Solved

GLOBAL PASSWD

Posted on 2000-04-27
7
380 Views
Last Modified: 2013-12-23
I have some unix machine and I would like my user to logon on any station. I have create accounts on unixstaion1 and now how do I let users to logon to unixstation2.

I tried to copy  below user entry from uinxstaion1 to unixstation2 but it did't work I m not sure that if I need to compile passwd ??


user1:x:1359:10::/export/home/raza:/bin/csh
0
Comment
Question by:raza
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
7 Comments
 

Author Comment

by:raza
ID: 2756659
this is correct one

raza:x:1359:10::/export/home/raza:/bin/csh
0
 
LVL 21

Expert Comment

by:tfewster
ID: 2757095
The "x" in the password field means you're using a shadow password file (/etc/shadow); You need to copy the entry for raza into this file AND ensure the userid (1359) is unique on unixstation2 AND ensure the /etc/group files are the same AND create a home directory for raza on unixstation2 (Unless you are NFS mounting /export/home across to unixstation2).

IMO, you should consider setting NIS up so you only have one password file to maintain and shared home directories.
0
 

Expert Comment

by:nicob
ID: 2772313
Hi,

It is not really necessary to copy over the /etc/shadow file.
You can first remove the 'x' from the /etc/passwd file and then you can run pwconv and then set a password for the user.
pwconv does the following if there is no line for the user in /etc/shadow :

Entries that are in the  /etc/passwd file and  not in  the /etc/shadow  file  will  be  added to the /etc/shadow file.

This command can only be used if you have superuser priviledges and you have to make sure that the 'x' is not in /etc/passwd. If the 'x' is already in /etc/passwd then pwconv thinks that there is already a password set for that specific user in /etc/shadow.

Hope this helps a bit.
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 21

Expert Comment

by:tfewster
ID: 2836726
Are you still there, raza? If so, would you like to accept one of the comments as an answer (depending on which method you used)?

Cheers, Tim
0
 

Author Comment

by:raza
ID: 2838436
well, I got my problem solved somehow.... but I do got some idea from your comment so you may have the points...

One question I still do have that how do I let my user to cange unix password from windows without doing telnet?
0
 

Author Comment

by:raza
ID: 2838441
you may perpose an answer message
0
 
LVL 21

Accepted Solution

by:
tfewster earned 50 total points
ID: 2838751
Glad to hear its working - I'll have a look at the password changing question.
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
This article is a collection of issues that people face from time to time and possible solutions to those issues. I hope you enjoy reading it.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question