09-08-2005
can u brieff your questions.. do u want to restrict the users login or do u want to control the application access...
9 More Discussions You Might Find Interesting
1. Cybersecurity
Hello All,
Does anyone know of any good utilities for user management/password management for HP-UX? I have 32 switchs (telephone) running HP-UX 10x and managing the users on them is becoming quite time consuming...
Thanks
Brian (1 Reply)
Discussion started by: breigner
1 Replies
2. What is on Your Mind?
I am currently executing a Unix audit & would like some guidance on best practice for the management of root user access.
The organisation is small, with an IT team of approx 25. (6 Replies)
Discussion started by: conaloregan
6 Replies
3. Solaris
I want to know about how to start and kill the process of other unix user. Do I need to change the owner or modify user account itself. ??? (1 Reply)
Discussion started by: vikasdeshmukh
1 Replies
4. UNIX for Dummies Questions & Answers
Does it exist centralized tools on unix for managing users of all servers (like windows AD) ? (1 Reply)
Discussion started by: astjen
1 Replies
5. Solaris
Hi,
Is all of the user account password security settings kept in the /etc/default/passwd file or is there some new control in Solaris 10 that defines these?
I need to know the security settings for passwords in Solaris 10. Also is there any way to find out when accounts were created? ... (3 Replies)
Discussion started by: gwhelan
3 Replies
6. Linux
Hi All,
I have to learn all the user management commend like adduser,useradd,chggrp... etc
I would like to know the syntax or example.
Please give me document or link.
Thanks,
Mani (1 Reply)
Discussion started by: Mani_apr08
1 Replies
7. AIX
Hi
When i search for a user it shows that the user doesn't exist
# lsuser x090817
3004-687 User "x090817" does not exist.
But under /var/spool/mail/ the file named x090817 still exists.
4700 1 -rw-rw---- 1 2090817 mail 603 Apr 12 2010 /var/spool/mail/x090817... (1 Reply)
Discussion started by: aixaixaixaix
1 Replies
8. AIX
We have an environment of around 50 AIX LPARs. We use scripts for user and group account management but it is starting to get unwieldy to document and manage the accounts. It would be doable with scripts but before we dedicate resources to that, I was wondering if there is any product that you... (2 Replies)
Discussion started by: wilford
2 Replies
9. UNIX for Beginners Questions & Answers
Good afternoon all,
Was un-sure on where to post this so I thought I would use this topic...
I was wondering what best practice people use for the deletion of user profiles on AIX systems?
At the moment, I currently don't delete any user profiles, they are just disabled as they... (1 Reply)
Discussion started by: SteveCPayne
1 Replies
LEARN ABOUT PHP
securetty
SECURETTY(5) Linux Programmer's Manual SECURETTY(5)
NAME
securetty - file which lists terminals from which root can log in
DESCRIPTION
The file /etc/securetty contains the names of terminals (one per line, without leading /dev/) which are considered secure for the transmis-
sion of certain authentication tokens.
It is used by (some versions of) login(1) to restrict the terminals on which root is allowed to login. See login.defs(5) if you use the
shadow suite.
On PAM enabled systems, it is used for the same purpose by pam_securetty(8) to restrict the terminals on which empty passwords are
accepted.
FILES
/etc/securetty
SEE ALSO
login(1), login.defs(5), pam_securetty(8)
COLOPHON
This page is part of release 4.15 of the Linux man-pages project. A description of the project, information about reporting bugs, and the
latest version of this page, can be found at https://www.kernel.org/doc/man-pages/.
Linux 2015-03-29 SECURETTY(5)