10-16-2001
Take a look at the man page for "last". The output contains
login name, tty, host or IP logging in from, time in and time
out. There are also many options so this is a good starting
place.
10 More Discussions You Might Find Interesting
1. Programming
Hi !
Please tell me how to get radio buttons, text boxes , check boxes , option buttons , pull down menus in C++ on Unix.
I think it would be done using curses.h ..but that's all i know.
TIA,
Devyani. (3 Replies)
Discussion started by: devy8
3 Replies
2. UNIX for Dummies Questions & Answers
Hello All!
Does anyone know of a nice way to log commands in solaris 8.
What I need is a program or script that saves any command that a user does in solaris command prompt. So when Steven logs in on a system, it should record everything he does, from an ls to exit with timestamps. I've been... (6 Replies)
Discussion started by: dozy
6 Replies
3. AIX
What is the best way to logoff users from my Unix system? I have done a search and found that you can do a w or who - find who is on, and ps-ef | grep <user> and kill their processes. But what if you have a bunch of users and you need them off the system quickly? Killing individual processes... (1 Reply)
Discussion started by: outtacontrol
1 Replies
4. Solaris
Hello,
I'm administrating new installed cluster that runs Legato Networker and Oracle 9. And I want to restrict the use of root to my self and givr the application and DBA the proper and needed privileges to do their duties without hassle in addition I would like to log users activities.
my... (0 Replies)
Discussion started by: sh_ksa
0 Replies
5. Solaris
I am looking for solutions to address my need to log to a file whenever a user logs out or session disconnects. (1 Reply)
Discussion started by: mhm4
1 Replies
6. UNIX for Advanced & Expert Users
We installed ssh on our AIX 5.3 box. The issue we are facing is that we dont get the users listed when we use 'w' or 'who'. After going through google without success, checked the www.openssh.org site. The FAQ section posted the solution that -
How do I go about this? Has anyone faced an issue... (2 Replies)
Discussion started by: ranj@chn
2 Replies
7. Solaris
I would like to know how to prevent users connecting to a server using SSH as root.
I would still like them to be able to login with their username and then change to su.
But I would like to prevent them logging in directly as root.
I have searched the forum and read that I should set... (3 Replies)
Discussion started by: Sepia
3 Replies
8. Shell Programming and Scripting
Hi,
How do force users to log off Unix through shell? (2 Replies)
Discussion started by: Wahmed9
2 Replies
9. Solaris
We recently underwent a security audit and have a new requirement to not allow users to stay logged on overnight. In order to place this policy into effect i need a way to check for idle users and log them off. Is there any good way to enforce this policy in Solaris 10 and make it work in such a... (11 Replies)
Discussion started by: goose25
11 Replies
10. Shell Programming and Scripting
Hi Guys!
I am sure that this question might appeared previously, but I still don't know how to show a list of logged out users. Please help with this!
Thanks in advance:) (5 Replies)
Discussion started by: saloliubliu
5 Replies
LEARN ABOUT NETBSD
login.access
LOGIN.ACCESS(5) BSD File Formats Manual LOGIN.ACCESS(5)
NAME
login.access -- login access control table
DESCRIPTION
The login.access file specifies (user, host) combinations and/or (user, tty) combinations for which a login will be either accepted or
refused.
When someone logs in, the login.access is scanned for the first entry that matches the (user, host) combination, or, in case of non-networked
logins, the first entry that matches the (user, tty) combination. The permissions field of that table entry determines whether the login
will be accepted or refused.
Each line of the login access control table has three fields separated by a ':' character: permission:users:origins
The first field should be a "+" (access granted) or "-" (access denied) character. The second field should be a list of one or more login
names, group names, or ALL (always matches). The third field should be a list of one or more tty names (for non-networked logins), host
names, domain names (begin with "."), host addresses, internet network numbers (end with "."), ALL (always matches) or LOCAL (matches any
string that does not contain a "." character). If you run NIS you can use @netgroupname in host or user patterns.
The EXCEPT operator makes it possible to write very compact rules.
The group file is searched only when a name does not match that of the logged-in user. Only groups are matched in which users are explicitly
listed: the program does not look at a user's primary group id value.
FILES
/etc/login.access The login.access file resides in /etc.
SEE ALSO
login(1), pam(8)
AUTHORS
Guido van Rooij
BSD
April 30, 1994 BSD