General :: How To Implement Password Policies
Nov 24, 2010
How would I ensure that whenever any user changes the password it should meet following.
1)It should be more than 7 Characters.
2)Atleast one Upper case character,digit and special character present.
3)Password is not same as username or dictionary word .
4)User should get email after changing his password(I have already setup mail account and tested the setup).
Code:
Distribution Detail
# lsb_release -a
LSB Version: :core-3.1-ia32:core-3.1-noarch:graphics-3.1-ia32:graphics-3.1-noarch
Distributor ID: EnterpriseEnterpriseServer
Description: Enterprise Linux Enterprise Linux Server release 5.2 (Carthage)
Release: 5.2
Codename: Carthage
# uname -a
Linux OFSMUW-VMGR-51 2.6.18-92.el5PAE #1 SMP Fri May 23 22:26:05 EDT 2008 i686 i686 i386 GNU/Linux
View 8 Replies
ADVERTISEMENT
Sep 27, 2010
I am currently reviewing what it means to switch over to Ubuntu and I have the following scenario. If I was to switch all the windows servers over to an Ubuntu solution. I already understand that file servers/ mail servers and resources can be provided Ubuntu 10.04. The issue comes with the user accounts access and control. In a windows environment, I have a domain with sub domain sites. I am able to control passwords in each site separately thought Active directory. I need the instructions on how to setup an LDAP server so that I can control access rights to different services located on different servers.
Example 1.
I have 5 mail servers and on the HR side, I have 2 email administrators. I wish to provide them access to only the relevant resources centrally. With out having to add users to different users repeatedly. For example, if I wanted to grant the two administrators access to all five servers. As I understand it, I would have to create the same user on every server and add a public key on every server, as well as set the administration rights for that user on each server individually.
I want to be capable of doing this like I am in a windows environment from some sort of domain controller equivalent. Things that I must be able to do, manage users public keys on each server centrally. Add and remove user's access to each server centrally. Finite control on what each user can do on each server. (i.e., add them to the sudo group or any other group for specific servers/server class I specify). To a lesser extent of requirement, I also need to be able to inform users they have to change there password every 3 months from when they change it. As well as enforce password rules, such as characters complication.
View 3 Replies
View Related
May 12, 2011
Am configured SVN on Ubuntu 10.04 ,It's Working fine ;svn access method is svn://ipaddress .In this method am not encrypting the password ,Currently my passwd (/homesvnMyProject/conf )file like that [users]test = testNow i want to Implement the password Encryption for any users, without implementing svn+ssh:// method
View 1 Replies
View Related
Mar 26, 2010
Is it possible to only view certain chains and more specifically certain chain policies with options when doing: iptables -L..I would like for example view FORWARD ACCEPT rules instead of waiting for all of the drop rules to load when viewing a firewalled iptables.
View 1 Replies
View Related
Mar 10, 2010
I have followed following steps to implement, ftp upload by test1 user.
Code:
1. Add group ftp-users
# /usr/sbin/groupadd ftp-users
2. User test1 has been added to the group of ftp-users with /home/ftp-docs as home directory
# /usr/sbin/usermod -g ftp-users -d /home/ftp-docs test1
3. Ownership and permission of /home/ftp-docs has been changed to provide read/write access to user test1 and group ftp-users
# chown test1.ftp-users /home/ftp-docs
# chmod 770 /home/ftp-docs
But My intention is for the user who login with test1 user privileges, he should not be able to browse any other directories say /, /var /etc etc. Also he should not be able to change to any other directory. How can I accomplish this ?
View 2 Replies
View Related
Apr 15, 2011
How can we implement HMIPv6 in ns2? Can we adapt it directly by implementing MIPv6 or we need any ,for example HMIPv6.cc?
View 7 Replies
View Related
Feb 16, 2010
Is there any function like mkdir() or link() for command ls? If not, how is ls implemented?
View 4 Replies
View Related
Oct 26, 2010
I can't seem to find the "Authorizations" GUI that was present in earlier ubuntus for configuring system policies. It used to be in System - Administration - Authorizations. Which package does it come in? What's the console command for it?
View 2 Replies
View Related
Apr 12, 2009
I am facing a problem when I tried to set policies on the firewall with following commands:
iptables -A INPUT -p TCP -s 0/0 --dport 53 -j ACCEPT
iptables -A INPUT -p UDP -s 0/0 --dport 53 -j ACCEPT
iptables -A INPUT -p TCP -s 0/0 -j REJECT
[code]....
Here, I want to deny all traffic except DNS traffic, it should be permitted. I tried to log the traffic but I did not find any update in /var/log/messages.
View 4 Replies
View Related
Oct 26, 2010
Does anybody know how to implement packet reordering in NS2? I would be very glad if someone provide me with appropriate tcl script or give a link.
View 3 Replies
View Related
Jul 11, 2010
i want to implement different mobility models in ns2, but i can not it
View 2 Replies
View Related
Jul 14, 2011
The only reason why I don't use Linux (even though I prefer Linux over Windows, and can do everything faster and more efficiently) is because each time I try to learn about dm-crypt I give up.
Can someone point me in the right direction for full OTFE on Linux (like TrueCrypt)?
View 1 Replies
View Related
Sep 4, 2010
I would like to create the shell which would support the LS command in C++. And the way the command prompt can be changed.
View 7 Replies
View Related
Dec 21, 2010
How can implement pfexec in Linux? Can i use sudo in Linux?
View 1 Replies
View Related
Feb 11, 2010
how to implement proxy server with firewall and the client users should be authinticated by asking username & password while opening their web browsers and finally i want to see the websites visted list of all the client computers On cent os 5.3
View 1 Replies
View Related
Jun 25, 2011
Does anyone know how to (permanently) get rid of this?
As you might have guessed, typing the root password and pressing OK has no effect.
This is NOT a laptop!
View 7 Replies
View Related
Apr 14, 2011
Write a shell script setup linux security policies include:
1. password policy
2. User policy
3. firewall
Note: Create a file.sh from 1 to 3. purposes:
If (1) successful then 2 If (2) successful then 3 End
View 3 Replies
View Related
Apr 13, 2011
I don't know how to write a shell script to set security policies for Linux to start. and how. I know that there are many security policies for Linux but do not know which one best suited to write a shell script.
View 5 Replies
View Related
Apr 27, 2011
i am new to ns2, i want to implement leach algorithm(MIT uAMPS) but i am unable to know how to install ns-2.1b5 version for it.but i successfully installed ns2.29 in fedora14.
otherwise please intimate what linux flavour will be suitable for ns-2.1b5
View 2 Replies
View Related
Jan 20, 2011
I want to implement squid with quota restriction based on username.
View 4 Replies
View Related
Dec 2, 2010
A US ISP's "privacy" policy basically states that they will collect any and all of your data (email, posts, surfing etc ) and then "share" it". direct me to a "checklist" which can suggest counter measures for non-geeks? How can we function if we cant trust our ISP? Are there some specific 'tricks' in Ubutu to foil rogue ISPs? If yes, it would be a great 'selling point', especially for professionals concerned that rogue ISPs could "share" their intellectual property.
View 9 Replies
View Related
Feb 3, 2010
Is there a way to delete files on the commandline that uses the KDE-Wastebin?It appears that I never ever need the KDE4 Wastebin for files that I deleted through Konqueror or Dolphin. It is only when I delete files on the konsole with rm that I wish I could undelete them. It always happens like that, mostly by being in the wrong directory or using a wildcard when I should not have. (I don't have any erroneous deleted file right now, and I do have plenty of backups, but I just wonder whether there is something better than rm to use generally on the commandline.)
View 9 Replies
View Related
Nov 1, 2010
I study about file systems using on Linux and I try to implement file system format:ext2I'll implement virtual disk, And format as file system - that is implemented. So here is a problem. I want to know that How I mount this virtual drive that I implement ?I'm not asking detail codes, but I want to know about fundamental principle of "mount" disk. What is the fundamental principle of "mount" disk?
View 7 Replies
View Related
Jul 23, 2009
I am an absolute Linux Beginner who is being required to do a bit of admin work because the boss just fired the old linux admin. Unfortunately, one of our employees cannot remember her password to her email account and as such I need to reset it on our linux server.What I want to check is that this email account is actually a linux user account and I simply will reset the password for it using the passwd command from the root login. Is that correct?
View 1 Replies
View Related
Sep 13, 2009
Ubuntu 8.4 Just installed Truecrypt yesterday. Would like to be able to start Truecrypt automatically and use the same password as my login password.
View 1 Replies
View Related
Jun 4, 2011
brand new 2 Ubantu & set up standard Ubantu compartment accessed via 1 user name only and password. 1st few times all good but now suddenly, unexpectedly password declared invalid. Had written down password so it is correct & not entry error. Not know how to reset password or bypass 'username/password log on screen' Am on an Acer 5542G with windows 7 home premium.
View 3 Replies
View Related
Apr 14, 2010
Is there a way to change password to value same as the previous password? I know this is a security flaw, but would like to know however. when I try this:
[Code].....
View 2 Replies
View Related
Jul 2, 2010
i forgot root password and how to change the password
View 3 Replies
View Related
Jan 8, 2010
hello i am trying to change my password, but when i type in the new password i get this:"The password is longer than 8 characters. On some systems, this can cause problems. You can truncate the password to 8 characters, or leave it as it is."my question is what kind of problem could i get and how can i change so i have to log in every time i start the computer?
View 9 Replies
View Related
Mar 7, 2011
I have a partially completed interpreter that has first-calss functions and can store scopes in variables. That way it is possible to implement a simple class like this:
Code:
MyClass = func () {
value = 0;
setValue = func (x) value = x;;
[code]....
But what about inheritance, and what if I want to know the type of the object?
View 6 Replies
View Related