sgepasswd (1) - Linux Man Pages

sgepasswd: Modify the xxQS_NAMExx password file of xxQS_NAMExx


sgepasswd - Modify the xxQS_NAMExx password file of xxQS_NAMExx


sgepasswd [[ -D domain ] -d user ]

sgepasswd [ -D domain ] [ user ]


sgepasswd modifies the xxQS_NAMExx password file

This file contains a list of usernames and their Microsoft Windows password in encrypted form. and on hosts running Microsoft Windows as operating systems use this information to start jobs for a certain user.

Each user can use the sgepasswd application to add a new entry for their own user account. (In fact, normal users can create an entry for any account, so the entry should be made initially, when the account is created.) It is also possible to change the stored password with sgepasswd if the user knows the old one.

The root user additionally has permission to change the password entries for other user accounts. Root can also delete existing entries.

The sgepasswd binary is only available on non-Windows hosts.


-D domain
By default sgepasswd will add/modify the current Unix username without a domain specification. This switch can be used to add a domain specification in front of the current user name. Consult your Microsoft Windows documentation to get more information about domain users.
-d user
Only root can use this parameter to delete entries from the file.
Prints a listing of all options.


Prevent relevant jobs running before a password is changed both with sgepasswd and in the Windows domain. Otherwise, if multiple jobs try to run on a Windows host as the user concerned, and are unable to access the right password, Windows' intrusion detection system may disable the account. sgepasswd and in the Windows domain.


This is a non-trivial program which needs to be setuid root, operating with various user-supplied input. It probably shouldn't be installed setuid if it is not needed to support Windows hosts.

See above concerning making initial entries.


Specifies the location of the public key file. By default sgepasswd will use $SGE_ROOT/$SGE_CELL/common/sgeCA/certs/cert.pem.
If set, specifies the location of the private key file. Default is /var/lib/sgeCA/port$SGE_QMASTER_PORT/$SGE_CELL/private/key.pem.
If set, specifies the location of the seed used to create encrypted versions of user passwords. Default is /var/lib/sgeCA/port${SGE_QMASTER_PORT}/${SGE_CELL}/private/rand.seed.


See for a full statement of rights and permissions.