LeasePak Passwords
Top
LeasePak Passwords
Granting Authority
System user passwords
Change by User
Change by Admin
Locked Accounts
System, Admin and non-Admin Passwords
Topics
-
LLDB
-
Hosts
-
LeasePak
- LeasePak client
- LeasePak driver
-
General
-
Users and Roles
- System Administrator
-
LeasePak non-administrative user
-
password
-
translated password
- lpchgpass
-
User Passwords
LeasePak has a complex password scheme due to its complexity as a product
as well as to the variety of platforms it runs on.
The user has his or her plain text password, or client string password. Generally this is all that most users are aware of. However, to access the LLDB and drivers, the user must also have accounts in the application host OSs and in the database systems that contain the LLDBs. Initially, these were set by the System Administrator.
To effect a password change for a user, the following locations need to be updated:
-
The database system which has the user's account. If there are multiple database systems installed, then potentially each of them must be individually updated.
-
The application host must have its
/etc/passwd
or /etc/shadow
updated.
-
There are tables in the LLDB governing certain aspects of password administration which may have to be updated.
This section of the System Administration Guide covers briefly how
to change passwords for various types of users.
The following list describes who can change which passwords:
Security Administrator
Top
LeasePak Passwords
Granting Authority
System user passwords
Change by User
Change by Admin
Locked Accounts
Granting Security Authority
Topics
- LLDB
- Hosts
- application host
- DBMS host
- General
- shell
- command prompt
- shell programs
- Users and Roles
- System Administrator
- database system user
- database system root user
- LeasePak administrative users
- NSTDBA
- LeasePak database administrator
- $SRVADM
- Database server administrator
- LeasePak non-administrative user
- LeasePak supervisor
- Regular user
- Security Authority
Procedure to Grant Security Authority to a user
Security Authority is granted in different ways in the different database systems.
The operator should log onto the application host as $NSTDBA
, the LeasePak database administrator. To be sure that the $NSTDBA
can connect to the database system needed, the operator, after logging in as $NSTDBA
, must execute the following command. In the below command lines, the portion of path components that are given as dbms, should be replaced with ora or syb, as appropriate.
If using the sh, bash, or ksh shell, the operator should execute:
[nsdba76a:~] . $TOPDIR/env/adm_dbms/etc/.lpprofile
or if using the csh or tcsh shell, the operator should execute:
[nsdba76a:~] source $TOPDIR/env/adm_dbms/etc/.lplogin
- Oracle
Once $NSTDBA
can access Oracle, execute:
[nsdba76a:~] sqlplus "sys as sysdba"
And enter the sysdba
password when prompted. Then at the SQL> prompt, execute:
SQL> grant alter user to target-user;
Now the target-user can log onto sqlplus
and change the passwords of other users.
- Sybase
Once $NSTDBA
can access Sybase, execute:
[nsdba76a:~] isql -Usa
And enter the sa password when prompted. Then at the prompt, execute:
1> grant role sso_role to target-user
2> go
Now the target-user can log onto isql
and change the passwords of other users.
System User Passwords
Top
LeasePak Passwords
Granting Authority
System user passwords
Change by User
Change by Admin
Locked Accounts
DBO
, $SRVADM
, sa
, sysdba
Topics
- LLDB
- General
- Users and Roles
- database system user
- database system root user
- LeasePak administrative users
- LeasePak non-administrative user
Performing database system-only password changes
The system users are the DBOs
, $SRVADM
, sysdba
and sa
. A DBO
and $SRVADM
may exist in multiple database systems; if so, the password used for that user should be uniform across all of the installed database systems.
Oracle
The Oracle database system-only password change is performed by the system user or a user with Security Authority logging into sqlplus
as follows:
% sqlplus
enter the user-name and user-password when prompted.
SQL> alter user system-user identified by new-password
where:
-
user-name is the system user or a user with Security Authority
-
user-password is the password of the user with Security Authority
-
system-user is a
DBO, $SRVADM
or sysdba
-
new-password is the new password being assigned to the system-user
Sybase
The Sybase database system-only password change is performed by the system user or a user with Security Authority logging into isql
as follows:
% isql -Uuser -Puser-password
1> sp_password user-password, new-password, system-user
2> go
where:
-
user is the system user or a user with Security Authority
-
user-password is the password of the user with Security Authority
-
system-user is a
DBO, $SRVADM
or sa
-
new-password is the new password being assigned to the system-user
Change Password Update
Top
LeasePak Passwords
Granting Authority
System user passwords
Change by User
Change by Admin
Locked Accounts
Password Change By User
The user changes his or her own password by accessing the Change Password update on the LeasePak client Options Menu. The Reference Guide describes how to go about this.
lpchgpass
Top
LeasePak Passwords
Granting Authority
System user passwords
Change by User
Change by Admin
Locked Accounts
Password Change By Administrator
Topics
- LLDB
- database system
- NetSol utility script
- Hosts
- LeasePak
- LeasePak instance
- SETUP
- Upper Level Directories
- General
- Users and Roles
- super-user
- System Administrator
- LeasePak administrative users
- $SRVADM
- Database server administrator
- Security Administrator
- LeasePak non-administrative user
- password
- translated password
- lpchgpass
The
lpchgpass
utility may be run only by
root
(the System Administrator). It also requires knowing the
$SRVADM
's password, or knowing a user account with
Security Authority.
If there are multiple
database systems installed and the user has accounts in more than one, the administrator will have to perform this procedure on each database system. The user's password needs to be changed only once per database system, even if he or she has been given access (
db_add_user
) to more than one LLDB within the database system.
Common Usage
The following shows how lpchgpass is typically used:
lpchgpass config-file env-name user-name security-admin
where:
The utility will then update the database system and the OS with the passwords generated from the
client string password.
lpchgpass Worksheet
Note the following values for running lpchgpass
:
Running lpchgpass
Log on the application host as root
(the System Administrator)
Run lpchgpass
with the common usage described above.
# cd /opt/nst/v65a/env/prod
# . etc/.lpprofile
# exe/lpchgpass $CFGDIR/$MSI_RT_CFG prod jstettner $SRVADM
The command will produce a display similar to the screen print below. Enter when prompted:
- the user's new password
- confirm the user's new password
-
$SRVADM
's password
# cd /opt/nst/v65a/env/prod
# . etc/.lpprofile
# exe/lpchgpass $CFGDIR/$MSI_RT_CFG prod jstettner $SRVADM
Enter new password for user: user's password
Confirm new password for user: user's password
Enter password of the SSO role: SSO's password
Password set correctly
#
Locked Accounts
Top
LeasePak Passwords
Granting Authority
System user passwords
Change by User
Change by Admin
Locked Accounts
Unlocking Accounts
Topics
- Hosts
- LeasePak
- SETUP
- LeasePak Internet services
- leasepakd service
- mPowerd service
- General
- environment variable
- signals flags semaphores
- Users and Roles
- super-user
- System Administrator
- OS login account
- user lockout
If LeasePak has been configured to
lockout users from the system after a certain number of consecutive failed login attempts (
SETUP
prompt
Max bad logins before lockout (0=disabled) [0], stored in environment variable
$LEASEPAKD_LOCKOUT, then the administrator will periodically need to unlock these accounts.
This lockout capability is available only on client logins through
leasepakd
or
mPowerd
.
Unlocking An Account
A LeasePak user with the proper authority and rights can do this through Change Password. The following server-side procedure for unlocking an account should be used only if the account cannot be unlocked through Change Password.
Log onto the application host as root (the System Administrator)
For a dedicated user who is locked, execute:
rm -f home-path/user-name/.lpdlogin-lck
where:
-
home-path - the directory where user home directories are placed, usually
/home
-
user-name - name of the user whose account is to be unlocked
For a hosted user who is locked, execute:
rm -f home-path/proxy-user/lphome/user-name/.lpdlogin–lck
where:
-
home-path - the directory where user home directories are placed, usually
/home
-
proxy-user - the name of the proxy server user
-
user-name - name of the user whose account is to be unlocked