]> git.ipfire.org Git - thirdparty/man-pages.git/blame - man5/securetty.5
getrlimit.2: Correct information about large limits on 32-bit architectures
[thirdparty/man-pages.git] / man5 / securetty.5
CommitLineData
3d54a910
MK
1.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
2.\" Fri Apr 2 11:32:09 MET DST 1993
fea681da 3.\"
1dd72f9c 4.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
fea681da
MK
5.\" This is free documentation; you can redistribute it and/or
6.\" modify it under the terms of the GNU General Public License as
7.\" published by the Free Software Foundation; either version 2 of
8.\" the License, or (at your option) any later version.
9.\"
10.\" The GNU General Public License's references to "object code"
11.\" and "executables" are to be interpreted as the output of any
12.\" document formatting or typesetting system, including
13.\" intermediate and printed output.
14.\"
15.\" This manual is distributed in the hope that it will be useful,
16.\" but WITHOUT ANY WARRANTY; without even the implied warranty of
17.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18.\" GNU General Public License for more details.
19.\"
20.\" You should have received a copy of the GNU General Public
c715f741
MK
21.\" License along with this manual; if not, see
22.\" <http://www.gnu.org/licenses/>.
6a8d8745 23.\" %%%LICENSE_END
c13182ef 24.\"
fea681da 25.\" Modified Sun Jul 25 11:06:27 1993 by Rik Faith (faith@cs.unc.edu)
1e64c86b 26.TH SECURETTY 5 2015-03-29 "Linux" "Linux Programmer's Manual"
fea681da 27.SH NAME
1285ff3d 28securetty \- file which lists terminals from which root can log in
fea681da
MK
29.SH DESCRIPTION
30The file
31.I /etc/securetty
520c3a8b 32contains the names of terminals
fea681da
MK
33(one per line, without leading
34.IR /dev/ )
520c3a8b
SA
35which are considered secure for the transmission of certain authentication
36tokens.
11ac5b51 37.PP
520c3a8b
SA
38It is used by (some versions of)
39.BR login (1)
40to restrict the terminals
fea681da
MK
41on which root is allowed to login.
42See
43.BR login.defs (5)
44if you use the shadow suite.
11ac5b51 45.PP
520c3a8b
SA
46On PAM enabled systems, it is used for the same purpose by
47.BR pam_securetty (8)
48to restrict the terminals on which empty passwords are accepted.
fea681da
MK
49.SH FILES
50.I /etc/securetty
47297adb 51.SH SEE ALSO
fea681da 52.BR login (1),
520c3a8b
SA
53.BR login.defs (5),
54.BR pam_securetty (8)