pw.conf.5 (476602a9d0b9041b42a108349dc58a4ca6bf4223) pw.conf.5 (1dcc6ec750ce84c42fee6fb29a88c20b3b91f4ed)
1.\" Copyright (C) 1996
2.\" David L. Nugent. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 8 unchanged lines hidden (view full) ---

17.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
18.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
19.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
20.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
21.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
22.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
23.\" SUCH DAMAGE.
24.\"
1.\" Copyright (C) 1996
2.\" David L. Nugent. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 8 unchanged lines hidden (view full) ---

17.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
18.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
19.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
20.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
21.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
22.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
23.\" SUCH DAMAGE.
24.\"
25.\" $Id$
25.\" $Id: pw.conf.5,v 1.6 1997/02/22 16:12:26 peter Exp $
26.\"
27.Dd December 9, 1996
28.Dt PW.CONF 5
29.Os
30.Sh NAME
31.Nm pw.conf
32.Nd format of the pw.conf configuration file
33.Sh DESCRIPTION

--- 4 unchanged lines hidden (view full) ---

38program.
39The
40.Xr pw 8
41program is used for maintenance of the system password and group
42files, allowing users and groups to be added, deleted and changed.
43This file may be modified via the
44.Xr pw 8
45command using the
26.\"
27.Dd December 9, 1996
28.Dt PW.CONF 5
29.Os
30.Sh NAME
31.Nm pw.conf
32.Nd format of the pw.conf configuration file
33.Sh DESCRIPTION

--- 4 unchanged lines hidden (view full) ---

38program.
39The
40.Xr pw 8
41program is used for maintenance of the system password and group
42files, allowing users and groups to be added, deleted and changed.
43This file may be modified via the
44.Xr pw 8
45command using the
46.Ql \&useradd
46.Ar useradd
47command and the
47command and the
48.Ql \&-D
48.Fl D
49option, or by editing it directly with a text editor.
50.Pp
51Each line in
52.Aq Pa /etc/pw.conf
53is treated either a comment or as configuration data;
54blank lines and lines commencing with a
55.Ql \&#
56character are considered comments, and any remaining lines are
57examined for a leading keyword, followed by corresponding data.
58.Pp
59Keywords recognised by
60.Xr pw 8
61are:
62.Bl -tag -width password_days -offset indent -compact
63.It defaultpasswd
49option, or by editing it directly with a text editor.
50.Pp
51Each line in
52.Aq Pa /etc/pw.conf
53is treated either a comment or as configuration data;
54blank lines and lines commencing with a
55.Ql \&#
56character are considered comments, and any remaining lines are
57examined for a leading keyword, followed by corresponding data.
58.Pp
59Keywords recognised by
60.Xr pw 8
61are:
62.Bl -tag -width password_days -offset indent -compact
63.It defaultpasswd
64affects passwords generated for new users
64affect passwords generated for new users
65.It reuseuids
66reuse gaps in uid sequences
67.It reusegids
68reuse gaps in gid sequences
69.It nispasswd
70path to the NIS passwd database
71.It skeleton
72where to obtain default home contents

--- 24 unchanged lines hidden (view full) ---

97.It expire_days
98days after which account expires
99.It password_days
100days after which password expires
101.El
102.Pp
103Valid values for
104.Ar defaultpasswd
65.It reuseuids
66reuse gaps in uid sequences
67.It reusegids
68reuse gaps in gid sequences
69.It nispasswd
70path to the NIS passwd database
71.It skeleton
72where to obtain default home contents

--- 24 unchanged lines hidden (view full) ---

97.It expire_days
98days after which account expires
99.It password_days
100days after which password expires
101.El
102.Pp
103Valid values for
104.Ar defaultpasswd
105are
105are:
106.Bl -tag -width password_days -offset indent -compact
107.It no
106.Bl -tag -width password_days -offset indent -compact
107.It no
108disables login on newly created accounts
108disable login on newly created accounts
109.It yes
109.It yes
110forces the password to be the account name
110force the password to be the account name
111.It none
111.It none
112forces a blank password
112force a blank password
113.It random
113.It random
114Generates a random password
114generate a random password
115.El
116.Pp
117The second and third options are insecure and should be avoided if
118possible on a publicly accessible system.
119The first option requires that the superuser run
120.Xr passwd 1
121to set a password before the account may be used.
122This may also be useful for creating administrative accounts.
123The final option causes
124.Xr pw 8
125to respond by printing a randomly generated password on stdout.
126This is the preferred and most secure option.
115.El
116.Pp
117The second and third options are insecure and should be avoided if
118possible on a publicly accessible system.
119The first option requires that the superuser run
120.Xr passwd 1
121to set a password before the account may be used.
122This may also be useful for creating administrative accounts.
123The final option causes
124.Xr pw 8
125to respond by printing a randomly generated password on stdout.
126This is the preferred and most secure option.
127.Xr pw 8
127.Xr Pw 8
128also provides a method of setting a specific password for the new
129user via a filehandle (command lines are not secure).
130.Pp
131Both
132.Ar reuseuids
133and
134.Ar reusegids
135determine the method by which new user and group id numbers are

--- 7 unchanged lines hidden (view full) ---

143.Ql \&no
144will ensure that no other existing user or group id within the range
145is numerically lower than the new one generated, and therefore avoids
146reusing gaps in the user or group id sequence that are caused by
147previous user or group deletions.
148Note that if the default group is not specified using the
149.Ar defaultgroup
150keyword,
128also provides a method of setting a specific password for the new
129user via a filehandle (command lines are not secure).
130.Pp
131Both
132.Ar reuseuids
133and
134.Ar reusegids
135determine the method by which new user and group id numbers are

--- 7 unchanged lines hidden (view full) ---

143.Ql \&no
144will ensure that no other existing user or group id within the range
145is numerically lower than the new one generated, and therefore avoids
146reusing gaps in the user or group id sequence that are caused by
147previous user or group deletions.
148Note that if the default group is not specified using the
149.Ar defaultgroup
150keyword,
151Xr pw 8
151.Xr pw 8
152will create a new group for the user and attempt to keep the new
153user's uid and gid the same.
154If the new user's uid is currently in use as a group id, then the next
155available group id is chosen instead.
156.Pp
157On NIS servers which maintain a separate passwd database to
158.Pa /etc/master.passwd ,
159this option allows the additional file to be concurrently updated
160as user records are added, modified or removed.
161If blank or set to 'no', no additional database is updated.
162An absolute pathname must be used.
163.Pp
164The
165.Ar skeleton
166keyword nominates a directory from which the contents of a user's
167new home directory is constructed.
168This is
169.Pa /usr/share/skel
170by default.
152will create a new group for the user and attempt to keep the new
153user's uid and gid the same.
154If the new user's uid is currently in use as a group id, then the next
155available group id is chosen instead.
156.Pp
157On NIS servers which maintain a separate passwd database to
158.Pa /etc/master.passwd ,
159this option allows the additional file to be concurrently updated
160as user records are added, modified or removed.
161If blank or set to 'no', no additional database is updated.
162An absolute pathname must be used.
163.Pp
164The
165.Ar skeleton
166keyword nominates a directory from which the contents of a user's
167new home directory is constructed.
168This is
169.Pa /usr/share/skel
170by default.
171.Xr pw 8 's
172.Ql \&-m
171.Xr Pw 8 's
172.Fl m
173option causes the user's home directory to be created and populated
174using the files contained in the
175.Ar skeleton
176directory.
177.Pp
178To send an initial email to new users, the
179.Ar newmail
180keyword may be used to specify a path name to a file containing

--- 54 unchanged lines hidden (view full) ---

235.Ar extragroups
236provides an automatic means of placing new users into groups within
237the
238.Pa /etc/groups
239file.
240This is useful where all users share some resources, and is preferable
241to placing users into the same primary group.
242The effect of this keyword can be overridden using the
173option causes the user's home directory to be created and populated
174using the files contained in the
175.Ar skeleton
176directory.
177.Pp
178To send an initial email to new users, the
179.Ar newmail
180keyword may be used to specify a path name to a file containing

--- 54 unchanged lines hidden (view full) ---

235.Ar extragroups
236provides an automatic means of placing new users into groups within
237the
238.Pa /etc/groups
239file.
240This is useful where all users share some resources, and is preferable
241to placing users into the same primary group.
242The effect of this keyword can be overridden using the
243.Ql \&-G
243.Fl G
244option on the
245.Xr pw 8
246command line.
247.Pp
248The
249.Ar defaultclass
250field determines the login class (See
251.Xr login.conf 5 )

--- 7 unchanged lines hidden (view full) ---

259.Ar maxgid
260keywords determines the allowed ranges of automatically allocated user
261and group id numbers.
262The default values for both user and group ids are 1000 and 32000 as
263minimum and maximum respectively.
264The user and group id's actually used when creating an account with
265.Xr pw 8
266may be overridden using the
244option on the
245.Xr pw 8
246command line.
247.Pp
248The
249.Ar defaultclass
250field determines the login class (See
251.Xr login.conf 5 )

--- 7 unchanged lines hidden (view full) ---

259.Ar maxgid
260keywords determines the allowed ranges of automatically allocated user
261and group id numbers.
262The default values for both user and group ids are 1000 and 32000 as
263minimum and maximum respectively.
264The user and group id's actually used when creating an account with
265.Xr pw 8
266may be overridden using the
267.Ql \&-u
267.Fl u
268and
268and
269.Ql \&-g
269.Fl g
270command line options.
271.Pp
272The
273.Ar expire_days
274and
275.Ar password_days
276are used to automatically calculate the number of days from the date
277on which an account is created when the account will expire or the

--- 16 unchanged lines hidden (view full) ---

294.It Pa /etc/group
295.El
296.Sh SEE ALSO
297.Xr passwd 1 ,
298.Xr group 5 ,
299.Xr login.conf 5 ,
300.Xr passwd 5 ,
301.Xr pw 8
270command line options.
271.Pp
272The
273.Ar expire_days
274and
275.Ar password_days
276are used to automatically calculate the number of days from the date
277on which an account is created when the account will expire or the

--- 16 unchanged lines hidden (view full) ---

294.It Pa /etc/group
295.El
296.Sh SEE ALSO
297.Xr passwd 1 ,
298.Xr group 5 ,
299.Xr login.conf 5 ,
300.Xr passwd 5 ,
301.Xr pw 8
302
303