- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- How to enable Password Policy using /etc/default/s...
Operating System - HP-UX
1819900
Members
2456
Online
109607
Solutions
Forums
Categories
Company
Local Language
юдл
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
юдл
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО03-10-2010 06:48 AM
тАО03-10-2010 06:48 AM
How to enable Password Policy using /etc/default/security file
Dear Gurus,
I am currently busy testing the above-mentioned on a Testing Server. I created the /etc/default/security with the parameter that I want to implement on our Production server but when testing it does not work. The only parameter that work is " ABORT_LOGIN_ON_MISSING_HOMEDIR" parameter. The other parameters are as follows:
ABORT_LOGIN_ON_MISSING_HOMEDIR=1
MIN_PASSWORD_LENGTH=10
PASSWORD_HISTORY_DEPTH=5
PASSWORD_MIN_UPPER_CASE_CHARS=1
PASSWORD_MIN_LOWER_CASE_CHARS=1
PASSWORD_MIN_DIGIT_CHARS=1
PASSWORD_MIN_SPECIAL_CHARS=1
PASSWORD_MAXDAYS=45
PASSWORD_MINDAYS=0
PASSWORD_WARNDAYS=7
Is there something else that I should install/activate for this to work?
Thank you in advance.
Michael
I am currently busy testing the above-mentioned on a Testing Server. I created the /etc/default/security with the parameter that I want to implement on our Production server but when testing it does not work. The only parameter that work is " ABORT_LOGIN_ON_MISSING_HOMEDIR" parameter. The other parameters are as follows:
ABORT_LOGIN_ON_MISSING_HOMEDIR=1
MIN_PASSWORD_LENGTH=10
PASSWORD_HISTORY_DEPTH=5
PASSWORD_MIN_UPPER_CASE_CHARS=1
PASSWORD_MIN_LOWER_CASE_CHARS=1
PASSWORD_MIN_DIGIT_CHARS=1
PASSWORD_MIN_SPECIAL_CHARS=1
PASSWORD_MAXDAYS=45
PASSWORD_MINDAYS=0
PASSWORD_WARNDAYS=7
Is there something else that I should install/activate for this to work?
Thank you in advance.
Michael
3 REPLIES 3
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО03-10-2010 08:08 AM
тАО03-10-2010 08:08 AM
Re: How to enable Password Policy using /etc/default/security file
What do you mean by "does not work?" What kind of testing are you doing and what are the results of specific tests? Are you on a trusted-mode system, or do you have any security packages installed, such as shadow passwords or standard mode security extensions?
It won't block existing passwords that don't meet the criteria listed, for example - the minimums only apply to new passwords. The minimum length is not applicable to root on non-trusted systems, per the man page.
The PASSWORD_MIN stuff is only available if PHCO_24606 or later is installed, per the man page.
If your system is in trusted mode, you also need to check /tcb/files/auth/system/default, and each user's TCB database entry for values that may override these defaults.
The /etc/default/security file must be world-readable, also, per the man page, and this requirement would necessarily include the /etc and /etc/default directories.
It won't block existing passwords that don't meet the criteria listed, for example - the minimums only apply to new passwords. The minimum length is not applicable to root on non-trusted systems, per the man page.
The PASSWORD_MIN stuff is only available if PHCO_24606 or later is installed, per the man page.
If your system is in trusted mode, you also need to check /tcb/files/auth/system/default, and each user's TCB database entry for values that may override these defaults.
The /etc/default/security file must be world-readable, also, per the man page, and this requirement would necessarily include the /etc and /etc/default directories.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО03-10-2010 08:17 AM
тАО03-10-2010 08:17 AM
Re: How to enable Password Policy using /etc/default/security file
What version of hp-ux are you running? On 11.11, for example, many of these options are available on trusted systems only:
"password history depth configuration is on a system basis and is supported in trusted system for users in files repository only"
Pete
Pete
"password history depth configuration is on a system basis and is supported in trusted system for users in files repository only"
Pete
Pete
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО03-11-2010 04:16 AM
тАО03-11-2010 04:16 AM
Re: How to enable Password Policy using /etc/default/security file
None
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Learn About
News and Events
Support
© Copyright 2025 Hewlett Packard Enterprise Development LP