Solved

Verifying password expiration settings in HP-UX

Posted on 2004-09-16
2
1,931 Views
Last Modified: 2013-12-04
I am new to HP-UX systems and prior system administration documentation at this site indicate the by entering a ,A/ between the userid and uid will set an automatic expiration of 90 days.  Is that correct? How can I verify that the expiration is being set.  This is on HP-UX 10 and 11.
0
Comment
Question by:pmccorkle
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 125 total points
ID: 12076288
don't think so.
Can you please tell us which authetification scheme you're using on that system.
0
 

Author Comment

by:pmccorkle
ID: 12082818
I got the answer to my own question and the answer is yes.

Password aging is put in effect for a particular user if his encrypted
password in the password file is followed by a comma and a nonnull
string of characters from the above alphabet.  (Such a string must be
introduced in the first instance by a superuser.) This string defines
the "age" needed to implement password aging.

The first character of the age, M, denotes the maximum number of weeks
for which a password is valid.  A user who attempts to login after his
password has expired is forced to supply a new one.  The next
character, m, denotes the minimum period in weeks that must expire
before the password can be changed.  The remaining characters define
the week (counted from the beginning of 1970) when the password was
last changed (a null string is equivalent to zero).  M and m have
numerical values in the range 0 through 63 that correspond to the 64-
character set of "digits" shown above.  If m = M = 0 (derived from the
string . or ..), the user is forced to change his password next time
he logs in (and the "age" disappears from his entry in the password
 file).  If m > M (signified, for example, by the string ./), then only
 a superuser (not the user) can change the password.  Not allowing the
 user to ever change the password is discouraged, especially on a
 trusted system.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question