4645 reset user password - risk!
-
knightr1der
4645 reset user password - risk!
Isn't it a bit strange that the customer has to log in to mtcl account to reset a users voicemail password via the Eva_tool.
Have I missed another way of resetting the password?
Once the customer has logged in, they could crash the system if they didn't know what they were doing!
Have I missed another way of resetting the password?
Once the customer has logged in, they could crash the system if they didn't know what they were doing!
-
Eliott_DUP
-
knightr1der
-
Eliott_DUP
No. We change the password for the customer (not free of charge)knightr1der wrote:Is that what you do? or do you just let the customer access the mtcl account?
I don't know. I fear hard.knightr1der wrote:How hard would it be for Alcatel to include a VM password field in the 4760 configuration app?
Re: 4645 reset user password - risk!
Hi Elliot,
I have been successful in setting up a new user with a password for end client. Can you please advise of steps on on how to provide access to Eva_tool command ONLY and no access to mgr or rebooting the system etc.
Thanks in advance.
I have been successful in setting up a new user with a password for end client. Can you please advise of steps on on how to provide access to Eva_tool command ONLY and no access to mgr or rebooting the system etc.
Thanks in advance.
SWINSTU
ACSE OXE R12.1
ACSE 8770 R3.2(4760 R5.x)
ACSE OT R2.3 IP/SIP and UC&C
ACSE OXE R12.1
ACSE 8770 R3.2(4760 R5.x)
ACSE OT R2.3 IP/SIP and UC&C
Re: 4645 reset user password - risk!
Update:
I had created a username helpdesk and set a password for it under root.
Edited passwd file under /etc as below, saved and tested
root
0:0:root:/root:/bin/bash
bin
1:1:bin:/bin:/bin/false
daemon
2:2:daemon:/sbin:/bin/false
ftp
14:50:FTP User:/var/ftp:/bin/false
nobody
99:99:Nobody:/:/bin/false
httpd
48:102:Apache:/var/www:/bin/false
ppp
100:11::/tmp:/usr/netadm/sh/ppp.sh
netdump
34:34:Network Crash Dump user:/var/crash:/bin/false
swinst
0:3:installation-account:/DHS3bin/soft_install/bin:/bin/bash
mtcl
2011:1002:mtcl:/DHS3bin/mtcl:/bin/bash
adfexc
2015:1002:adfexc:/DHS3bin/adfexc:/bin/bash
client
2017:1002:client:/DHS3bin/client:/bin/false
helpdesk
2018:1003:helpdesk:/usr2/servers/Eva_tool:/bin/bash
I am unable to run the Eva_tool command after logging in with helpdesk username successfully. Any suggestions?
I had created a username helpdesk and set a password for it under root.
Edited passwd file under /etc as below, saved and tested
root
bin
daemon
ftp
nobody
httpd
ppp
netdump
swinst
mtcl
adfexc
client
helpdesk
I am unable to run the Eva_tool command after logging in with helpdesk username successfully. Any suggestions?
SWINSTU
ACSE OXE R12.1
ACSE 8770 R3.2(4760 R5.x)
ACSE OT R2.3 IP/SIP and UC&C
ACSE OXE R12.1
ACSE 8770 R3.2(4760 R5.x)
ACSE OT R2.3 IP/SIP and UC&C
-
krzysioD
Re: 4645 reset user password - risk!
YEap. and after reboot your user helpdesk will get deleted...
Re: 4645 reset user password - risk!
Thanks for your feedback.
So is there a way to create a login for end customers to only access Eva_tool to reset the voicemail instead of issueing them the mtcl login and password?
So is there a way to create a login for end customers to only access Eva_tool to reset the voicemail instead of issueing them the mtcl login and password?
SWINSTU
ACSE OXE R12.1
ACSE 8770 R3.2(4760 R5.x)
ACSE OT R2.3 IP/SIP and UC&C
ACSE OXE R12.1
ACSE 8770 R3.2(4760 R5.x)
ACSE OT R2.3 IP/SIP and UC&C
-
krzysioD
Re: 4645 reset user password - risk!
Maybe Omnivista 4760? There you have nice web login and access levels.
Re: 4645 reset user password - risk!
Its not a Omnivista 4760 server user.
SWINSTU
ACSE OXE R12.1
ACSE 8770 R3.2(4760 R5.x)
ACSE OT R2.3 IP/SIP and UC&C
ACSE OXE R12.1
ACSE 8770 R3.2(4760 R5.x)
ACSE OT R2.3 IP/SIP and UC&C
