Disclaimer: This has not been tested, but I think it could be a starting point.
Assuming you have a Linux server with an ESP Agent installed.
This method uses SHA to hash the date, runs through base64, and then outputs the top 32 characters.
date +%s | sha256sum | base64 | head -c 32
Variable Sub-string notation like this %symbolic(start_position:end_position).
%ESPFTFILE(<%StartPosition>:%LENGTH(%ESPFTFILE))
This is a rough draft of what you could do:
1. Create a directory on the Linux server ( /home/<user>/password )
2. Create an ESP PROC with the following:
/* Define Symbolic Variables */
AgentName="<Valid Agent Name>"
GenPass="date +%s | sha256sum | base64 | head -c 32"
PassDir="/home/<user>/password" /* replace <user> with valid user */
StartPosition="<calculate offset>"
LINUX_JOB CREATEPW /* to create the file with the password */
AGENT %AgentName
CMDNAME <Valid Shell>
USER <Valid User>
ARGS -c 'touch %PassDir/password_$(%GenPass)'
RUN ANYDAY
RELEASE GETPW
ENDJOB
FILE_TRIGGER GETPW /* to 'find' the file, password will be in ESP variable %ESPFTFILE */
AGENT %AgentName
FILENAME 'PassDir/password_*' EXIST
RUN ANYDAY ENDJOB
ENDJOB
JOB SETPASS LINK PROCESS
ESPNOMSG PASSWORD DEFINE USER(jdoe) PASSWORD('%ESPFTFILE(<%StartPosition>:%LENGTH(%ESPFTFILE))')
RUN ANYDAY
ENDJOB
3. Create an ESP Event to INVOKE PROC
Let me know if you think something like that would work.