SGE_PASSWD(1) General Commands Manual SGE_PASSWD(1) NAME sgepasswd - Modify the Univa Grid Engine password file SYNTAX sgepasswd [[ -D domain ] -d user ] sgepasswd [ -D domain ] [ user ] DESCRIPTION sgepasswd modifies the Univa Grid Engine password file sgepasswd(5). This file contains a list of usernames and their windows password in encrypted form. sge_execd(8) and sge_shepherd(8) on hosts running Mi- crosoft Windows as operating systems use this information to start jobs for a certain user. Each user can use the sgepasswd application to add a new entry for the own user account. It is also possible to change the stored password with sgepasswd as far as the user knows the old one. The root user additionally has the permission to change the password entries for other user accounts. Root can also delete existing entries. The sgepasswd application is only available on non-Windows hosts. In order to be able to modify the sgepasswd(5) file, the sgepasswd appli- cation needs to run with the right user ID set (usually the one of root). To achieve this, the setuid bit has to be set in the file per- missions and the sgepasswd application has to be owned by the right user (usually root). The sge_qmaster(8) installation script sets the permissions and owner properly if it is requested. The "ls -l" output of the sgepasswd application should look like this: -r-sr-xr-x 1 root root 4136176 Dec 10 15:51 sgepasswd However, the setuid mechanism does not work if the sgepasswd applica- tion resides on a file system that is mounted with the "nosuid" option. If policies require the $SGE_ROOT directory to be located on such a file system, copying the sgepasswd application to a different location is a possible workaround for this problem. OPTIONS -D domain Per default sgepasswd will add/modify the current Unix username without domain specification. This switch can be used to add a domain specification in front of the current user name. Consult your Microsoft Windows documentation to get more information about domain users. -c Only root can use this parameter to convert an existing RC4 encrypted sgepasswd into a AES_256_CBC encrypted sgepasswd(5) file. -d user Only root can use this parameter to delete entries from the sgepasswd(5) file. -n oldkeyfile Only root can use this parameter to reencrypt an existing sgepasswd file encrypted with oldkeyfile with the current key- file. If during upgrade the CA is regenerated the old keyfiles are saved under /var/sgeCA/port${SGE_QMAS- TER_PORT}/${SGE_CELL}.backup and $SGE_ROOT/$SGE_CELL/com- mon/sgeCA.backup In this scenario oldkeyfile would be: /var/sgeCA/port${SGE_QMASTER_PORT}/${SGE_CELL}.backup/pri- vate/key.pem Don't apply the -n option multiple times. -help Prints a listing of all options. ENVIRONMENTAL VARIABLES SGE_CERTFILE Specifies the location of public key file. Per default sgepasswd will use the file $SGE_ROOT/$SGE_CELL/com- mon/sgeCA/certs/cert.pem SGE_KEYFILE If set, specifies the location of the private key file. Default is /var/sgeCA/port${SGE_QMAS- TER_PORT}/${SGE_CELL}/private/key.pem SGE_RANDFILE If set, specifies the location of the seed used to cre- ate encrypted versions of user passwords. Default is /var/sgeCA/port${SGE_QMASTER_PORT}/${SGE_CELL}/pri- vate/rand.seed SEE ALSO sge_intro(1), sgepasswd(5) COPYRIGHT See sge_intro(1) for a full statement of rights and permissions. Univa Grid Engine User Commands UGE 8.5.4 SGE_PASSWD(1)