1 | .\" $Id: passwd.1,v 1.1 1998-05-08 15:15:09 ghudson Exp $ |
---|
2 | .\" |
---|
3 | .\" Copyright 1998 by the Massachusetts Institute of Technology. |
---|
4 | .\" |
---|
5 | .\" Permission to use, copy, modify, and distribute this |
---|
6 | .\" software and its documentation for any purpose and without |
---|
7 | .\" fee is hereby granted, provided that the above copyright |
---|
8 | .\" notice appear in all copies and that both that copyright |
---|
9 | .\" notice and this permission notice appear in supporting |
---|
10 | .\" documentation, and that the name of M.I.T. not be used in |
---|
11 | .\" advertising or publicity pertaining to distribution of the |
---|
12 | .\" software without specific, written prior permission. |
---|
13 | .\" M.I.T. makes no representations about the suitability of |
---|
14 | .\" this software for any purpose. It is provided "as is" |
---|
15 | .\" without express or implied warranty. |
---|
16 | .TH PASSWD 1 "5 May 1998" |
---|
17 | .SH NAME |
---|
18 | passwd \- Change Kerberos or local password |
---|
19 | .SH SYNOPSIS |
---|
20 | passwd \fI[-k|-l]\fR \fI[username]\fR |
---|
21 | .SH DESCRIPTION |
---|
22 | .I passwd |
---|
23 | changes a user's Kerberos or local password and possibly updates the |
---|
24 | system's local password file with the new user entry. |
---|
25 | .PP |
---|
26 | The first task of |
---|
27 | .I passwd |
---|
28 | is to choose between the Kerberos and local password-changing |
---|
29 | programs. If the |
---|
30 | .B -k |
---|
31 | argument is given, |
---|
32 | .I passwd |
---|
33 | runs the Kerberos password-changing program (/usr/athena/bin/kpasswd); |
---|
34 | if the |
---|
35 | .B -l |
---|
36 | argument is given, |
---|
37 | .I passwd |
---|
38 | runs the local password-changing program (/usr/bin/passwd). If |
---|
39 | neither option is given, |
---|
40 | .I passwd |
---|
41 | runs the local password-changing program if it is invoked by root or |
---|
42 | by a user listed as having a local account in |
---|
43 | .IR /etc/athena/access . |
---|
44 | Otherwise, it runs the Kerberos password-changing program. |
---|
45 | .PP |
---|
46 | If |
---|
47 | .I passwd |
---|
48 | runs the local password-changing program, it subsequently attempts to |
---|
49 | update the appropriate local passwd file (which may be |
---|
50 | .IR /etc/passwd.local , |
---|
51 | .IR /etc/shadow.local , |
---|
52 | or |
---|
53 | .I /etc/master.passwd.local |
---|
54 | depending on the system type) by replacing the line for the user with |
---|
55 | the new line from the appropriate passwd file. If there is no local |
---|
56 | passwd file or if the user has no entry in the local passwd file, no |
---|
57 | update is performed. |
---|
58 | .SH FILES |
---|
59 | /etc/athena/access |
---|
60 | .br |
---|
61 | /etc/passwd |
---|
62 | .br |
---|
63 | /etc/passwd.local |
---|
64 | .br |
---|
65 | /etc/shadow |
---|
66 | .br |
---|
67 | /etc/shadow.local |
---|
68 | .br |
---|
69 | /etc/master.passwd |
---|
70 | .br |
---|
71 | /etc/master.passwd.local |
---|
72 | .PP |
---|
73 | depending on the system type. |
---|
74 | .SH "SEE ALSO" |
---|
75 | access(5) |
---|
76 | .SH AUTHOR |
---|
77 | Greg Hudson, MIT Information Systems |
---|
78 | .br |
---|
79 | Copyright 1998 by the Massachusetts Institute of Technology. |
---|