Solved

user id change

Posted on 1999-01-22
10
205 Views
Last Modified: 2010-04-21
..How do I change my
username on the network, a simple command but it escapes me. I think it is the "In real life" part of the finger
0
Comment
Question by:jcolucci
10 Comments
 
LVL 84

Expert Comment

by:ozo
ID: 2009387
su jcolucci

login jcolucci

0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 2009388
if you mean to change the account name, and you have Solaris, see
  man usermod
0
 

Author Comment

by:jcolucci
ID: 2009389
AIX.  No, I just want to change my name for a day. What IS that command??
I don't want to switch users. (su)
0
 

Author Comment

by:jcolucci
ID: 2009390
Edited text of question
0
 
LVL 3

Expert Comment

by:rickyr
ID: 2009391
The "in real life" part is obtained by the finger daemon (yuk) from /etc/passwd.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 84

Expert Comment

by:ozo
ID: 2009392
passwd -f
0
 
LVL 84

Expert Comment

by:ozo
ID: 2009393
chfn
0
 

Author Comment

by:jcolucci
ID: 2009394
Thanks OZO....yes that's it   chfn,
how and where is this command documented?
0
 
LVL 84

Expert Comment

by:ozo
ID: 2009395
Does `man chfn` work on your system?
0
 
LVL 3

Accepted Solution

by:
mliberi earned 50 total points
ID: 2009396
# smitty chuser

fill in user name --> ENTER

fill in the field "user INFORMATION"   --> ENTER (execute command)

You could edit by hand /etc/passwd file (if you have root authority) and change the 5-th field.

if you can't access man pages I suggest to check the URL "www.rs6000.ibm.com/doc_link/en_US/a_doc_lib/aixgen" that contains all the man pages an much more

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Installing FreeBSD… FreeBSD is a darling of an operating system. The stability and usability make it a clear choice for servers and desktops (for the cunning). Savvy?  The Ports collection makes available every popular FOSS application and packag…
I promised to write further about my project, and here I am.  First, I needed to setup the Primary Server.  You can read how in this article: Setup FreeBSD Server with full HDD encryption (http://www.experts-exchange.com/OS/Unix/BSD/FreeBSD/A_3660-S…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now