From 333f7ecfa3e040191c66b2b92f6c117ca2cbac1d Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sat, 27 Apr 2024 14:50:00 +0200 Subject: Adding upstream version 1:4.8.1. Signed-off-by: Daniel Baumann --- man/chgpasswd.8.xml | 250 ++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 250 insertions(+) create mode 100644 man/chgpasswd.8.xml (limited to 'man/chgpasswd.8.xml') diff --git a/man/chgpasswd.8.xml b/man/chgpasswd.8.xml new file mode 100644 index 0000000..cd61687 --- /dev/null +++ b/man/chgpasswd.8.xml @@ -0,0 +1,250 @@ + + + + + + + +]> + + + + + + Thomas + Kłoczko + kloczek@pld.org.pl + Creation, 2006 + + + Nicolas + François + nicolas.francois@centraliens.net + shadow-utils maintainer, 2007 - now + + + + chgpasswd + 8 + System Management Commands + shadow-utils + &SHADOW_UTILS_VERSION; + + + chgpasswd + update group passwords in batch mode + + + + + chgpasswd + + options + + + + + + DESCRIPTION + + The chgpasswd command reads a list of group name + and password pairs from standard input and uses this information to + update a set of existing groups. Each line is of the format: + + + group_name:password + + + By default the supplied password must be in clear-text, and is + encrypted by chgpasswd. + + + The default encryption algorithm can be defined for the system with + the variable of /etc/login.defs, + and can be overwritten with the , + , or options. + + + This command is intended to be used in a large system environment + where many accounts are created at a single time. + + + + + OPTIONS + + The options which apply to the chgpasswd command + are: + + + + , + + Use the specified method to encrypt the passwords. + + The available methods are DES, MD5, and NONE. + + + The available methods are DES, MD5, NONE, and SHA256 or SHA512 + if your libc support these methods. + + + + + , + + Supplied passwords are in encrypted form. + + + + , + + Display help message and exit. + + + + , + + + Use MD5 encryption instead of DES when the supplied passwords are + not encrypted. + + + + + + ,  CHROOT_DIR + + + + Apply changes in the CHROOT_DIR + directory and use the configuration files from the + CHROOT_DIR directory. + + + + + , + + + Use the specified number of rounds to encrypt the passwords. + + + The value 0 means that the system will choose the default + number of rounds for the crypt method (5000). + + + A minimal value of 1000 and a maximal value of 999,999,999 + will be enforced. + + + You can only use this option with the SHA256 or SHA512 + crypt method. + + + By default, the number of rounds is defined by the + SHA_CRYPT_MIN_ROUNDS and SHA_CRYPT_MAX_ROUNDS variables in + /etc/login.defs. + + + + + + + + CAVEATS + + Remember to set permissions or umask to prevent readability of + unencrypted files by other users. + + + You should make sure the passwords and the encryption method respect + the system's password policy. + + + + + CONFIGURATION + + The following configuration variables in + /etc/login.defs change the behavior of this + tool: + + + &ENCRYPT_METHOD; + &MAX_MEMBERS_PER_GROUP; + &MD5_CRYPT_ENAB; + &SHA_CRYPT_MIN_ROUNDS; + + + + + FILES + + + /etc/group + + Group account information. + + + + /etc/gshadow + + Secure group account information. + + + + /etc/login.defs + + Shadow password suite configuration. + + + + + + + SEE ALSO + + + gpasswd1 + , + + groupadd8 + , + + login.defs5 + . + + + -- cgit v1.2.3