<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application integrated login in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/application-integrated-login/m-p/2828123#M754776</link>
    <description>Hi Rui,&lt;BR /&gt;&lt;BR /&gt;Not to my knowledge.&lt;BR /&gt;&lt;BR /&gt;You could code your own verification using makekey.  I've wrote some about it in:&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x087e402f24d5d61190050090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x087e402f24d5d61190050090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The problem I have with doing this is that you would be reading the user's login password.  In my opinion, and for security reasons, no one should know another's password, even the administrator.  Of course, the admin could sniff the passwords unless you use ssh.  Even that can be broken though.&lt;BR /&gt;&lt;BR /&gt;Darrell</description>
    <pubDate>Thu, 17 Oct 2002 14:00:31 GMT</pubDate>
    <dc:creator>Darrell Allen</dc:creator>
    <dc:date>2002-10-17T14:00:31Z</dc:date>
    <item>
      <title>Application integrated login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/application-integrated-login/m-p/2828122#M754775</link>
      <description>Hi all,&lt;BR /&gt;&lt;BR /&gt;I want to align the password check of my application with the passwd file.&lt;BR /&gt;&lt;BR /&gt;Ie the username / password provided by the user should be checked with &lt;BR /&gt;the crypted password in /etc/passwd... (customer requirement...)&lt;BR /&gt;&lt;BR /&gt;Is there some built-in tool for this?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance,&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Rui.</description>
      <pubDate>Thu, 17 Oct 2002 13:42:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/application-integrated-login/m-p/2828122#M754775</guid>
      <dc:creator>Rui Vilao</dc:creator>
      <dc:date>2002-10-17T13:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: Application integrated login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/application-integrated-login/m-p/2828123#M754776</link>
      <description>Hi Rui,&lt;BR /&gt;&lt;BR /&gt;Not to my knowledge.&lt;BR /&gt;&lt;BR /&gt;You could code your own verification using makekey.  I've wrote some about it in:&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x087e402f24d5d61190050090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x087e402f24d5d61190050090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The problem I have with doing this is that you would be reading the user's login password.  In my opinion, and for security reasons, no one should know another's password, even the administrator.  Of course, the admin could sniff the passwords unless you use ssh.  Even that can be broken though.&lt;BR /&gt;&lt;BR /&gt;Darrell</description>
      <pubDate>Thu, 17 Oct 2002 14:00:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/application-integrated-login/m-p/2828123#M754776</guid>
      <dc:creator>Darrell Allen</dc:creator>
      <dc:date>2002-10-17T14:00:31Z</dc:date>
    </item>
    <item>
      <title>Re: Application integrated login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/application-integrated-login/m-p/2828124#M754777</link>
      <description>It's fairly simple.&lt;BR /&gt;&lt;BR /&gt;1) Read the existing user's entry in the passwd file and strip off the first two characters. These become the 'salt'.&lt;BR /&gt;2) Read the user supplied plaintext password.&lt;BR /&gt;3) Call the crypt() function &lt;BR /&gt;*newpass = crypt(plaintext,salt);&lt;BR /&gt;&lt;BR /&gt;if (strcmp(newpass,old_passwd) == 0) &lt;BR /&gt;  {&lt;BR /&gt;    /* passwords match&lt;BR /&gt;  }&lt;BR /&gt;&lt;BR /&gt;man getpwnam, getpass, and 3 crypt for details.&lt;BR /&gt;&lt;BR /&gt;You can also do this quite easily in Perl.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 17 Oct 2002 14:02:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/application-integrated-login/m-p/2828124#M754777</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2002-10-17T14:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: Application integrated login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/application-integrated-login/m-p/2828125#M754778</link>
      <description>Hello Rui,&lt;BR /&gt;&lt;BR /&gt;The only solution I found was to get the user name and password, the get 2 first 2 chars of the password of this user in /etc/passwd and crypt the entered password using a "salt key" composed of the 2 chars. Example ...&lt;BR /&gt;&lt;BR /&gt;user phelix&lt;BR /&gt;password bb&lt;BR /&gt;&lt;BR /&gt;in /etc/password, get the password field (use getpwent in C) :&lt;BR /&gt;&lt;BR /&gt;phelix:6GnuUoFPCmjY6:370:30: Jean-Louis Phelix :/home/phelix:/usr/bin/sh&lt;BR /&gt;&lt;BR /&gt;So here, the ouput of this program should be the same password as in /etc/passwd.&lt;BR /&gt;&lt;BR /&gt;#include &lt;CRYPT.H&gt;&lt;BR /&gt;#include &lt;UNISTD.H&gt;&lt;BR /&gt;main ()&lt;BR /&gt;{&lt;BR /&gt;  printf("%s\n", crypt("bb","6G"));&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;--&amp;gt; 6GnuUoFPCmjY6&lt;BR /&gt;&lt;BR /&gt;Good luck ...&lt;BR /&gt;&lt;BR /&gt;Jean-Louis.&lt;/UNISTD.H&gt;&lt;/CRYPT.H&gt;</description>
      <pubDate>Thu, 17 Oct 2002 14:05:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/application-integrated-login/m-p/2828125#M754778</guid>
      <dc:creator>Jean-Louis Phelix</dc:creator>
      <dc:date>2002-10-17T14:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: Application integrated login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/application-integrated-login/m-p/2828126#M754779</link>
      <description>By the way, if using makekey on a password less than 8 characters, the "padding" character is a "null".&lt;BR /&gt;&lt;BR /&gt;Darrell</description>
      <pubDate>Thu, 17 Oct 2002 14:14:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/application-integrated-login/m-p/2828126#M754779</guid>
      <dc:creator>Darrell Allen</dc:creator>
      <dc:date>2002-10-17T14:14:33Z</dc:date>
    </item>
    <item>
      <title>Re: Application integrated login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/application-integrated-login/m-p/2828127#M754780</link>
      <description>Use pam_unix(5).&lt;BR /&gt;&lt;BR /&gt;All of the other responses are quite detailed and may actually be easier to implement, but they won't work on a trusted system and they won't properly implement password policies.&lt;BR /&gt;&lt;BR /&gt;pam (pluggable authentication modules) were designed for this.</description>
      <pubDate>Sat, 19 Oct 2002 16:59:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/application-integrated-login/m-p/2828127#M754780</guid>
      <dc:creator>Keith Buck</dc:creator>
      <dc:date>2002-10-19T16:59:05Z</dc:date>
    </item>
  </channel>
</rss>

