Tuesday, 24 December 2013

HOW TO AVOID FORCE CHECK FOR PASSWD IN SOLARIS 11

1)in solaris11 pam.conf seperated in to multiple file in following location
root@solaris2:~# cd /etc/pam.d
root@solaris2:/etc/pam.d# ls
cron           gdm-autologin  krsh           login          passwd         rlogin
cups           krlogin        ktelnet        other          ppp            rsh
# cat other
;
;
# Password construction requirements apply to all users.
# Edit /usr/lib/security/pam_authtok_common and remove force_check
# to have the traditional authorized administrator bypass of construction
;
;

#cd /usr/lib/security
root@solaris2:/usr/lib/security# cat pam_authtok_common
#
# Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
#
# PAM common include file for PAM authentication token manipulation.
# Remove the 'force_check' option from pam_authtok_check(5) to have the
# traditional authorized administrator bypass of construction requirements.
#
other   password required       pam_dhkeys.so.1
other   password requisite      pam_authtok_get.so.1
other   password requisite      pam_authtok_check.so.1 force_check
Remove force_check option
root@solaris2:/usr/lib/security# cat pam_authtok_common
#
# Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
#
# PAM common include file for PAM authentication token manipulation.
# Remove the 'force_check' option from pam_authtok_check(5) to have the
# traditional authorized administrator bypass of construction requirements.
#
other   password required       pam_dhkeys.so.1
other   password requisite      pam_authtok_get.so.1
#other  password requisite      pam_authtok_check.so.1 force_check
other   password requisite      pam_authtok_check.so.1

NOTE:while installation if u select normal user
#usermod -K type=normal root
cat /etc/user_attr
root::::type=normal
this is for login with root user

then it does not ask force check for passwd

No comments:

Post a Comment