![]() Passwd: all authentication token updated successfully.Ĭonnect to your server at the console (don’t reboot now!) with the root user and the new password. Then, mount the /sysroot partition as read/write: switch_root:/# mount –o remount,rw /sysrootĮxecute the chroot command on the /sysroot partition: switch_root:/# chroot /sysrootĬhange the root password: sh-4.2# passwd root Don’t confuse with selinux=0 that completely disables SELinux. enforcing=0 puts the system into SELinux Permissive mode. Note: rd.break asks for a break at an early stage of the boot process. Then, go to the kernel line (the line starting with linux16) and add the following statements at the end: rd.break enforcing=0Ĭaution: The keys to press are those of a US keyboard (querty). ![]() ProcedureĪt the beginning of the boot process, at the GRUB 2 menu, type the e key to edit. The following procedure works all the time. Some were working with physical servers but not with virtual machines, some the other way around. There were several procedures floating around to recover the root password. ![]() In RHEL 7, the procedure to get access to a system during the boot process and modify the root password has changed because of the adoption of Systemd. Note: This is a critical RHCSA 7 exam objective (if you can’t take control of a VM through a reboot at the beginning of the exam, you will fail it entirely).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |