1)in solaris11 pam.conf seperated in to multiple file in following location
root@solaris2:~# cd /etc/pam.d
root@solaris2:/etc/pam.d# ls
cron gdm-autologin krsh login passwd rlogin
cups krlogin ktelnet other ppp rsh
# cat other
;
;
# Password construction requirements apply to all users.
# Edit /usr/lib/security/pam_authtok_common and remove force_check
# to have the traditional authorized administrator bypass of construction
;
;
#cd /usr/lib/security
root@solaris2:/usr/lib/security# cat pam_authtok_common
#
# Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
#
# PAM common include file for PAM authentication token manipulation.
# Remove the 'force_check' option from pam_authtok_check(5) to have the
# traditional authorized administrator bypass of construction requirements.
#
other password required pam_dhkeys.so.1
other password requisite pam_authtok_get.so.1
other password requisite pam_authtok_check.so.1 force_check
Remove force_check option
root@solaris2:/usr/lib/security# cat pam_authtok_common
#
# Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
#
# PAM common include file for PAM authentication token manipulation.
# Remove the 'force_check' option from pam_authtok_check(5) to have the
# traditional authorized administrator bypass of construction requirements.
#
other password required pam_dhkeys.so.1
other password requisite pam_authtok_get.so.1
#other password requisite pam_authtok_check.so.1 force_check
other password requisite pam_authtok_check.so.1
NOTE:while installation if u select normal user
#usermod -K type=normal root
cat /etc/user_attr
root::::type=normal
this is for login with root user
then it does not ask force check for passwd
root@solaris2:~# cd /etc/pam.d
root@solaris2:/etc/pam.d# ls
cron gdm-autologin krsh login passwd rlogin
cups krlogin ktelnet other ppp rsh
# cat other
;
;
# Password construction requirements apply to all users.
# Edit /usr/lib/security/pam_authtok_common and remove force_check
# to have the traditional authorized administrator bypass of construction
;
;
#cd /usr/lib/security
root@solaris2:/usr/lib/security# cat pam_authtok_common
#
# Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
#
# PAM common include file for PAM authentication token manipulation.
# Remove the 'force_check' option from pam_authtok_check(5) to have the
# traditional authorized administrator bypass of construction requirements.
#
other password required pam_dhkeys.so.1
other password requisite pam_authtok_get.so.1
other password requisite pam_authtok_check.so.1 force_check
Remove force_check option
root@solaris2:/usr/lib/security# cat pam_authtok_common
#
# Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
#
# PAM common include file for PAM authentication token manipulation.
# Remove the 'force_check' option from pam_authtok_check(5) to have the
# traditional authorized administrator bypass of construction requirements.
#
other password required pam_dhkeys.so.1
other password requisite pam_authtok_get.so.1
#other password requisite pam_authtok_check.so.1 force_check
other password requisite pam_authtok_check.so.1
NOTE:while installation if u select normal user
#usermod -K type=normal root
cat /etc/user_attr
root::::type=normal
this is for login with root user
then it does not ask force check for passwd
No comments:
Post a Comment