Unix & Windows passwords have to be the same ??

Posted on 2006-04-06
Last Modified: 2013-12-04
Ok. First things first, I'm not sure if this is the best place to put this question, but here goes.
I have a windows 2000 AD domain (which I administer). We also have a Unix Database server (SCO openserver release 5.5) (another unix administrator). I am not to unix friendly but he is. We have several employees that have mapped drives to a directory on the unix system. Everything works fine but here is my problem. The windows username and password MUST match UNIX's username and password in order for them to be able to read that directory. Lets say If they happen to change there windows password, then they can no longer access that mapped directory on unix. I have to manually update the unix username/password for that user. Is this something that can be changed or fixed ? Another way around this ? I appreciate all the help, Thank you in advance.
Question by:itly09
    LVL 24

    Accepted Solution

    > Title: Unix & Windows passwords have to be the same ??

    No. Same applies for all OS. My preference is that they always be the same.

    You must supply name and password to access a decent operating system, any OS. If they are different, then you need option to keep entering them again after leaving a system and returning. Passwords are difficult to manage well, for either user or administrator or software. Keeping them the same can let it be automatically used as the default. This helps users and applications and speeds up login time etc.

    If information on fileserver is not 'critical', then you can consider lengthening the time permitted for password changes (Keeping old ones longer) Maybe what some like: "Never expire" - better be good memories anytime password are changed or rarely used. Practise makes perfect
    LVL 14

    Assisted Solution

    LVL 38

    Assisted Solution

    by:Rich Rumble

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Join & Write a Comment

    In a recent article here at Experts Exchange (, I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
    Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

    734 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    24 Experts available now in Live!

    Get 1:1 Help Now