Avatar of pdegregorio
pdegregorio

asked on 

How to list security policy of Red Hat Linux, specifically need password expiration and grace period thereof

Hello,
I am running Red Hat Enterprise Linux Server release 5.2 and it has a security policy that expires passwords after 90 days. I want to find out specifically what the grace period is (if any) and generally how to list all of the terms of the security policy.
Thank you,
Peter
Linux Security

Avatar of undefined
Last Comment
pdegregorio
ASKER CERTIFIED SOLUTION
Avatar of sweetfa2
sweetfa2
Flag of Australia image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of pdegregorio
pdegregorio

ASKER

Thanks for the quick reply. Here are my results

ast password change                                    : Nov 11, 2010
Password expires                                        : Feb 09, 2011
Password inactive                                       : Feb 09, 2011
Account expires                                         : never
Minimum number of days between password change          : 0
Maximum number of days between password change          : 90
Number of days of warning before password expires       : 5

I interpret this as meaning that if I don't change my password by Feb 09, 2011 I will be locked out and have to get help from the system administrator. At that point what does the administrator do? Is there a command to reactivate the user so they can log in and change their own password?
Avatar of sweetfa2
sweetfa2
Flag of Australia image

As far as I recall you will not be able to login after this date without changing your password.  

I don't believe that it makes your account inactive.

The account expires value would be the one that you would be concerned about in that case.

The super-user could re-activate your password simply by changing it with the passwd command.

SOLUTION
Avatar of noci
noci

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
SOLUTION
Avatar of pdegregorio
pdegregorio

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
Avatar of pdegregorio
pdegregorio

ASKER

My comment (zero points) is accepted as part of the solution because it gives a specific and practical use example.
Linux Security
Linux Security

The Linux operating system, in all its flavors, has its own share of security flaws that allow intrusions, but there are various mechanisms by which these flaws can be removed, generally divided into two parts: authentication and access control. Authentication is responsible for ensuring that a user requesting access to the system is really the user with the account, while access control is responsible for controlling which resources each account has access to and what kind of access is permitted.

5K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo