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494443#M740987</guid>
      <dc:creator>FLQ</dc:creator>
      <dc:date>2005-02-28T12:40:37Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494444#M740988</link>
      <description>Do you have rstrpw enabled??&lt;BR /&gt;&lt;BR /&gt;man getprdef for details.&lt;BR /&gt;/usr/lbin/getprdef -m rstrpw</description>
      <pubDate>Mon, 28 Feb 2005 12:44:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494444#M740988</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2005-02-28T12:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494445#M740989</link>
      <description>Francis,&lt;BR /&gt;&lt;BR /&gt;Are you using the /etc/default/security file?  You can set PASSWORD_MIN_&lt;TYPE&gt;_CHARS, MIN_PASSWORD_LENGTH, and PASSWORD_HISTORY_DEPTH in the security file.  Have look at the man page for security.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Pete&lt;/TYPE&gt;</description>
      <pubDate>Mon, 28 Feb 2005 12:46:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494445#M740989</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2005-02-28T12:46:42Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494446#M740990</link>
      <description>/usr/lbin/getprdef -m rstrpw&lt;BR /&gt;rstrpw=YES&lt;BR /&gt;&lt;BR /&gt;what are the values of PASSWORD_MIN_&lt;TYPE&gt;_CHARS&lt;BR /&gt;&lt;BR /&gt;MIN_PASSWORD_LENGTH is set to the default. i.e. 6&lt;BR /&gt;PASSWORD_HISTORY_DEPTH is set to 1&lt;BR /&gt;To be dealt with later.&lt;BR /&gt;&lt;BR /&gt;I just did a test with a test user.&lt;BR /&gt;&lt;BR /&gt;I set the password to "abc123" as root then passwd -f testuser.&lt;BR /&gt;&lt;BR /&gt;surely enough it asks me to change the password the next time I log in but I was able to set the passwd as that testuser to "cba321".&lt;BR /&gt;&lt;BR /&gt;Which does not make sense.  So I'm wondering if it works at all in regards to password complexity.&lt;BR /&gt;&lt;BR /&gt;TIA&lt;BR /&gt;&lt;BR /&gt;Francis&lt;/TYPE&gt;</description>
      <pubDate>Mon, 28 Feb 2005 13:14:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494446#M740990</guid>
      <dc:creator>FLQ</dc:creator>
      <dc:date>2005-02-28T13:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494447#M740991</link>
      <description>Francis,&lt;BR /&gt;&lt;BR /&gt;"PASSWORD_MIN_&lt;TYPE&gt;_CHARS Parameters of this form are used to require new passwords to have a minimum number of characters of particular types (upper case, lower case, digits or special characters).  This can be helpful in enforcing site security policies about selecting passwords that are not easy to guess. &lt;BR /&gt;&lt;BR /&gt;Note: These parameters apply only if the libpam_unix patch PHCO_24606 or later is installed.&lt;BR /&gt;&lt;BR /&gt;                     PASSWORD_MIN_UPPER_CASE_CHARS=N   Specifies that a minimum of N upper-case characters are required in a password when changed.&lt;BR /&gt;&lt;BR /&gt;                     PASSWORD_MIN_LOWER_CASE_CHARS=N   Specifies that a minimum of N lower-case characters are required in a password when changed.&lt;BR /&gt;&lt;BR /&gt;                     PASSWORD_MIN_DIGIT_CHARS=N   Specifies that a minimum of N digit characters are required in a password when changed.&lt;BR /&gt;&lt;BR /&gt;PASSWORD_MIN_SPECIAL_CHARS=N   Specifies that a minimum of N special characters are required in a password when changed.&lt;BR /&gt;&lt;BR /&gt;Default value: The default for each of these parameters is zero."&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Pete&lt;/TYPE&gt;</description>
      <pubDate>Mon, 28 Feb 2005 13:25:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494447#M740991</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2005-02-28T13:25:06Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494448#M740992</link>
      <description>Thanks Mr. Randall,&lt;BR /&gt;&lt;BR /&gt;these settings look sufficient for the policies we want to enforce for the password.&lt;BR /&gt;&lt;BR /&gt;I will install the patch PHCO_24606 on a test system and validate that I can deploy safely.&lt;BR /&gt;&lt;BR /&gt;But I'm still wondering why "abc123" is a valid password on a system that is supposed to be C2-compliant after being put in Trusted Mode.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Francis</description>
      <pubDate>Mon, 28 Feb 2005 22:08:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494448#M740992</guid>
      <dc:creator>FLQ</dc:creator>
      <dc:date>2005-02-28T22:08:52Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494449#M740993</link>
      <description>Francis,&lt;BR /&gt;&lt;BR /&gt;Sometimes 'compliance' means you have to do a couple of manual steps to fully become compliant.  (Compliance = Able to make compliant.  ;)  )&lt;BR /&gt;&lt;BR /&gt;In your case, adding some of the rules Pete pointed out should get you there.&lt;BR /&gt;&lt;BR /&gt;P.S.  I don't think you have to call him "Mr. Randall", Pete will do.  I certainly don't wantanyone calling me Mr. Payne.&lt;BR /&gt;&lt;BR /&gt;John</description>
      <pubDate>Mon, 28 Feb 2005 22:47:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494449#M740993</guid>
      <dc:creator>John Payne_2</dc:creator>
      <dc:date>2005-02-28T22:47:35Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494450#M740994</link>
      <description>The Department of Defense's Trusted Computer System Evaluation Criteria (TCSEC) describes the different levels (A,B,C,D) and criteria for security. The password complexity issues (ie, freedom given to the user to pick trivial passwords) is sidestepped in the document CSC-STD-002-85 Password Management Standard ( &lt;BR /&gt;&lt;A href="http://security.isu.edu/pdf/cscst285.pdf" target="_blank"&gt;http://security.isu.edu/pdf/cscst285.pdf&lt;/A&gt; ) by stating that all user passwords should be computer generated (an option in a Trusted system). So if you set a security policy that does not allow user-generated passwords, your initial password problem is solved. HP documents some of the details in &lt;A href="http://docs.hp.com/en/B2355-90121/ch01s05.html" target="_blank"&gt;http://docs.hp.com/en/B2355-90121/ch01s05.html&lt;/A&gt;&lt;BR /&gt; &lt;BR /&gt;For subsequent password generation, you can control trivial password choices with the /etc/default/security file options (man security):&lt;BR /&gt; &lt;BR /&gt;MIN_PASSWORD_LENGTH=8&lt;BR /&gt;PASSWORD_HISTORY_DEPTH=10&lt;BR /&gt;PASSWORD_MIN_UPPER_CASE_CHARS=2&lt;BR /&gt;PASSWORD_MIN_LOWER_CASE_CHARS=2&lt;BR /&gt;PASSWORD_MIN_DIGIT_CHARS=2&lt;BR /&gt;PASSWORD_MIN_SPECIAL_CHARS=2&lt;BR /&gt; &lt;BR /&gt;The above entries will fail all simple passwords like abc123 or even 4321abcd. Because the above settings require lower and UPPER case plus numbers and special characters, the user is severely constrained on trivial choices.&lt;BR /&gt; &lt;BR /&gt;Note: Making passwords very long (minimum greater than 8 chars) and very complex, and requiring monthly changes brings in a totally different security issue: human nature. Using the above rules, the password:&lt;BR /&gt; &lt;BR /&gt;AbCd12%&amp;amp;&lt;BR /&gt; &lt;BR /&gt;will meet the minimum requirements but users will find it difficult to remember and this brings in an even worse scenario: yellow stickys and PDAs with lists of passwords. While the goal is to make guessing passwords difficult, if you go too far, then the passwords start appearing in unsecure locations, especially with sysadmins or DBAs that have responsibilities for many systems.&lt;BR /&gt; &lt;BR /&gt;So there is a fine line between preventing trivial password creation and undesired user behavior. Casual users will simply call the helpdesk and ask for a new password. Eventually, highly intrusive rules get overruled and simplified by upper management.</description>
      <pubDate>Mon, 28 Feb 2005 22:56:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494450#M740994</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2005-02-28T22:56:07Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494451#M740995</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;In addition to previous comments, you can also manually add unsuitable passwords to the spell(1) dictionary and then enable dictionary checks.  There's info on adding words in the man page for spell(1).&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;&lt;BR /&gt;Darren.</description>
      <pubDate>Tue, 01 Mar 2005 05:07:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494451#M740995</guid>
      <dc:creator>Darren Prior</dc:creator>
      <dc:date>2005-03-01T05:07:32Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494452#M740996</link>
      <description>I did not realize how busy I was... :-(&lt;BR /&gt;&lt;BR /&gt;John, I understand that I will have to do manual steps...but triviality checks should have rejected that kind of password.&lt;BR /&gt;&lt;BR /&gt;Using the different variables available did the trick.&lt;BR /&gt;&lt;BR /&gt;Bill, thank you for providing the link to Password Management Standard, very interesting document.&lt;BR /&gt;&lt;BR /&gt;The man pages that I have on my systems don't contain the PASSWORD_MIN_type_CHARS definition.&lt;BR /&gt;&lt;BR /&gt;Token authentication ( SecureID ), biometrics, etc...&lt;BR /&gt;&lt;BR /&gt;Darren, I already tried that but would be a tedious task to maintain.  Not a solution.&lt;BR /&gt;&lt;BR /&gt;Thank you all&lt;BR /&gt;&lt;BR /&gt;Francis</description>
      <pubDate>Thu, 10 Mar 2005 23:29:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494452#M740996</guid>
      <dc:creator>FLQ</dc:creator>
      <dc:date>2005-03-10T23:29:54Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494453#M740997</link>
      <description>Francis,&lt;BR /&gt;&lt;BR /&gt;Probably the policy is a little more complex than required.&lt;BR /&gt;&lt;BR /&gt;I read this thread carefully and the efforts were excellent. My colleagues deserve the 10 seconds it will take to assign them points.&lt;BR /&gt;&lt;BR /&gt;0 for me.&lt;BR /&gt;&lt;BR /&gt;Good luck with your issue.&lt;BR /&gt;&lt;BR /&gt;Steven</description>
      <pubDate>Thu, 10 Mar 2005 23:37:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494453#M740997</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-03-10T23:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494454#M740998</link>
      <description>Francis,&lt;BR /&gt;&lt;BR /&gt;&lt;QUOTE&gt;&lt;BR /&gt;Darren, I already tried that but would be a tedious task to maintain. Not a solution.&lt;BR /&gt;&lt;/QUOTE&gt;&lt;BR /&gt;&lt;BR /&gt;Yes it is _THE_ solution!&lt;BR /&gt;&lt;BR /&gt;You can make it VERY simple by just using a complete dictonary (or even 2 different language dictionaries merged; for us Dutch &amp;amp; English).&lt;BR /&gt;Any "special" words, such as company-specific abbreviations, your business lingo, etc, are then all you have to maintain.&lt;BR /&gt;&lt;BR /&gt;While not on HPUX, THAT is what we are using, it works great &amp;amp; costs little effort.&lt;BR /&gt;I would not expect HPUX to behave greatly different!&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;Jan</description>
      <pubDate>Fri, 11 Mar 2005 02:25:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494454#M740998</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2005-03-11T02:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494455#M740999</link>
      <description>You wrote:&lt;BR /&gt; &lt;BR /&gt;&amp;gt; The man pages that I have on my systems don't contain the PASSWORD_MIN_type_CHARS definition.&lt;BR /&gt; &lt;BR /&gt;Most likely, this is an 11.00 system that may not be up to date on patches, specifically security patches. If you haven't done so yet, download the security_patch_check program from &lt;A href="http://software.hp.com" target="_blank"&gt;http://software.hp.com&lt;/A&gt; and run a check on all your systems. This program also has the side benefit of checking patch consistency (all, not just security). The otheruseful tool in patch management is check_patches, useful after any major patch update.</description>
      <pubDate>Fri, 11 Mar 2005 07:42:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494455#M740999</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2005-03-11T07:42:05Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494456#M741000</link>
      <description>Hi Francis,&lt;BR /&gt;&lt;BR /&gt;I have set the following in my /etc/default/security file.&lt;BR /&gt;&lt;BR /&gt;PASSWORD_HISTORY_DEPTH=5&lt;BR /&gt;SU_ROOT_GROUP=ADMIN&lt;BR /&gt;ABORT_LOGIN_ON_MISSING_HOMEDIR=1&lt;BR /&gt;MIN_PASSWORD_LENGTH=8&lt;BR /&gt;PASSWORD_MIN_UPPER_CASE_CHARS=2&lt;BR /&gt;PASSWORD_MIN_LOWER_CASE_CHARS=2&lt;BR /&gt;PASSWORD_MIN_DIGIT_CHARS=2&lt;BR /&gt;PASSWORD_MIN_SPECIAL_CHARS=1&lt;BR /&gt;UMASK=077&lt;BR /&gt;PASSWORD_MAXDAYS=30&lt;BR /&gt;PASSWORD_MINDAYS=5&lt;BR /&gt;PASSWORD_WARNDAYS=7&lt;BR /&gt;&lt;BR /&gt;The explanation for all the above is given in the man page very clearly.&lt;BR /&gt;&lt;BR /&gt;You cam also see the following link.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://docs.hp.com/en/B3921-90010/security.4.html" target="_blank"&gt;http://docs.hp.com/en/B3921-90010/security.4.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Syam</description>
      <pubDate>Fri, 11 Mar 2005 08:54:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494456#M741000</guid>
      <dc:creator>Ranjith_5</dc:creator>
      <dc:date>2005-03-11T08:54:31Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494457#M741001</link>
      <description>One More thing..&lt;BR /&gt;&lt;BR /&gt;On HP-UX 11.0, in order to take advantage of the /etc/default/security settings, the patch PHCO_26089 must be installed. In the later versions patch is not required.Mine is a higher version and I am able to get the functionality without loading this patch.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Syam</description>
      <pubDate>Fri, 11 Mar 2005 08:58:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494457#M741001</guid>
      <dc:creator>Ranjith_5</dc:creator>
      <dc:date>2005-03-11T08:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494458#M741002</link>
      <description>I want to exclude root user from this complexity setting. How can i do it?</description>
      <pubDate>Thu, 25 May 2006 00:12:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494458#M741002</guid>
      <dc:creator>Amitava_HP-UX</dc:creator>
      <dc:date>2006-05-25T00:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494459#M741003</link>
      <description>You can run SAM and modify the root user security settings. Note that this is considered to be bad sysadmin practice since the root user is so powerful. All security attacks on your system will be to obtain root privileges, so weak password rules for root will make this attack much easier for a hacker.</description>
      <pubDate>Thu, 25 May 2006 08:48:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494459#M741003</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2006-05-25T08:48:07Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494460#M741004</link>
      <description>I could not find any such settings like password complexity in SAM, Pls let me know if any other way is there.</description>
      <pubDate>Thu, 25 May 2006 09:19:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494460#M741004</guid>
      <dc:creator>Amitava_HP-UX</dc:creator>
      <dc:date>2006-05-25T09:19:30Z</dc:date>
    </item>
    <item>
      <title>Re: HPUX Security - Password complexity</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494461#M741005</link>
      <description>The command is /usr/lbin/modprpw but you probably do not have the man page for this command on 11.00. It's a pain to go through all the options anyways. You change the password options in SAM by selecting:&lt;BR /&gt; &lt;BR /&gt;Accounts for users --&amp;gt; Users&lt;BR /&gt; &lt;BR /&gt;Then scroll down to the root user, highlight it by pressing return, then select Actions at the top menu and pick Modify. You may get a warning message so select Yes to continue. Then tab down to Modify Password Options... and make your changes for root.&lt;BR /&gt;</description>
      <pubDate>Thu, 25 May 2006 18:25:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hpux-security-password-complexity/m-p/3494461#M741005</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2006-05-25T18:25:05Z</dc:date>
    </item>
  </channel>
</rss>

