Solved

Verifying password expiration settings in HP-UX

Posted on 2004-09-16
2
1,917 Views
Last Modified: 2013-12-04
I am new to HP-UX systems and prior system administration documentation at this site indicate the by entering a ,A/ between the userid and uid will set an automatic expiration of 90 days.  Is that correct? How can I verify that the expiration is being set.  This is on HP-UX 10 and 11.
0
Comment
Question by:pmccorkle
2 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 125 total points
ID: 12076288
don't think so.
Can you please tell us which authetification scheme you're using on that system.
0
 

Author Comment

by:pmccorkle
ID: 12082818
I got the answer to my own question and the answer is yes.

Password aging is put in effect for a particular user if his encrypted
password in the password file is followed by a comma and a nonnull
string of characters from the above alphabet.  (Such a string must be
introduced in the first instance by a superuser.) This string defines
the "age" needed to implement password aging.

The first character of the age, M, denotes the maximum number of weeks
for which a password is valid.  A user who attempts to login after his
password has expired is forced to supply a new one.  The next
character, m, denotes the minimum period in weeks that must expire
before the password can be changed.  The remaining characters define
the week (counted from the beginning of 1970) when the password was
last changed (a null string is equivalent to zero).  M and m have
numerical values in the range 0 through 63 that correspond to the 64-
character set of "digits" shown above.  If m = M = 0 (derived from the
string . or ..), the user is forced to change his password next time
he logs in (and the "age" disappears from his entry in the password
 file).  If m > M (signified, for example, by the string ./), then only
 a superuser (not the user) can change the password.  Not allowing the
 user to ever change the password is discouraged, especially on a
 trusted system.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now