[Webinar] Streamline your web hosting managementRegister Today


Solaris password controls version 9

Posted on 2008-02-07
Medium Priority
Last Modified: 2013-12-27
How do you setup password controls in Solaris version 9?
Password length, Password history, Account Lockout, Maxweeks, Minweeks.

Is there some configuration files that this information can looked at.

Question by:mutec1
  • 2
LVL 48

Expert Comment

ID: 20843442
Out of the box, Solaris 9 doesn't support account lockouts and password history.  You can change the default password settings in /etc/default/passwd

Note that by default Solaris only recognises passwords up to 8 characters.  From Solaris 9 onwards, you can change this to use MD5 passwords (as per the Linux world) which have a maximum length of 255 characters.  This is set in /etc/security/policy.conf

Author Comment

ID: 20843498
Can provide a screen print or location that I can view what the configuration file looks like.

LVL 22

Expert Comment

by:Brian Utterback
ID: 20843569
What can and cannot be done regarding the password in Solaris 9 depends on the naming
service used. Both the files and nisplus services support all the features, while the nis naming
service has limited features.

To finound how to set them, see the man  page for passwd.
LVL 48

Accepted Solution

Tintin earned 2000 total points
ID: 20843582
I don't have access to a Solaris box at the moment.

just do

cat /etc/security/policy.conf
cat /etc/default/passwd

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
With more and more companies allowing their employees to work remotely, it begs the question: What are some of the security risks involved with remote employees and what actions should we take to secure them?
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Get the source code for a fully functional Access application shell with several popular security features that Access VBA application developers desire, but find difficult or impossible to figure out how to code. You get the source code for managi…

591 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question