.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
-.\" 3. All advertising materials mentioning features or use of this software
-.\" must display the following acknowledgement:
-.\" This product includes software developed by the University of
-.\" California, Berkeley and its contributors.
-.\" 4. Neither the name of the University nor the names of its contributors
+.\" 3. Neither the name of the University nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" @(#)chpass.1 8.2 (Berkeley) 12/30/93
.\" $FreeBSD$
.\"
-.Dd December 30, 1993
+.Dd May 25, 2021
.Dt CHPASS 1
.Os
.Sh NAME
.Nm ypchsh
.Nd add or change user database information
.Sh SYNOPSIS
-.Nm
+.Nm chpass
.Op Fl a Ar list
-.Op Fl p Ar encpass
.Op Fl e Ar expiretime
+.Op Fl p Ar encpass
.Op Fl s Ar newshell
.Op user
-.Pp
-.Nm
-.Op Fl oly
+.Nm ypchpass
+.Op Fl loy
.Op Fl a Ar list
-.Op Fl p Ar encpass
-.Op Fl e Ar expiretime
-.Op Fl s Ar newshell
.Op Fl d Ar domain
+.Op Fl e Ar expiretime
.Op Fl h Ar host
+.Op Fl p Ar encpass
+.Op Fl s Ar newshell
.Op user
.Sh DESCRIPTION
The
Only the information that the user is allowed to change is displayed.
.Pp
The options are as follows:
-.Bl -tag -width indent
-.It Fl a
+.Bl -tag -width "-e expiretime"
+.It Fl a Ar list
The super-user is allowed to directly supply a user database
entry, in the format specified by
.Xr passwd 5 ,
.Pq Dq \&:
separated list of all the
user database fields, although they may be empty.
-.It Fl p
-The super-user is allowed to directly supply an encrypted password field,
-in the format used by
-.Xr crypt 3 ,
-as an argument.
.It Fl e Ar expiretime
Change the account expire time.
This option is used to set the expire time
from a script as if it was done in the interactive editor.
+.It Fl p Ar encpass
+The super-user is allowed to directly supply an encrypted password field,
+in the format used by
+.Xr crypt 3 ,
+as an argument.
.It Fl s Ar newshell
Attempt to change the user's shell to
.Ar newshell .
across a group of systems) as they control file access.
.Pp
While it is possible to have multiple entries with identical login names
-and/or identical user id's, it is usually a mistake to do so. Routines
+and/or identical user id's, it is usually a mistake to do so.
+Routines
that manipulate these files will often return only one of the multiple
entries, and that one by random selection.
.Pp
The
-.Ar group
+.Ar gid
field is the group that the user will be placed in at login.
Since
.Bx
numbers and finally
.Ar other information
which is a single comma delimited string to represent any additional
-gcos fields (typically used for site specific user information).
+gecos fields (typically used for site specific user information).
Note that
.Xr finger 1
will display the office location and office phone together under the
heading
-.Ar Office: .
+.Ar Office\&: .
.Pp
The user's
.Ar home directory
compatibility problems with other NIS-capable systems.
Even though the super-user may supply data for other fields
while editing an entry, the extra information (other than the
-password -- see below) will be silently discarded.
+password \(em see below) will be silently discarded.
.Pp
Exception: the super-user on the NIS master server is permitted to
change any field.
-.Pp
.It
.Em "Password authentication is required" .
The
There are also a few extra option flags that are available when
.Nm
is compiled with NIS support:
-.Bl -tag -width indent
-.It Fl l
-Force
-.Nm
-to modify the local copy of a user's password
-information in the even that a user exists in both
-the local and NIS databases.
-.It Fl y
-Opposite effect of
-.Fl l .
-This flag is largely redundant since
-.Nm
-operates on NIS entries by default if NIS is enabled.
+.Bl -tag -width "-d domain"
.It Fl d Ar domain
Specify a particular NIS domain.
The
.Fl d
option, in which case the user-specified hostname will override
the default.
-.Pp
+.It Fl l
+Force
+.Nm
+to modify the local copy of a user's password
+information in the event that a user exists in both
+the local and NIS databases.
.It Fl o
Force the use of RPC-based updates when communicating with
.Xr rpc.yppasswdd 8
allows unrestricted changes to the NIS passwd maps using dedicated,
non-RPC-based mechanism (in this case, a
.Ux
-domain socket). The
+domain socket).
+The
.Fl o
flag can be used to force
.Nm
to use the standard update mechanism instead.
This option is provided
mainly for testing purposes.
+.It Fl y
+Opposite effect of
+.Fl l .
+This flag is largely redundant since
+.Nm
+operates on NIS entries by default if NIS is enabled.
.El
.Sh FILES
.Bl -tag -width /etc/master.passwd -compact
the user database
.It Pa /etc/passwd
a Version 7 format password file
-.It Pa /etc/chpass.XXXXXX
-temporary copy of the password file
+.It Pa /etc/pw.XXXXXX
+temporary file
.It Pa /etc/shells
the list of approved shells
.El
+.Sh EXAMPLES
+Change the shell of the current user to
+.Ql /usr/local/bin/zsh :
+.Bd -literal -offset indent
+chsh -s /usr/local/bin/zsh
+.Ed
.Sh SEE ALSO
.Xr finger 1 ,
.Xr login 1 ,
.Xr getusershell 3 ,
.Xr login.conf 5 ,
.Xr passwd 5 ,
+.Xr pw 8 ,
.Xr pwd_mkdb 8 ,
.Xr vipw 8
.Rs
.%A Robert Morris
-and
.%A Ken Thompson
.%T "UNIX Password security"
.Re
-.Sh BUGS
-User information should (and eventually will) be stored elsewhere.
.Sh HISTORY
The
.Nm
utility appeared in
.Bx 4.3 Reno .
+.Sh BUGS
+User information should (and eventually will) be stored elsewhere.