blob: 1bd0dab97e5ec8f67f1f4ce070f43ee2815b38e4 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
|
.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
.\" SPDX-License-Identifier: GPL-2.0-or-later
.\"
.\" Modified Sun Jul 25 11:06:27 1993 by Rik Faith (faith@cs.unc.edu)
.TH securetty 5 2024-05-02 "Linux man-pages (unreleased)"
.SH NAME
securetty \- list of terminals on which root is allowed to login
.SH DESCRIPTION
The file
.I /etc/securetty
contains the names of terminals
(one per line, without leading
.IR /dev/ )
which are considered secure for the transmission of certain authentication
tokens.
.P
It is used by (some versions of)
.BR login (1)
to restrict the terminals
on which root is allowed to login.
See
.BR login.defs (5)
if you use the shadow suite.
.P
On PAM enabled systems, it is used for the same purpose by
.BR pam_securetty (8)
to restrict the terminals on which empty passwords are accepted.
.SH FILES
.I /etc/securetty
.SH SEE ALSO
.BR login (1),
.BR login.defs (5),
.BR pam_securetty (8)
|