From 741c1ef7a4f2ac316ad6e557ddbe03023413478d Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Mon, 6 May 2024 04:22:06 +0200 Subject: Adding upstream version 1:4.5. Signed-off-by: Daniel Baumann --- man/login.access.5.xml | 140 +++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 140 insertions(+) create mode 100644 man/login.access.5.xml (limited to 'man/login.access.5.xml') diff --git a/man/login.access.5.xml b/man/login.access.5.xml new file mode 100644 index 0000000..bb3e77c --- /dev/null +++ b/man/login.access.5.xml @@ -0,0 +1,140 @@ + + + +]> + + + + + Marek + Michałkiewicz + Creation, 1996 + + + Thomas + Kłoczko + kloczek@pld.org.pl + shadow-utils maintainer, 2000 - 2007 + + + Nicolas + François + nicolas.francois@centraliens.net + shadow-utils maintainer, 2007 - now + + + + login.access + 5 + File Formats and Conversions + shadow-utils + &SHADOW_UTILS_VERSION; + + + login.access + login access control table + + + + DESCRIPTION + + The login.access file specifies (user, + host) combinations and/or (user, tty) combinations for which a login + will be either accepted or refused. + + + + When someone logs in, the login.access + is scanned for the first entry that matches the (user, host) + combination, or, in case of non-networked logins, the first entry that + matches the (user, tty) combination. The permissions field of that + table entry determines whether the login will be accepted or refused. + + + + Each line of the login access control table has three fields separated + by a ":" character: + + + + permission:users:origins + + + + The first field should be a "+" (access granted) + or "-" (access denied) character. The second + field should be a list of one or more login names, group names, or + ALL (always matches). The third field should be a + list of one or more tty names (for non-networked logins), host names, + domain names (begin with "."), host addresses, + internet network numbers (end with "."), + ALL (always matches) or + LOCAL (matches any string that does not contain a + "." character). If you run NIS you can use + @netgroupname in host or user patterns. + + + + The EXCEPT operator makes it possible to write + very compact rules. + + + + The group file is searched only when a name does not match that of the + logged-in user. Only groups are matched in which users are explicitly + listed: the program does not look at a user's primary group id value. + + + + + FILES + + + /etc/login.defs + + Shadow password suite configuration. + + + + + + + SEE ALSO + + + login1 + . + + + -- cgit v1.2.3