PreviousNext

passwd_import(8sec)

Creates registry database entries based on information in UNIX group and password files

Synopsis

passwd_import [-c] -d pathname [-i] [-o org]
[-p password] [-u username] [-h] [-v]

Options

-c
Run in check mode: processes the command, showing all conflicts, but make no requests for resolution.

-d pathname
The path to the directory containing the foreign password and group files to be imported.

-i
Ignore name conflicts. Names in the registry and the group and password files represent the same identity.

-o org
The name of an organization to be assigned to all imported entries. The default organization is none.

-p password
The password for the account with whose privileges passwd_import runs.

-u username
The principal name of the account with whose privileges passwd_import runs. This account must have the privileges to access the registry and add principals, groups, accounts, and organizations, and to add members to groups and organizations. The principal name and password are used to obtain network authentication. If you do not supply them, passwd_import prompts for them, even if you have already performed a network login.

-h
Displays help information.

-v
Run in verbose mode: generates a verbose transcript of passwd_import activity.

Description

The passwd_import command is a mechanism for creating registry database entries that are consistent with foreign password and group file entries.

Use passwd_import to ensure consistency between DCE and foreign protection mechanisms when you do the following:

Attach DCE nodes to an existing UNIX network

Attach UNIX nodes to a DCE network

Connect DCE and UNIX networks

If the password and group file entries do not exist in the DCE registry, passwd_import creates them. If there are duplicate entries, passwd_import follows your directions on how to handle them.

The Process
The DCE registry database must exist and be running before you can use passwd_import. If you are simply adding a few DCE nodes to a foreign network, you can create a new, but empty, registry to meet this requirement.

As passwd_import processes, it performs the following steps:

1. It opens the group and password files and establishes a connection to the registry.

2. It compares the group file entries to groups in the registry. If there are no conflicts, it creates groups in the registry corresponding to the groups in the group file.

3. It compares the entries in the password file to principals in the registry. Again, if there are no conflicts, it

a) Creates principals in the registry corresponding to the entries in the password file.

b) Adds the newly created principals to the appropriate groups.

c) Creates accounts for the newly created principals.

4. It re-examines the group file and adds the principals as members of any additional groups it finds there.

The changes to the registry are made individually as each step is processed. If you do not specify the organization, the principals are added to the organization none.

Conflicts
During this process, passwd_import can find conflicts in name strings (for example, in the password file, joe 102; in the registry database, joe 555) and in UNIX IDs (for example, in the password file, joe 102; in the DCE, carmelita 102). When passwd_import finds a conflict, it prompts for changes to make to the /etc/passwd and /etc/group entries. No changes are made to the registry entries. In other words, all conflicts are resolved in favor of the registry entry.

The -i option specifies that duplicate names are not in conflict but, in fact, represent the same identity. Therefore, when duplicate names arise, no action is necessary. If you do not use the -i option, passwd_import prompts for how to handle the name conflicts.

Resolving Conflicts
The passwd_import command prompts for instructions to resolve the conflicts it finds. You have the following choices:

You can create an alias to resolve a UNIX ID conflict. This action creates an alias for the registry object in conflict. The passwd_import command assigns this alias the same name as the conflicting entry in the /etc/group or /etc/passwd file. For example, if the entry joe 555 exists in the registry and the entry tim 555 exists in the /etc/passwd file, choosing this option creates the alias tim for joe 555.

You can generate a new UNIX ID automatically or enter a new one explicitly to resolve a UNIX ID conflict. For example, if there is a conflict between the entry joe 555 in the registry and tim 555 in the /etc/passwd file, you can generate a new UNIX ID for tim.

You can enter a new name to resolve a name conflict. For example if there is a conflict between the entry joe 555 in the registry and joe 383 in the /etc/passwd file, you can generate a new name for joe 383. This new name is then added to the registry.

In addition, you are given the option of ignoring the conflict and skipping this entry.

Generally, you should run passwd_import with the -c option. Using the results of this run, you can determine how to handle the conflicts. If there are many conflicts, it may be more efficient to manually edit either the registry or the group and password files to resolve some of them before you run import_passwd.

Registry Database Entries
New registry entries created by passwd_import are assigned the following values:

For Principal and Group Entries:

alias/primary
If the /etc/passwd file contains two entries with the same UNIX number, passwd_import creates a primary name entry for the first occurrence of the UNIX number and alias entries for each subsequent occurrence.

fullname
A blank string; no full name is added for the entry.

membership list
For new groups only, all principals listed in the group file, and all principals with accounts in the password file with that group.

projlist_ok
Yes (for groups only).

For Account Entries:

Account expiration date
None.

Account_valid
False.

Client flag
True.

Duplicate certificate flag
False.

Forwardable certificate flag
True.

Gecos
Same as password file.

Good since date
Time of account creation.

Homedir
Same as password file.

Maximum certificate lifetime
Default to registry authentication policy.

Maximum certificate renewable
Default to registry authentication policy.

Passwd
Randomly generated. Note that you must modify or reset randomly generated passwords before user authentication is possible.

Passwd_dtm
Date and time passwd_import was run.

Passwd_valid
False.

Postdated certificate flag
False.

Proxiable certificate flag
False.

Renewable certificate flag
True.

Server flag
True.

Shell
Same as password file.

TGT authentication flag
True.

Related Information
Commands:

rgy_edit(8sec)

sec_admin(8sec)

secd(8sec)