Welcome to Linux Knowledge Base and Tutorial
"The place where you learn linux"
Linux Magazine - Missing Anything?

 Create an AccountHome | Submit News | Your Account  

Tutorial Menu
Linux Tutorial Home
Table of Contents

· Introduction to Operating Systems
· Linux Basics
· Working with the System
· Shells and Utilities
· Editing Files
· Basic Administration
· The Operating System
· The X Windowing System
· The Computer Itself
· Networking
· System Monitoring
· Solving Problems
· Security
· Installing and Upgrading
· Linux and Windows

Glossary
MoreInfo
Man Pages
Linux Topics
Test Your Knowledge

Site Menu
Site Map
FAQ
Copyright Info
Terms of Use
Privacy Info
Disclaimer
WorkBoard
Thanks
Donations
Advertising
Masthead / Impressum
Your Account

Communication
Feedback
Forums
Private Messages
Surveys

Features
HOWTOs
News Archive
Submit News
Topics
User Articles
Web Links

Google
Google


The Web
linux-tutorial.info

Who's Online
There are currently, 348 guest(s) and 0 member(s) that are online.

You are an Anonymous user. You can register for free by clicking here

  

passwd



SYNOPSIS

       passwd [-f|-g|-s|-k[-q]] [name]
       passwd [-D binddn][-n min][-x max][-w warn][-i inact] user
       passwd [-D binddn] {-l|-u|-d|-S[-a]|-e|-h} name


DESCRIPTION

       passwd changes passwords  for  user  and  group  accounts.
       While  an  administrator  may  change the password for any
       account or group, a normal user is only allowed to  change
       the  password  for their own account.  passwd also changes
       account information, such as the full name  of  the  user,
       their  login shell, password expiry dates and intervals or
       disable an account.

   Password Changes
       If an old password is present, the user is  first  promted
       for  it  and  the  password is compared agaisnt the stored
       one. This can be changed, depending which PAM modules  are
       used.   An  administrator is permitted to bypass this step
       so that forgotten passwords may be changed.

       After the user is authenticated, password  aging  informa­
       tion are checked to see if the user is permitted to change
       their password at this time. Else passwd refuses to change
       the password.

       The  user  is  then  prompted  for a replacement password.
       Care must be taken to not include special control  charac­
       ters  or  characters,  which are not available on all key­
       boards.

       If the password is accepted, passwd will prompt again  and
       compare  the second entry against the first.  Both entries
       are require to match in  order  for  the  password  to  be
       changed.


OPTIONS

       -f     Change the finger (gecos) information. This are the
              users fullname, office room  number,  office  phone
              number  and  home phone number. This information is
              stored  in  the  /etc/passwd  file  and   typically
              printed by finger(1) and similiar programs.

       -g     With  this option, the password for the named group
              will be changed.  The user must be a group adminis­
              trator for the named group or the super user.

       -s     This option is used to change the user login shell.
              A normal user may only change the login  shell  for
              their  own  account,  the super user may change the
              login shell for any account.


       -x max With  this option the maximum number of days during
              which a password is valid is changed. When  maxdays
              plus lastday is less than the current day, the user
              will be required  to  change  his  password  before
              being able to use the account.

       -w warn
              With  this  option  the  number  of days of warning
              before  a  password  change  is  required  can   be
              changed. This option is the number of days prior to
              the password expiring that a user  will  be  warned
              the password is about to expire.

       -i inact
              This  option  is  used to set the number of days of
              inactivity after a password has expired before  the
              account  is  locked. A user whose account is locked
              must contact the system  administrator before being
              able  to  use the account again.  A value of 0 dis­
              ables this feature.

   Account maintenance
       -l     A system administrator can lock the account of  the
              specified user.

       -u     A  system  administrator  can  unlock the specified
              account.

       -d     The password of the given account can be deleted by
              the system administrator.

       -S     Report  password  status  on the named account. The
              first part indicates if the user account is  locked
              (L), has no password (NP), or has a usable password
              (P). The second part gives the  date  of  the  last
              password  change.  The  next  parts are the minimum
              age, maximum age, warning  period,  and  inactivity
              period for the password.

       -a     Report  the  password  status for all accounts. Can
              only be used in conjunction with -S.

       -e     The user will be forced to change the  password  at
              next login.

       -h     Change  the  home directory of the named user (only
              by a system administrator).

   Name service switch options
       -D binddn

pwdutils                   January 2003                 passwd(1)
  
Show your Support for the Linux Tutorial

Purchase one of the products from our new online shop. For each product you purchase, the Linux Tutorial gets a portion of the proceeds to help keep us going.


Login
Nickname

Password

Security Code
Security Code
Type Security Code


Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Help if you can!


Amazon Wish List

Did You Know?
You can help in many different ways.


Friends



Tell a Friend About Us

Bookmark and Share



Web site powered by PHP-Nuke

Is this information useful? At the very least you can help by spreading the word to your favorite newsgroups, mailing lists and forums.
All logos and trademarks in this site are property of their respective owner. The comments are property of their posters. Articles are the property of their respective owners. Unless otherwise stated in the body of the article, article content (C) 1994-2013 by James Mohr. All rights reserved. The stylized page/paper, as well as the terms "The Linux Tutorial", "The Linux Server Tutorial", "The Linux Knowledge Base and Tutorial" and "The place where you learn Linux" are service marks of James Mohr. All rights reserved.
The Linux Knowledge Base and Tutorial may contain links to sites on the Internet, which are owned and operated by third parties. The Linux Tutorial is not responsible for the content of any such third-party site. By viewing/utilizing this web site, you have agreed to our disclaimer, terms of use and privacy policy. Use of automated download software ("harvesters") such as wget, httrack, etc. causes the site to quickly exceed its bandwidth limitation and are therefore expressly prohibited. For more details on this, take a look here

PHP-Nuke Copyright © 2004 by Francisco Burzi. This is free software, and you may redistribute it under the GPL. PHP-Nuke comes with absolutely no warranty, for details, see the license.
Page Generation: 0.10 Seconds