1 .\" $NetBSD: chpass.1,v 1.22 2005/09/05 03:37:15 hubertf Exp $
3 .\" Copyright (c) 1988, 1990, 1993
4 .\" The Regents of the University of California. All rights reserved.
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
14 .\" 3. Neither the name of the University nor the names of its contributors
15 .\" may be used to endorse or promote products derived from this software
16 .\" without specific prior written permission.
18 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
19 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
22 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 .\" @(#)chpass.1 8.2 (Berkeley) 12/30/93
39 .Nd add or change user database information
53 allows editing of the user database information associated
56 or, by default, the current user.
57 The information is formatted and supplied to an editor for changes.
59 Only the information that the user is allowed to change is displayed.
61 The options are as follows:
64 The super-user is allowed to directly supply a user database
65 entry, in the format specified by
68 This argument must be a colon
70 separated list of all the
71 user database fields, although they may be empty.
75 option attempts to change the user's shell to
78 This option causes the password to be updated only in the local
80 When changing only the local password,
82 is used to update the password databases.
84 This forces the YP password database entry to be changed, even if
85 the user has an entry in the local database.
88 daemon should be running on the YP master server.
91 Possible display items are as follows:
93 .Bl -tag -width "Home Directory:" -compact -offset indent
97 user's encrypted password
105 account expiration time
107 user's general classification
109 user's home directory
115 user's normal location
124 field is the user name used to access the computer account.
128 field contains the encrypted form of the user's password.
132 field is the number associated with the
135 Both of these fields should be unique across the system (and often
136 across a group of systems) as they control file access.
138 While it is possible to have multiple entries with identical login names
139 and/or identical user id's, it is usually a mistake to do so.
141 that manipulate these files will often return only one of the multiple
142 entries, and that one by random selection.
146 field is the group that the user will be placed in at login.
149 supports multiple groups (see
151 this field currently has little special meaning.
152 This field may be filled in with either a number or a group name (see
157 field is the date by which the password must be changed.
161 field is the date on which the account expires.
167 fields should be entered in the form
171 is the month name (the first three characters are sufficient),
173 is the day of the month, and
179 field is a key for a user's login class.
180 Login classes are defined in
184 style database of user attributes, accounting, resource and
185 environment settings.
191 path name where the user will be placed at login.
195 field is the command interpreter the user prefers.
198 field is empty, the Bourne shell,
201 When altering a login shell, and not the super-user, the user
202 may not change from a non-standard shell or to a non-standard
204 Non-standard is defined as a shell not found in
207 The last four fields are for storing the user's
208 .Ar full name , office location ,
215 Once the information has been verified,
219 to update the user database.
223 editor will be used unless the environment variable
225 is set to an alternative editor.
226 When the editor terminates, the information is re-read and used to
227 update the user database itself.
228 Only the user, or the super-user, may edit the information associated
231 .Bl -tag -width /etc/master.passwd -compact
232 .It Pa /etc/master.passwd
235 A Version 7 format password file
237 Lock file for the passwd database
238 .It Pa /tmp/pw.XXXXXX
239 Temporary copy of the user passwd information
241 The list of approved shells
256 .%T "UNIX Password Security"
264 This program's interface is poorly suited to cryptographic systems such as
265 Kerberos, and consequently Kerberos password changing is not a feature of
268 User information should (and eventually will) be stored elsewhere.