- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: Shadow password file
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-15-2000 05:13 AM
09-15-2000 05:13 AM
Shadow password file
I'm looking for software to create a shadow password file. I tried the trusted system setup, but for some reason, it stopped one of my scripts from working that has a remote shell executable in it. It kept asking for the password to connect to the remote machine.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-15-2000 05:19 AM
09-15-2000 05:19 AM
Re: Shadow password file
Not sure why your script is using a remote shell executable, but if you need to do this then ensure your .rhosts and/or /etc/hosts.equiv are setup on your remote machine so you can execute it without requiring a password.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-15-2000 05:28 AM
09-15-2000 05:28 AM
Re: Shadow password file
Since you need a trusted system, you want to make sure that your data transfers (and commands to other machines) are done securely. You might want to look at installing ssh on the servers. The advantage is that with ssh, you can use the private-key exchange to ssh ( replacement for remsh) to another box. Your trusted system will allow that, and from a security stand point, it is a good thing.
The ssh documentation explains how to set up a secure remote execution of commands without passwords (ie. setting up keys.)
cheers.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-15-2000 07:03 AM
09-15-2000 07:03 AM
Re: Shadow password file
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-18-2000 04:30 AM
09-18-2000 04:30 AM
Re: Shadow password file
The result of converting to a trusted system is that you?ll get a trusted computing base
consisting out of files in /etc/tcb ( i think ...) of the usernames which holds the users security policys/information and crypted passwd etc.