2. Type in the passwd command to start the password change process. Passwd may look like a spelling mistake, but it is the command to work with passwords on the terminal.
4. Type in your new password, press Enter. Then type it in again to confirm that it is correct. Note that Linux will not echo (print) the password to the screen, nor will it show any asterisk indicating password length.
There may come a time when a user account will need to be temporarily locked, preventing them from logging in. For this we can use the -l argument to lock the account. Here we are locking Tom out of their account.
If you want to list the password status for all users, then the -a switch is just the thing. This switch is used with -S to list the status of every user, even the users that you never knew existed. These extra users are used for specific tasks, such as printers and networking.
Les Pounder is an associate editor at Tom's Hardware. He is a creative technologist and for seven years has created projects to educate and inspire minds both young and old. He has worked with the Raspberry Pi Foundation to write and deliver their teacher training program \"Picademy\"."}), " -0-10/js/authorBio.js"); } else console.error('%c FTE ','background: #9306F9; color: #ffffff','no lazy slice hydration function available'); Les PounderSocial Links NavigationLes Pounder is an associate editor at Tom's Hardware. He is a creative technologist and for seven years has created projects to educate and inspire minds both young and old. He has worked with the Raspberry Pi Foundation to write and deliver their teacher training program "Picademy".
After a reboot of the computer the client always wants to authorizes through the browser. (When setting up the client, It did not ask me for username or password, only for the server address).
There is an entry in my kdewallet (Contents tab) but in the Applications tab there is an entry only in the upper field ("These applications are currently connected to this wallet") and not the lower one ("These applications are authorized to acess this wallet"). This is weird, because I actually granted access to owncloud multiple times.
Syncing of my folders works fine once authorized.
Thank you @Robert_Grantham for your quick response! I have installed libgnome-keyring-common using the above command. (The funny thing is, the package seahorse depends on gnome-keyring but not on libgnome-keyring-common.)
Edit: I have to back up a little bit. The password is only remembered until I log out of the Ubuntu session. So it remembers the password when restarting the program but not when restarting the PC.
Sorry @Fresh_Dumbledore for taking over your thread. I was thinking we may be affected by the same bug. You said below that you already have all mentioned packages. But did you install gnome-keyring, or the KDE equivalent kwallet? See also here: github.com/frankosterfeld/qtkeychain/issues/45
I don't think that you can compare the windows and the linux clients, those are probably using completely different methods to save the password (I think something something like e.g. seahorse/gnome-keyring doesn't exist on windows).
When the desktop app tries to auth through the browser, it probably uses Oauth2 as the authentication path, instead of the locally stored password. Please try to disable the Oauth2 app in your owncloud installation, this should force the client to use the local password, e.g. from gnome keyring or KDE kwallet
This is inaccurate: sync client's OAuth2 integration is not orthogonal with the keychain component on your OS. The client does actually store there the refresh token that is used to grant a new auth. token and (like the user password) keep itself authorized. Disabling OAuth2 on the server should not cause the client to behave differently in this scenario.
well, on my 10.0.8 it does behave like this. Disabling Oauth2 causes the 2.4.1 client to use the local kwallet password on startup. In my case it is KDE (OpenSUSE Leap 423), which should be more or less the same as the Mint/Gnome scenario described here
I am not a regular user of any keyring solution but understand that the client does store its password in that keyring.
The problem is that I have activated autologin in my XFCE4(lightdm). Because of that the keyring popsup everytime and ask for my user accounts password.
I checked more than half a century worth Unix experience and neither my colleagues, nor myself has ever set a password on a group (sg and gpasswd). What would be a typical use case for a group password or is it pretty much only there because of historic reasons?
I think they were a natural idea in mimicking the model of user's having passwords, that it made sense to duplicate that use case model to groups as well. But in practice they're really not all that useful for anything.
The idea with a group password is that if you needed to gain access to a particular group (one that you weren't listed as being a member of), you could do so using the newgrp command, and be challenged with a password to gain access to these alternative groups.
Most environments I've come across have typically put people in secondary groups, and then given these groups access to files on the filesystem, and this has satisfied pretty much all the usage that needs to occur.
With the advent of sudo additional permissions could be handed out on an as needed basis to groups, further undermining any use cases that group passwords may have provided. If you needed to allow users more permissions, it was much easier to create roles in sudo and then just allow there username or group that they were in, permissions to elevate there permissions so that they could perform a particular task.
Finally the ability to create Access Control Lists (ACLs) really gave the last bit of flexibility that the User/Group/Other permissions model couldn't provide alone, relegating any possible need for group passwords to obscurity.
Here's a practical use for group passwords, that I implemented for myself on our work server, since the logs indicated my account was being brute-forced (or could have been a dictionary attack).
I used ssh-keygen and puttygen respectively to generate key pairs for use from my workstation and home computer. The key I use from home requires a password. I added both of the public keys to the .ssh/authorized_keys, created a group marionette with a password and no members. As root I used visudo to add the following lines.
I have disabled my account's password, you no one can log into it that way. I now login only with my keys and entering the password-protected group with newgrp marionette allows me to become root using sudo -i.
Without the NOPASSWD: option it will require your user account password. If it is disabled and this group does not have NOPASSWD, you will not be able to sudo -i. It will also require your user account password if your command list does not have /bin/bash or whatever shell your root is using by default.
While this does make the path to sudoing a few steps longer, it adds a good layer of security. If you choose to make all your accounts like this, create one local account with a password and sudo privileges, but deny it ssh entry from /etc/ssh/sshd_config by adding something like:
As you may know, access to the Docker daemon (which is typically implied by the membership in the docker group) effectively gives you full root rights on the machine, as you can run any code with docker run -v /:/root ... with full write access to the filesystem. It's roughly equivalent to passwordless sudo.
If you configure a password on the docker group, you can enable access to the Docker daemon for that terminal session only by running newgrp docker and entering your password. This is roughly equivalent to su or sudo's cookie feature. Unlike su, you remain logged in as yourself and not root - only your primary group changes to docker.
First let me say that we are so used to the term "user" that we even don't think about it. But "user" is not really a user. For example, at home we have three computers - the laptop of my wife, my laptop and common desktop computer. When I use the laptop of my wife I login with her user account. When She use my laptop she logs in with my user account. If somebody needs the desktop he or she uses the one common account. We see here that the thing the computer system calls "user" is not really a user but a workflow - a set of activities.
Here is the question: Why can't I have more than one activity - one for every different job that I have? I can. At my work computer I've created (experimentally) many different users so I can focus on the current task. I put all these users in the same group so I can access my files no mater which user I am currently using.
Than these new users would need a password to login, right? Here is the place of gpasswd. I still need to figure out how to login with the group (up to this point what I know is that you can switch groups with gpasswd if you are already logged in).
I also Googled around for a while, and found somebody recommending running 'lppasswd', which I tried, and entered a password; however, this password doesn't work on the web interface either (it gives me the authorization required message).
Now I want to add the cups-pdf virtual printer. I've installed all the required packages, added myself to the lp group , set up a password using lppasswd, restarted cups daemon and even rebooted!
I try to use the cups web interface as outlined in the wiki, but when it asks for 'username and password at CUPS", I'm stumped! The username (myself) and the password set up in lppasswd doesn't work and the password prompt keeps coming back!