]> git.ipfire.org Git - thirdparty/man-pages.git/blame - man5/securetty.5
Wrapped long lines, wrapped at sentence boundaries; stripped trailing
[thirdparty/man-pages.git] / man5 / securetty.5
CommitLineData
fea681da
MK
1.\" Copyright (c) 1993 Michael Haardt (michael@moria.de), Fri Apr 2 11:32:09 MET DST 1993
2.\"
3.\" This is free documentation; you can redistribute it and/or
4.\" modify it under the terms of the GNU General Public License as
5.\" published by the Free Software Foundation; either version 2 of
6.\" the License, or (at your option) any later version.
7.\"
8.\" The GNU General Public License's references to "object code"
9.\" and "executables" are to be interpreted as the output of any
10.\" document formatting or typesetting system, including
11.\" intermediate and printed output.
12.\"
13.\" This manual is distributed in the hope that it will be useful,
14.\" but WITHOUT ANY WARRANTY; without even the implied warranty of
15.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16.\" GNU General Public License for more details.
17.\"
18.\" You should have received a copy of the GNU General Public
19.\" License along with this manual; if not, write to the Free
20.\" Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111,
21.\" USA.
c13182ef 22.\"
fea681da
MK
23.\" Modified Sun Jul 25 11:06:27 1993 by Rik Faith (faith@cs.unc.edu)
24.TH SECURETTY 5 1992-12-29 "Linux" "Linux Programmer's Manual"
25.SH NAME
26securetty \- file which lists ttys from which root can log in
27.SH DESCRIPTION
28The file
29.I /etc/securetty
30is used by (some versions of)
31.BR login (1).
32The file contains the device names of tty lines
33(one per line, without leading
34.IR /dev/ )
35on which root is allowed to login.
36See
37.BR login.defs (5)
38if you use the shadow suite.
39.SH FILES
40.I /etc/securetty
41.SH "SEE ALSO"
42.BR login (1),
43.BR login.defs (5)