- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: password aging on non-trusted systems
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2003 07:51 AM
02-21-2003 07:51 AM
I have read many of the forum responses on password aging/trusted systems, etc. I am running 11.00 and going to a trusted system is not looking possible right now. I have set passwd length, history, etc in the default file. I still have this question:
Can I set password aging on a non-trusted system with a paramter in the /etc/default/security file or can I set it default for every user that changes their password (minus root, etc.)? I can't seems to find a straightforward answer on how to do this without manually cahnging every user. I know I can do that easy - but what would happen when they change their password again?
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2003 07:56 AM
02-21-2003 07:56 AM
Re: password aging on non-trusted systems
"PASSWORD_HISTORY_DEPTH
This parameter controls the password history depth. A
new password is checked only against the number of most
recently used passwords stored in password history for
a particular user. A user is not allowed to re-use a
previously used password."
Your answer should be yes!
Pete
Pete
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2003 07:58 AM
02-21-2003 07:58 AM
Re: password aging on non-trusted systems
Pete
Pete
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2003 08:01 AM
02-21-2003 08:01 AM
Re: password aging on non-trusted systems
I want to set password aging to all users to 90 days without changing the server to a trusted system. So when they change their password after 90 days it continues with password aging again of 90 days.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2003 08:03 AM
02-21-2003 08:03 AM
Solution- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2003 08:05 AM
02-21-2003 08:05 AM
Re: password aging on non-trusted systems
do
passwd -f $user
done
That should force them to initially change their password.
Pete
Pete
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2003 08:05 AM
02-21-2003 08:05 AM
Re: password aging on non-trusted systems
Excellent ! That is what I needed to know ! Is that documented anywhere ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2003 08:07 AM
02-21-2003 08:07 AM
Re: password aging on non-trusted systems
passwd -f -n 90 $user
Pete
Pete
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2003 08:09 AM
02-21-2003 08:09 AM
Re: password aging on non-trusted systems
for user in `cat /etc/passwd |cut -d : -f 1`
do
passwd -f $user
done
Thanks !
I will add the following line in the script:
"passwd -n 3 -w 7 -x 90"
To start the initial aging process.
Chris
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2003 08:13 AM
02-21-2003 08:13 AM
Re: password aging on non-trusted systems
Yes, I like your "passwd -n 3 -w 7 -x 90" better.
Good luck,
Pete
Pete
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2003 08:24 AM
02-21-2003 08:24 AM
Re: password aging on non-trusted systems
SAM is a good option ti you. Execute SAM:
#sam
then go to the following options:
1. Accounts for Users and Groups
2. Users
3. Go at specific user, press
4. Actions Menu
5. Modifi...
6. [ Modify Password Options... ]
7. Set Password Options to [ Enable Password Aging ]
8. Password Expiration Time (1-63 weeks): 6
Other options changes in this windows up to you.
9. [ OK ]
After this you note that this user in /ect/passwd file have added ",4." and any other char at end of encrypted password field.
Rgds.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-21-2003 08:29 AM
02-21-2003 08:29 AM
Re: password aging on non-trusted systems
As always, the man pages offer a wealth of information beyond command syntax. In this case, the 'passwd(1)' and 'passwd(4)' pages have quite a good discussion.
Remember that you can find "pointers" to man pages by keyword. In this case:
# man -k passwd
Regards!
...JRF...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-10-2006 04:04 AM
02-10-2006 04:04 AM
Re: password aging on non-trusted systems
1) If I run a script to enable on all users, what does this do to the users where aging is already active? Does it "reset" the expiration date, or just ignore it? My biggest fear is that all 1000 users will expire on the same day.
2) I'd rather not force any password changes. Does enabling password aging affect current passwords at all. Meaning, if my account currently has no aging, and I enable it, will my password still work?
Thanks!
Jason