Posted on 2000-04-27
Medium Priority
Last Modified: 2013-12-23
I have some unix machine and I would like my user to logon on any station. I have create accounts on unixstaion1 and now how do I let users to logon to unixstation2.

I tried to copy  below user entry from uinxstaion1 to unixstation2 but it did't work I m not sure that if I need to compile passwd ??

Question by:raza
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3

Author Comment

ID: 2756659
this is correct one

LVL 21

Expert Comment

ID: 2757095
The "x" in the password field means you're using a shadow password file (/etc/shadow); You need to copy the entry for raza into this file AND ensure the userid (1359) is unique on unixstation2 AND ensure the /etc/group files are the same AND create a home directory for raza on unixstation2 (Unless you are NFS mounting /export/home across to unixstation2).

IMO, you should consider setting NIS up so you only have one password file to maintain and shared home directories.

Expert Comment

ID: 2772313

It is not really necessary to copy over the /etc/shadow file.
You can first remove the 'x' from the /etc/passwd file and then you can run pwconv and then set a password for the user.
pwconv does the following if there is no line for the user in /etc/shadow :

Entries that are in the  /etc/passwd file and  not in  the /etc/shadow  file  will  be  added to the /etc/shadow file.

This command can only be used if you have superuser priviledges and you have to make sure that the 'x' is not in /etc/passwd. If the 'x' is already in /etc/passwd then pwconv thinks that there is already a password set for that specific user in /etc/shadow.

Hope this helps a bit.
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

LVL 21

Expert Comment

ID: 2836726
Are you still there, raza? If so, would you like to accept one of the comments as an answer (depending on which method you used)?

Cheers, Tim

Author Comment

ID: 2838436
well, I got my problem solved somehow.... but I do got some idea from your comment so you may have the points...

One question I still do have that how do I let my user to cange unix password from windows without doing telnet?

Author Comment

ID: 2838441
you may perpose an answer message
LVL 21

Accepted Solution

tfewster earned 100 total points
ID: 2838751
Glad to hear its working - I'll have a look at the password changing question.

Featured Post

Don't Cry: How Liquid Web is Ensuring Security

WannaCry is just the start. Read how Liquid Web is protecting itself and its customers against new threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Make the most of your online learning experience.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question