General :: How To Implement Password Policies

Nov 24, 2010

How would I ensure that whenever any user changes the password it should meet following.
1)It should be more than 7 Characters.
2)Atleast one Upper case character,digit and special character present.
3)Password is not same as username or dictionary word .
4)User should get email after changing his password(I have already setup mail account and tested the setup).

Code:
Distribution Detail
# lsb_release -a
LSB Version: :core-3.1-ia32:core-3.1-noarch:graphics-3.1-ia32:graphics-3.1-noarch
Distributor ID: EnterpriseEnterpriseServer
Description: Enterprise Linux Enterprise Linux Server release 5.2 (Carthage)
Release: 5.2
Codename: Carthage
# uname -a
Linux OFSMUW-VMGR-51 2.6.18-92.el5PAE #1 SMP Fri May 23 22:26:05 EDT 2008 i686 i686 i386 GNU/Linux

View 8 Replies


ADVERTISEMENT

Ubuntu Security :: 10.04 - Corporate UCM And Password Policies

Sep 27, 2010

I am currently reviewing what it means to switch over to Ubuntu and I have the following scenario. If I was to switch all the windows servers over to an Ubuntu solution. I already understand that file servers/ mail servers and resources can be provided Ubuntu 10.04. The issue comes with the user accounts access and control. In a windows environment, I have a domain with sub domain sites. I am able to control passwords in each site separately thought Active directory. I need the instructions on how to setup an LDAP server so that I can control access rights to different services located on different servers.

Example 1.
I have 5 mail servers and on the HR side, I have 2 email administrators. I wish to provide them access to only the relevant resources centrally. With out having to add users to different users repeatedly. For example, if I wanted to grant the two administrators access to all five servers. As I understand it, I would have to create the same user on every server and add a public key on every server, as well as set the administration rights for that user on each server individually.

I want to be capable of doing this like I am in a windows environment from some sort of domain controller equivalent. Things that I must be able to do, manage users public keys on each server centrally. Add and remove user's access to each server centrally. Finite control on what each user can do on each server. (i.e., add them to the sudo group or any other group for specific servers/server class I specify). To a lesser extent of requirement, I also need to be able to inform users they have to change there password every 3 months from when they change it. As well as enforce password rules, such as characters complication.

View 3 Replies View Related

General :: Implement Password Encryption In Subversion SVN?

May 12, 2011

Am configured SVN on Ubuntu 10.04 ,It's Working fine ;svn access method is svn://ipaddress .In this method am not encrypting the password ,Currently my passwd (/homesvnMyProject/conf )file like that [users]test = testNow i want to Implement the password Encryption for any users, without implementing svn+ssh:// method

View 1 Replies View Related

General :: Possible To Only View Certain Chains And More Specifically Certain Chain Policies

Mar 26, 2010

Is it possible to only view certain chains and more specifically certain chain policies with options when doing: iptables -L..I would like for example view FORWARD ACCEPT rules instead of waiting for all of the drop rules to load when viewing a firewalled iptables.

View 1 Replies View Related

General :: Best Way To Implement FTP Upload

Mar 10, 2010

I have followed following steps to implement, ftp upload by test1 user.

Code:
1. Add group ftp-users
# /usr/sbin/groupadd ftp-users

2. User test1 has been added to the group of ftp-users with /home/ftp-docs as home directory
# /usr/sbin/usermod -g ftp-users -d /home/ftp-docs test1

3. Ownership and permission of /home/ftp-docs has been changed to provide read/write access to user test1 and group ftp-users
# chown test1.ftp-users /home/ftp-docs
# chmod 770 /home/ftp-docs

But My intention is for the user who login with test1 user privileges, he should not be able to browse any other directories say /, /var /etc etc. Also he should not be able to change to any other directory. How can I accomplish this ?

View 2 Replies View Related

General :: How To Implement HMIPv6 In NS2

Apr 15, 2011

How can we implement HMIPv6 in ns2? Can we adapt it directly by implementing MIPv6 or we need any ,for example HMIPv6.cc?

View 7 Replies View Related

General :: How To Implement LS Command In C

Feb 16, 2010

Is there any function like mkdir() or link() for command ls? If not, how is ls implemented?

View 4 Replies View Related

Ubuntu :: Edit PolicyKit Policies In 10.10?

Oct 26, 2010

I can't seem to find the "Authorizations" GUI that was present in earlier ubuntus for configuring system policies. It used to be in System - Administration - Authorizations. Which package does it come in? What's the console command for it?

View 2 Replies View Related

Security :: Iptables Policies And Log Not Working?

Apr 12, 2009

I am facing a problem when I tried to set policies on the firewall with following commands:

iptables -A INPUT -p TCP -s 0/0 --dport 53 -j ACCEPT
iptables -A INPUT -p UDP -s 0/0 --dport 53 -j ACCEPT
iptables -A INPUT -p TCP -s 0/0 -j REJECT

[code]....

Here, I want to deny all traffic except DNS traffic, it should be permitted. I tried to log the traffic but I did not find any update in /var/log/messages.

View 4 Replies View Related

General :: Implement Packet Reordering In NS2?

Oct 26, 2010

Does anybody know how to implement packet reordering in NS2? I would be very glad if someone provide me with appropriate tcl script or give a link.

View 3 Replies View Related

General :: Implement Different Mobility Models In Ns2?

Jul 11, 2010

i want to implement different mobility models in ns2, but i can not it

View 2 Replies View Related

General :: Implement Full Disk Encryption?

Jul 14, 2011

The only reason why I don't use Linux (even though I prefer Linux over Windows, and can do everything faster and more efficiently) is because each time I try to learn about dm-crypt I give up.

Can someone point me in the right direction for full OTFE on Linux (like TrueCrypt)?

View 1 Replies View Related

General :: Creating A Shell Using C Which Could Implement LS Command

Sep 4, 2010

I would like to create the shell which would support the LS command in C++. And the way the command prompt can be changed.

View 7 Replies View Related

General :: Implement Pfexec In System / Use Sudo In It?

Dec 21, 2010

How can implement pfexec in Linux? Can i use sudo in Linux?

View 1 Replies View Related

General :: Implement Proxy Server With Firewall?

Feb 11, 2010

how to implement proxy server with firewall and the client users should be authinticated by asking username & password while opening their web browsers and finally i want to see the websites visted list of all the client computers On cent os 5.3

View 1 Replies View Related

OpenSUSE :: System Policies Prevent From Getting The Brightness Level (KDE)

Jun 25, 2011

Does anyone know how to (permanently) get rid of this?

As you might have guessed, typing the root password and pressing OK has no effect.
This is NOT a laptop!

View 7 Replies View Related

Security :: Write A Shell Script Setup Policies?

Apr 14, 2011

Write a shell script setup linux security policies include:

1. password policy
2. User policy
3. firewall

Note: Create a file.sh from 1 to 3. purposes:

If (1) successful then 2 If (2) successful then 3 End

View 3 Replies View Related

Programming :: Write A Shell Script To Set Security Policies?

Apr 13, 2011

I don't know how to write a shell script to set security policies for Linux to start. and how. I know that there are many security policies for Linux but do not know which one best suited to write a shell script.

View 5 Replies View Related

General :: Installing Ns-2.1b5 In Fedora 14 For Implement Leach Algorithm?

Apr 27, 2011

i am new to ns2, i want to implement leach algorithm(MIT uAMPS) but i am unable to know how to install ns-2.1b5 version for it.but i successfully installed ns2.29 in fedora14.

otherwise please intimate what linux flavour will be suitable for ns-2.1b5

View 2 Replies View Related

General :: Implement Squid With Quota Restriction Based On Username?

Jan 20, 2011

I want to implement squid with quota restriction based on username.

View 4 Replies View Related

Ubuntu Security :: Business Espionage Dressed Up As ISP "Privacy" Policies?

Dec 2, 2010

A US ISP's "privacy" policy basically states that they will collect any and all of your data (email, posts, surfing etc ) and then "share" it". direct me to a "checklist" which can suggest counter measures for non-geeks? How can we function if we cant trust our ISP? Are there some specific 'tricks' in Ubutu to foil rogue ISPs? If yes, it would be a great 'selling point', especially for professionals concerned that rogue ISPs could "share" their intellectual property.

View 9 Replies View Related

Security :: Write A Shell Script Setup Security Policies?

Feb 3, 2010

Is there a way to delete files on the commandline that uses the KDE-Wastebin?It appears that I never ever need the KDE4 Wastebin for files that I deleted through Konqueror or Dolphin. It is only when I delete files on the konsole with rm that I wish I could undelete them. It always happens like that, mostly by being in the wrong directory or using a wildcard when I should not have. (I don't have any erroneous deleted file right now, and I do have plenty of backups, but I just wonder whether there is something better than rm to use generally on the commandline.)

View 9 Replies View Related

General :: How To Implement Commands "mount"

Nov 1, 2010

I study about file systems using on Linux and I try to implement file system format:ext2I'll implement virtual disk, And format as file system - that is implemented. So here is a problem. I want to know that How I mount this virtual drive that I implement ?I'm not asking detail codes, but I want to know about fundamental principle of "mount" disk. What is the fundamental principle of "mount" disk?

View 7 Replies View Related

General :: Mail Server : Reset The Password For It Using The Password Command From The Root Login?

Jul 23, 2009

I am an absolute Linux Beginner who is being required to do a bit of admin work because the boss just fired the old linux admin. Unfortunately, one of our employees cannot remember her password to her email account and as such I need to reset it on our linux server.What I want to check is that this email account is actually a linux user account and I simply will reset the password for it using the passwd command from the root login. Is that correct?

View 1 Replies View Related

General :: Start Truecrypt Automatically And Use The Same Password As Login Password?

Sep 13, 2009

Ubuntu 8.4 Just installed Truecrypt yesterday. Would like to be able to start Truecrypt automatically and use the same password as my login password.

View 1 Replies View Related

General :: Reset Password Or Bypass 'username/password Log On Screen'

Jun 4, 2011

brand new 2 Ubantu & set up standard Ubantu compartment accessed via 1 user name only and password. 1st few times all good but now suddenly, unexpectedly password declared invalid. Had written down password so it is correct & not entry error. Not know how to reset password or bypass 'username/password log on screen' Am on an Acer 5542G with windows 7 home premium.

View 3 Replies View Related

General :: (redhat) Change Password To Previous Password?

Apr 14, 2010

Is there a way to change password to value same as the previous password? I know this is a security flaw, but would like to know however. when I try this:

[Code].....

View 2 Replies View Related

General :: Forgot Root Password And How To Change The Password

Jul 2, 2010

i forgot root password and how to change the password

View 3 Replies View Related

OpenSUSE Install :: Change Password But When Type In The New Password Get This "The Password Is Longer Than 8 Characters?

Jan 8, 2010

hello i am trying to change my password, but when i type in the new password i get this:"The password is longer than 8 characters. On some systems, this can cause problems. You can truncate the password to 8 characters, or leave it as it is."my question is what kind of problem could i get and how can i change so i have to log in every time i start the computer?

View 9 Replies View Related

Programming :: Implement The OOP In Interpreter?

Mar 7, 2011

I have a partially completed interpreter that has first-calss functions and can store scopes in variables. That way it is possible to implement a simple class like this:

Code:

MyClass = func () {
value = 0;
setValue = func (x) value = x;;

[code]....

But what about inheritance, and what if I want to know the type of the object?

View 6 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved