Solved

How do I disable password expiration for SSH in Solaris 10?

Posted on 2009-06-30
4
1,138 Views
Last Modified: 2013-12-27
Greetings,

I remember finding this before (and I thought it was in sshd_config) but I can't seem to find where I can disable password expiration in Solaris 10 for SSH.

Any help would be greatly appreciated.
0
Comment
Question by:blaw25
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 16

Accepted Solution

by:
medvedd earned 400 total points
ID: 24748686
passwd -x -1 user_name
0
 
LVL 68

Assisted Solution

by:woolmilkporc
woolmilkporc earned 50 total points
ID: 24748742
Yes, but please keep in mind that there is no password setting exclusively for ssh, it uses just the operating system password (if publickey or the like is not configured/used).
0
 
LVL 30

Assisted Solution

by:Kerem ERSOY
Kerem ERSOY earned 50 total points
ID: 24748994
SSH does not have a provision to create and keep paswords. Passwrd authentication is done with through the hosting OS. So if a user password expires in the os then he won't be able to logon through SSH.
0
 
LVL 30

Expert Comment

by:Kerem ERSOY
ID: 24749026
However if you're interested through logging in using SSH keys please follow the instructions on this article:

http://www.experts-exchange.com/articles/OS/Linux/SSH-access-using-public-key.html
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question