4645 reset user password - risk!

knightr1der

4645 reset user password - risk!

Post by knightr1der »

Isn't it a bit strange that the customer has to log in to mtcl account to reset a users voicemail password via the Eva_tool.

Have I missed another way of resetting the password?

Once the customer has logged in, they could crash the system if they didn't know what they were doing!
Eliott_DUP

Post by Eliott_DUP »

Have you tried to create a new user using "useradd" and give a script or /usr2/servers/Eva_tool as shell in /etc/passwd file?
knightr1der

Post by knightr1der »

Thanks for the reply Eliott.

I haven't tried that. Is that what you do? or do you just let the customer access the mtcl account?

How hard would it be for Alcatel to include a VM password field in the 4760 configuration app?
Eliott_DUP

Post by Eliott_DUP »

knightr1der wrote:Is that what you do? or do you just let the customer access the mtcl account?
No. We change the password for the customer (not free of charge) :lol: :wink:
knightr1der wrote:How hard would it be for Alcatel to include a VM password field in the 4760 configuration app?
I don't know. I fear hard. :roll:
swinstu
Member
Posts: 166
Joined: 30 Oct 2007 21:37

Re: 4645 reset user password - risk!

Post by swinstu »

Hi Elliot,

I have been successful in setting up a new user with a password for end client. Can you please advise of steps on on how to provide access to Eva_tool command ONLY and no access to mgr or rebooting the system etc.

Thanks in advance.
SWINSTU
ACSE OXE R12.1
ACSE 8770 R3.2(4760 R5.x)
ACSE OT R2.3 IP/SIP and UC&C
swinstu
Member
Posts: 166
Joined: 30 Oct 2007 21:37

Re: 4645 reset user password - risk!

Post by swinstu »

Update:

I had created a username helpdesk and set a password for it under root.

Edited passwd file under /etc as below, saved and tested

root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/bin/false
daemon:x:2:2:daemon:/sbin:/bin/false
ftp:x:14:50:FTP User:/var/ftp:/bin/false
nobody:x:99:99:Nobody:/:/bin/false
httpd:x:48:102:Apache:/var/www:/bin/false
ppp:x:100:11::/tmp:/usr/netadm/sh/ppp.sh
netdump:x:34:34:Network Crash Dump user:/var/crash:/bin/false
swinst:x:0:3:installation-account:/DHS3bin/soft_install/bin:/bin/bash
mtcl:x:2011:1002:mtcl:/DHS3bin/mtcl:/bin/bash
adfexc:x:2015:1002:adfexc:/DHS3bin/adfexc:/bin/bash
client:x:2017:1002:client:/DHS3bin/client:/bin/false
helpdesk:x:2018:1003:helpdesk:/usr2/servers/Eva_tool:/bin/bash



I am unable to run the Eva_tool command after logging in with helpdesk username successfully. Any suggestions?
SWINSTU
ACSE OXE R12.1
ACSE 8770 R3.2(4760 R5.x)
ACSE OT R2.3 IP/SIP and UC&C
krzysioD

Re: 4645 reset user password - risk!

Post by krzysioD »

YEap. and after reboot your user helpdesk will get deleted...
swinstu
Member
Posts: 166
Joined: 30 Oct 2007 21:37

Re: 4645 reset user password - risk!

Post by swinstu »

Thanks for your feedback.
So is there a way to create a login for end customers to only access Eva_tool to reset the voicemail instead of issueing them the mtcl login and password?
SWINSTU
ACSE OXE R12.1
ACSE 8770 R3.2(4760 R5.x)
ACSE OT R2.3 IP/SIP and UC&C
krzysioD

Re: 4645 reset user password - risk!

Post by krzysioD »

Maybe Omnivista 4760? There you have nice web login and access levels.
swinstu
Member
Posts: 166
Joined: 30 Oct 2007 21:37

Re: 4645 reset user password - risk!

Post by swinstu »

Its not a Omnivista 4760 server user.
SWINSTU
ACSE OXE R12.1
ACSE 8770 R3.2(4760 R5.x)
ACSE OT R2.3 IP/SIP and UC&C
Post Reply

Return to “Voicemail (46x5)”