You can change the root password for any vRealize Operations primary or data node at any time by using the console.
The root user bypasses the pam_cracklib
module password complexity check, which is found in /etc/pam.d/system-password
. All hardened appliances activate enforce_for_root
for the pw_history
module, found in the /etc/pam.d/system-password
file. The system remembers the last five passwords by default. Old passwords are stored for each user in the /etc/security/opasswd
file.
Prerequisites
Verify that the root password for the appliance meets your organization’s corporate password complexity requirements. If the account password starts with $6$
, it uses a sha512 hash. This is the standard hash for all hardened appliances.