How to extend a VERITAS Security Services (VxSS) credential for "unixpwd" users greater then 24 hours

Article: 100016800
Last Published: 2021-09-13
Ratings: 5 2
Product(s): NetBackup & Alta Data Protection

Problem

How to extend a VERITAS Security Services (VxSS) credential for "unixpwd" users greater then 24 hours

Solution

By default, a VxSS credential expires every 24 hours. This requires a user to run the " bpnbat -login " every day in order to perform VERITAS NetBackup (tm) operations.  The expiration of the credential can be extended up to a maximum of 30 days. The " credexpiry " time period must be entered in the form of seconds. For example 30 days is equivalent to 2592000 seconds.
 
  1. For command line interface (CLI) authentication:
/opt/VRTSat/bin# ./vssat setexpiryintervals --pluginname unixpwd --prpltype user --credexpiry <time in seconds>
(example: /opt/VRTSat/bin# ./vssat setexpiryintervals --pluginname unixpwd --prpltype user --credexpiry 2592000 )
 
  1. For UNIX Netbackup version 7.1 and above:
/usr/openv/netbackup/sec/at/bin# ./vssat setexpiryintervals --pluginname unixpwd --prpltype user --credexpiry <time in seconds>
(example: /usr/openv/netbackup/sec/at/bin# ./vssat setexpiryintervals --pluginname unixpwd --prpltype user --credexpiry 2592000 )
For Windows Netbackup version 7.1 and above:
<install path>\veritas\netbackup\sec\at\bin\vssat setexpiryintervals --pluginname unixpwd --prpltype user --credexpiry <time in seconds>
(example: <install path>\veritas\netbackup\sec\at\bin \vssat setexpiryintervals --pluginname unixpwd --prpltype user --credexpiry 2592000 )
 
  1. For graphical user interface (GUI) authentication:
/opt/VRTSat/bin# ./vssat setexpiryintervals --pluginname unixpwd --prpltype default --credexpiry <time in seconds>
(example: /opt/VRTSat/bin# ./vssat setexpiryintervals --pluginname unixpwd --prpltype default --credexpiry 2592000 )
  1. For UNIX Netbackup version 7.1 and above:
/usr/openv/netbackup/sec/at/bin# ./vssat setexpiryintervals --pluginname unixpwd --prpltype  default --credexpiry <time in seconds>
(example: /usr/openv/netbackup/sec/at/bin# ./vssat setexpiryintervals --pluginname unixpwd --prpltype default --credexpiry 2592000 )
  1. For UNIX NetBackup version 8.2 and above:

    /usr/openv/netbackup/sec/at/bin# ./vssat setexpiryintervals --pluginname pam--prpltype  default --credexpiry <time in seconds>
    (example: /usr/openv/netbackup/sec/at/bin# ./vssat setexpiryintervals --pluginname pam --prpltype default --credexpiry 2592000 )
     
  2. For Windows Netbackup version 7.1 and above:
<install path>\veritas\netbackup\sec\at\bin\vssat setexpiryintervals --pluginname unixpwd --prpltype  default --credexpiry <time in seconds>
(example: <install path>\veritas\netbackup\sec\at\bin \vssat setexpiryintervals --pluginname unixpwd --prpltype default --credexpiry 2592000 )

Run " bpnbat -login " to login again then run the " bpnbat -whoami " command to verify the credential has been extended.

# bpnbat -whoami
Name: root
Domain: luckyone.min.veritas.com
Issued by: /CN=broker/OU=root@luckyone.min.veritas.com/O=vx
Expiry Date: Sep 22 14:41:05 2005 GMT
Authentication method: UNIX passwd

Operation completed successfully.

# ./vssat setexpiryintervals --pluginname unixpwd --prpltype user --credexpiry 2592000

setexpiryintervals
----------------------
----------------------

Changed Expiry Policy For:       unixpwd

----------------------
# ./vssat setexpiryintervals --pluginname unixpwd --prpltype default --credexpiry 2592000

setexpiryintervals
----------------------
----------------------

Changed Expiry Policy For:       unixpwd

----------------------

# bpnbat -login
Authentication Broker: luckyone.min.veritas.com
Authentication port[ Enter = default]:
Authentication type (NIS, NIS+, NT, vx, unixpwd): unixpwd
Domain: luckyone.min.veritas.com
Login Name: root
Password:
Operation completed successfully.

# bpnbat -whoami
Name: root
Domain: luckyone.min.veritas.com
Issued by: /CN=broker/OU=root@luckyone.min.veritas.com/O=vx
Expiry Date: Oct 22 14:43:23 2005 GMT
Authentication method: UNIX passwd
Operation completed successfully.

Was this content helpful?