?
Solved

Verifying password expiration settings in HP-UX

Posted on 2004-09-16
2
Medium Priority
?
1,941 Views
Last Modified: 2013-12-04
I am new to HP-UX systems and prior system administration documentation at this site indicate the by entering a ,A/ between the userid and uid will set an automatic expiration of 90 days.  Is that correct? How can I verify that the expiration is being set.  This is on HP-UX 10 and 11.
0
Comment
Question by:pmccorkle
2 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 250 total points
ID: 12076288
don't think so.
Can you please tell us which authetification scheme you're using on that system.
0
 

Author Comment

by:pmccorkle
ID: 12082818
I got the answer to my own question and the answer is yes.

Password aging is put in effect for a particular user if his encrypted
password in the password file is followed by a comma and a nonnull
string of characters from the above alphabet.  (Such a string must be
introduced in the first instance by a superuser.) This string defines
the "age" needed to implement password aging.

The first character of the age, M, denotes the maximum number of weeks
for which a password is valid.  A user who attempts to login after his
password has expired is forced to supply a new one.  The next
character, m, denotes the minimum period in weeks that must expire
before the password can be changed.  The remaining characters define
the week (counted from the beginning of 1970) when the password was
last changed (a null string is equivalent to zero).  M and m have
numerical values in the range 0 through 63 that correspond to the 64-
character set of "digits" shown above.  If m = M = 0 (derived from the
string . or ..), the user is forced to change his password next time
he logs in (and the "age" disappears from his entry in the password
 file).  If m > M (signified, for example, by the string ./), then only
 a superuser (not the user) can change the password.  Not allowing the
 user to ever change the password is discouraged, especially on a
 trusted system.
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
This lesson discusses how to use a Mainform + Subforms in Microsoft Access to find and enter data for payments on orders. The sample data comes from a custom shop that builds and sells movable storage structures that are delivered to your property. …
Loops Section Overview
Suggested Courses
Course of the Month15 days, 23 hours left to enroll

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question