3c5fa979a4
Re-organized topic hierarchy Tiny edit to restart review workflow. Squashed with Resolved index.rst conflict commit Change-Id: I13472792cb19d1e9975ac76c6954d38054d606c5 Signed-off-by: Keane Lim <keane.lim@windriver.com> Signed-off-by: MCamp859 <maryx.camp@intel.com>
58 lines
1.8 KiB
ReStructuredText
58 lines
1.8 KiB
ReStructuredText
|
|
.. thp1552681882191
|
|
.. _password-recovery-for-linux-user-accounts:
|
|
|
|
=========================================
|
|
Password Recovery for Linux User Accounts
|
|
=========================================
|
|
|
|
You can reset the password for a Linux user if required. The procedure
|
|
depends on the class of user.
|
|
|
|
|
|
.. _password-recovery-for-linux-user-accounts-section-N1001F-N1001C-N10001:
|
|
|
|
------------------
|
|
Linux System Users
|
|
------------------
|
|
|
|
This class includes the **sysadmin** account, and optionally other Linux
|
|
system user accounts created to support a multi-admin scenario. If another
|
|
Linux system account is available, you can use it to reset the password for
|
|
this type of account as follows:
|
|
|
|
.. code-block:: none
|
|
|
|
$ sudo passwd <user> <temp_password>
|
|
$ sudo chage -d 0 <user>
|
|
|
|
where <user> is the user name of the account to be reset \(for, example,
|
|
**sysadmin**\) and <temp\_password> is a temporary password. The
|
|
:command:`chage` command forces immediate expiration, so that the user must
|
|
change the password at first login.
|
|
|
|
If no other Linux system user accounts have been created, you can recover
|
|
using the default LDAP **operator** or **admin** accounts. For more
|
|
information, see :ref:`Local LDAP Linux User Accounts
|
|
<local-ldap-linux-user-accounts>`.
|
|
|
|
|
|
.. _password-recovery-for-linux-user-accounts-section-N10066-N1001C-N10001:
|
|
|
|
-----------------
|
|
LDAP System Users
|
|
-----------------
|
|
|
|
This class includes users created using LDAP utilities.
|
|
|
|
You can reset the password for an LDAP account as follows:
|
|
|
|
.. code-block:: none
|
|
|
|
$ sudo ldapmodifyuser <user> replace userPassword <temp_password>
|
|
$ sudo ldapmodifyuser <user> replace shadowLastChange 0
|
|
|
|
where <user> is the username, and <temp\_password> is a temporary password.
|
|
The second command forces a password change on first login.
|
|
|