NAME | SYNOPSIS | DESCRIPTION | OPTIONS | EXAMPLES | EXIT STATUS | ATTRIBUTES | SEE ALSO
The pwdhash command prints the encrypted form of a password using one of the server's encryption algorithms. If a user cannot log in, you can use this command to compare the user's password with the password stored in the directory.
The following options are supported:
Specifies the encrypted password with which the user password is to be compared. The result of this comparison is either OK or password does not match
Instance Directory Server.
Specifies that the passwords are hex-encoded.
The clear password/s from which the encrypted form should be generated (or against which the password in the directory should be compared).
Generates the encrypted passwords according to the scheme's algorithm. The available schemes are SSHA, SHA, CRYPT, and CLEAR.
#directoryserver pwdhash -D ServerRoot/slapd-serverID -s SSHA mypassword " {SSHA}mtHyZSHfhOZ4FHmvQe09FQjvLZpnW1wbmW05cw==" #directoryserver pwdhash -D ServerRoot/slapd-serverID -c " {SSHA}mtHyZSHfhOZ4FHmvQe09FQjvLZpnW1wbmW05cw==" aPassword /usr/ds/v5.2/slapd/server/pwdhash: password does not match
See attributes(5) for descriptions of the following attributes:
ATTRIBUTE TYPE | ATTRIBUTE VALUE |
---|---|
Availability | SUNWdsvu |
Stability Level | Committed Private |
directoryserver(1M), account-activate(1), account-inactivate(1), account-status(1)
NAME | SYNOPSIS | DESCRIPTION | OPTIONS | EXAMPLES | EXIT STATUS | ATTRIBUTES | SEE ALSO