Purpose
Changes the key field in an Authentication Database entry
Synopsis
kas setpassword -name <name of user> [-new_password <new password>] [-kvno <key version number>] [-admin_username <admin principal to use for authentication>] [-password_for_admin <admin password>] [-cell <cell name>] [-servers <explicit list of authentication servers>+] [-noauth] [-help] kas setpasswd -na <name of user> [-ne <new password>] [-k <key version number>] [-a <admin principal to use for authentication>] [-p <admin password>] [-c <cell name>] [-s <explicit list of authentication servers>+] [-no] [-h] kas setp -na <name of user> [-ne <new password>] [-k <key version number>] [-a <admin principal to use for authentication>] [-p <admin password>] [-c <cell name>] [-s <explicit list of authentication servers>+] [-no] [-h] kas sp -na <name of user> [-ne <new password>] [-k <key version number>] [-a <admin principal to use for authentication >] [-p <admin password>] [-c <cell name>] [-s <explicit list of authentication servers>+] [-no] [-h]
Description
The kas setpassword command accepts a character string of unlimited length, scrambles it into a form suitable for use as an encryption key, places it in the key field of the Authentication Database entry named by the -name argument, and assigns it the key version number specified by the -kvno argument.
To avoid making the password string visible at the shell prompt, omit the -new_password argument. Prompts then appear at the shell which do not echo the password visibly.
When changing the afs server key, also issue bos addkey command to add the key (with the same key version number) to the /usr/afs/etc/KeyFile file. See the IBM AFS Administration Guide for instructions.
The command interpreter checks the password string subject to the following conditions:
Password was not changed because it seems like a reused password
To prevent a user from subverting this restriction by changing the password twenty times in quick succession (manually or by running a script), use the -minhours argument on the kaserver initialization command. The following error message appears if a user attempts to change a password before the minimum time has passed:
Password was not changed because you changed it too recently; see your systems administrator
Options
Examples
In the following example, an administrator using the admin account changes the password for pat (presumably because pat forgot the former password or got locked out of his account in some other way).
% kas setpassword pat Password for admin: new_password: Verifying, please re-enter new_password:
Privilege Required
Individual users can change their own passwords. To change another user's password or the password (server encryption key) for server entries such as afs, the issuer must have the ADMIN flag set in his or her Authentication Database entry.
Related Information