Bruno Negrao wrote:
Yes Nate, I checked it - since the user is created, if I cut and paste the crypted password from the /etc/shadow of the origin machine and paste it to the /etc/shadow of the second machine, the user can logon with the same password!!
A better way might be to use usermod with the '-p' option. There is more opportunity to destroy the shadow password file using an editor. root # usermod -p 'some encrypted password' username This will allow you to script the whole process as well. for user in user1 user2 user3 do password=$(egrep "^$user:" old_shadow_file | cut -d: -f2) usermod -p "$password" $user done Best Regards Willem Brown -- iServe (Pty) Ltd. http://www.iserve.co.za/ Tel: +27 (0)11 258-7800 Fax: +27 (0)11 258-7888 Cell: +27 (0)83 271-0839 -- redhat-list mailing list unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe https://listman.redhat.com/mailman/listinfo/redhat-list