PASSWORD MODIFICATION IN A DISTRIBUTED COMPUTER SYSTEM
Original Publication Date: 1996-Nov-01
Included in the Prior Art Database: 2002-May-02
In a distributed computer system that consists new password is propagated (in encrypted form) to of a master and slave hosts, users typically can login the master host. In turn, the master host sends the to any of the slave hosts by providing a password. It password change for the particular user to all the is desirable, for security reasons, for a user to peri- slaves in the system. This enables the user to utilize odically change his/her password. For this purpose, the new password at any of the slave hosts the next the user logs into any ofthe slave hosts and supplies time he/she logs in. The above procedure is depicted a new password. Under normal circumstances, the in Figure 1.