- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: user account admin!
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-29-2002 09:59 PM
10-29-2002 09:59 PM
user account admin!
How to realize?
Thanks in advance!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-29-2002 09:57 PM
10-29-2002 09:57 PM
Re: user account admin!
I think you can use /usr/lbin/modprpw or you can see the man pages as it contains lots of options !! :)
Regards,
Patrick
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-29-2002 10:04 PM
10-29-2002 10:04 PM
Re: user account admin!
One more thing forgot to tell you that this command is only available in trusted system.
For a non-trusted system, you can man passwd for details. As your requirement, you should set the password lifetime.
*** quoted from the man page ***
A password dies after a time period known as the password lifetime. After the lifetime passes, the account is locked until it is re- enabled by a system administrator. Once unlocked, the user is forced to change the password before account use.
***
Regards,
Patrick
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-29-2002 10:08 PM
10-29-2002 10:08 PM
Re: user account admin!
Once that is done you can set up a policy (sam can be used for this) so that accounts which are not used for a certain time can be locked.
Be aware that changing your system to 'trusted' will force all passwords to be changed.
There is an alternative and that is to create a script which utilises the 'wtmp' file and Using 'passwd -l accountname'
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-29-2002 10:08 PM
10-29-2002 10:08 PM
Re: user account admin!
this is possible on trusted systems.
see below a quote from man passwd
============================================================
...
SECURITY FEATURES
This section applies only to trusted systems. It describes additional
capabilities and restrictions.
When passwd is invoked on a trusted system, the existing password is
requested (if one is present). This initiates the password
solicitation dialog which depends upon the type of password generation
(format policy) that has been enabled on the account doing the passwd
command. There are four possible options for password generation:
Random syllables A pronounceable password made up of
meaningless syllables.
Random characters An unpronounceable password made up of
random characters from the character
set.
Random letters An unpronounceable password made up of
random letters from the alphabet.
User-supplied A user-supplied password, subject to
length and triviality restrictions.
Passwords can be greater than eight characters, but it is recommended
that they be less than 40 characters. System warnings are displayed
if passwords lengths are either too long or short. The system
administrator can specify a maximum password length guideline for the
system generated options (random syllables, random characters, and
random letters). The actual maximum password length depends upon
several parameters in the authentication database and in the
algorithm.
The system requires a minimum time to elapse before a password can be
changed. This prevents reuse of an old password within an undesirable
period of time.
A password expires after a period of time known as the expiration
time. System warnings are displayed as expiration time approaches.
A password dies after a time period known as the password lifetime.
After the lifetime passes, the account is locked until it is re-
enabled by a system administrator. Once unlocked, the user is forced
to change the password before account use.
The system administrator can enable accounts without passwords. If a
user account is allowed to function without a password, the user can
choose a null password by typing a carriage-return when prompted for a
new password.
The system administrator can enable the password history feature to
discourage users from reusing previously used passwords. Refer to the
security(4) manual page for detailed information on configurable
parameters that affect the behavior of this command. The parameter
for password history is:
PASSWORD_HISTORY_DEPTH
Regards
Yogeeraj