README ¶
Password Expiry Watcher
This tool allows you as a system administrator to download a CSV of all of your users with each user's password expiration date. This allows monitoring of users with upcoming password expirations and for you the administrator to prevent these users from abruptly being cut out of their mission critical systems.
To Install
I do not have the Go toolchain installed
Most users will want to follow these instructions
- Go to the "Releases" tab of this github project
- We have provided
.zip
files for most operating systems- Note that macOS users will want to use the
darwin
binaries
- Note that macOS users will want to use the
- Download the zip file of your choice
- We always recommend downloading from the latest release if possible
- Most Windows users will want the
386
zip
- Extract the files from the zip
- Right click on the zip file and click
Extract All
on Windows - Double click on the zip file on macOS/Linux
- Right click on the zip file and click
PasswordExpiryWatcher_myos_myarch
is the relevant binary- Some may find this is an unwieldy name to type every time. Feel free to rename to your liking, in fact if this is a tool you plan on running frequently we encourage this for ease of use.
If you'd like to be able to call this binary from an arbitrary directory you can move it to
/usr/local/bin
on Linux and macOSOn macOS the keyboard shortcut
⌘ + Shift + G
with an open Finder window will allow you to directly type in the directory you'd like to access. To move the binary to/usr/local/bin
with Finder simply use that shortcut and copy/paste/usr/local/bin
into the dialog box. You can now drag and drop the binary onto the Finder window to easily make it accessible without having to navigate to a specific folder to run it. If you do this we also recommend renaming the binary before moving it to a more memorable name.
I have the Go toolchain installed
If you don't know what "Go" or "Golang" is we have provided pre-made binaries for your convenience. Installation instructions for these binaries is provided in the previous section
- Clone the
jcapi
repository (it doesn't matter where)git clone https://github.com/TheJumpCloud/jcapi
- Navigate to the
jcapi/examples/PasswordExpiryWatcher
directorycd jcapi/examples/PasswordExpiryWatcher
- Run go install
go install .
This will install a binary called passwordExpiryWatcher
to your $GOBIN
If you'd like to be able to call this binary from an arbitrary directory make sure your
$GOBIN
is in your$PATH
(linux) or%PATH%
(windows)
To Run
To run this tool you will need to use the command line. On Windows you can use PowerShell and on OSX you can use Terminal.
While running this tool requires no previous experience with either of those programs some might feel wary or nervous working with a tool they don't understand. The following instructions in this section should provide you with all you need to get up and running, but if you would like to learn about the how and why of the command line we highly recommend the excellent (and free!) Command Line Crash Course by Zed Shaw. Zed even provides a direct email hotline for users that get stuck. However if you are stuck and would rather just get your users' password expiration dates ASAP please don't hesitate to contact JumpCloud support for assistance running this tool.
This tool only takes two (required) arguments:
key
is your JumpCloud API keyoutput
is where you'd like to put the resulting CSV file
For example:
./PasswordExpiryWatcher -key=82105124f2979e28273d4e8dd32b2355c5012837 -output=password_expirations.csv
If you have renamed your binary simply replace
PasswordExpiryWatcher
with the new name
If you installed the binary with the Go toolchain and your
$GOBIN
is in your$PATH
or%PATH%
, or if you moved the binary to/usr/local/bin
you can run the above command at any time on your command line excluding the "./"
Windows Instructions
- Open
PowerShell
- Using the
cd
(stands for "Change Directory") command navigate to where you downloaded your binaries- For example, if we downloaded and unzipped the binaries in our
Download
folder we just have to run:cd Downloads\JumpCloudAPI_Examples_windows_386
. If we downloaded to our desktop the command will probably look something like:cd Desktop\JumpCloudAPI_Examples_windows_386
- If you used the Go install instructions and your
$GOBIN
is in your%PATH%
you can skip step 2 and go right to 3
- For example, if we downloaded and unzipped the binaries in our
- Grab your API key from the JumpCloud Admin console
- Click on your email on the top right hand corner to access the API Settings
- Run the command
./PasswordExpiryWatcher.exe -key=YOUR_API_KEY_GOES_HERE -output=CSV_FILE_OUTPUT_GOES_HERE
- If you would like your CSV file to go somewhere else besides the current directory make sure you include the full path of the file
- Good Example:
-output=C:\Users\MyUser\CSVFiles\password_expirations.csv
- Bad Example
-output=..\CSVFiles\password_expirations.csv
- Good Example:
To run a command simply type it into the PowerShell window and hit
Enter
orReturn
when finished
macOS/Linux Instructions
- Open
Terminal
(this can be found inApplications/Utilities
) - Using the
cd
(stands for "Change Directory") command navigate to where you downloaded your binaries- For example, if we downloaded and unzipped the binaries in our
Download
folder we just have to run:cd Downloads/JumpCloudAPI_Examples_darwin_amd64
. If we downloaded to our desktop the command will probably look something like:cd Desktop/JumpCloudAPI_Examples_darwin_amd64
- If you used the Go install instructions and your
$GOBIN
is in your$PATH
, or if you manually moved the binary to/usr/local/bin
you can skip step 2 and go right to 3
- For example, if we downloaded and unzipped the binaries in our
- Grab your API key from the JumpCloud Admin console
- Click on your email on the top right hand corner to access the API Settings
- Run the command
./PasswordExpiryWatcher -key=YOUR_API_KEY_GOES_HERE -output=CSV_FILE_OUTPUT_GOES_HERE
To run a command simply type it into the Terminal window and hit
Enter
orReturn
when finished
Example Output
Documentation ¶
There is no documentation for this package.