getprpw.1m (2010 09)
g
getprpw(1M) getprpw(1M)
(TO BE OBSOLETED)
NAME
getprpw - display protected password database
SYNOPSIS
getprpw [-l [-r][-m
parm[,parm ]] username
DESCRIPTION
getprpw displays the user’s protected password database settings. This command is available only to
the superuser in a trusted system. Normally it is only used via SAM, see sam(1M).
getprpw uses the /etc/nsswitch.conf
configuration file default if
-l is not specified. See
nsswitch.conf(4).
Options
getprpw recognizes the following options.
-l Specifies to get information from the local user.
-r Displays the arguments supplied to -m
in raw format
-m Displays the database value for the argument passed.
An "invalid-opt" is printed if a list of options passed to
-m contains an invalid option. The rest of the
options will be processed. If
getprpw is specified without -m, all parameters are displayed in the
order given below.
Boolean values are returned as
YES, NO,orDFT (for system default values in
/tcb/files/auth/system/default
).
Numeric values are specified as positive numbers, 0, or -1. A value of -1 indicates that the field has
not been assigned a value in the database.
Units of time are returned in number of days (>=0), although the database keeps them in seconds.
This and other minor differences between the command parameters and the database fields are con-
sistent with modprpw(1M).
The following parameters for the user can be displayed using the
-m option.
They are listed below in the order shown in
prot.h. The database fields are fully explained in
prpwd(4).
uid user uid
bootpw boot authorization flag
audid audit id
audflg audit flag
mintm minimum time between password changes
maxpwln maximum password length
exptm password expiration time
lftm password lifetime
spwchg last successful password change time
upwchg last unsuccessful password change time
acctexp account expiration time
llog last login time interval
expwarn password expiration warning time
usrpick whether user picks password, YES/NO/DFT
syspnpw whether system generates pronounceable passwords, YES/NO/DFT
rstrpw whether password is restricted, i.e, checked for triviality, YES/NO/DFT
nullpw NULL passwords are allowed, YES/NO/DFT. Not recommended!
syschpw whether system generates passwords having characters only, YES/NO/DFT
HP-UX 11i Version 3: September 2010 − 1 − Hewlett-Packard Company 1