Visit Our UNIX and Linux User Community

Linux and UNIX Man Pages

Test Your Knowledge in Computers #485
Difficulty: Medium
A computer operating system loads an executable file into a call stack on a hard disk.
True or False?
Linux & Unix Commands - Search Man Pages

ttys(4) [hpux man page]

ttys(4) 						     Kernel Interfaces Manual							   ttys(4)

NAME
ttys - terminal control database file for trusted systems SYNOPSIS
DESCRIPTION
The system supports a single terminal control database containing entries for each local terminal that can log into the system. Authentica- tion programs use information contained in the terminal control database to determine if login from the terminal is permitted. Additional fields are maintained for informational purposes. The format of the terminal control database file is identical to other system authentication database files. For more information on the file format, see authcap(4). The file consists of keyword field identifiers and values for those fields. The keyword identifiers supported and their use include: This field defines the terminal device name for the entry. The terminal device is expected to be contained in the directory, therefore this prefix should not be specified. If the terminal entry describes the device, the field should contain This field records the user id of the last user to successfully login using the terminal device. This field records the last successful login time to the terminal device. This field records the last unsuccessful login time to the terminal device. This field records the number of consecutive unsuccessful login attempts to the terminal device. This field specifies the maximum number of consecutive unsuccessful login attempts permitted using the terminal before the terminal is locked. Once the terminal is locked, it must be unlocked by an authorized administrator. This field specifies the login timeout value (sec). This field specifies the delay between login tries (sec). This flag field indicates whether the terminal device has been administratively locked or not. This field is manipulated by authorized administrators only. EXAMPLES
The following is an example of a terminal control database entry: This entry is for the system console device, The most recent successful login session was for the user The entry records the system time for the current successful login and the time of the most recent unsuccessful login attempt. WARNINGS
Remote terminals (ptys) should not be added to the or databases. Device name formats treated as ptys by login are: where x is a letter, and y is a hex number where x is a letter, and y is a hex number HP-UX 11i Version 3 is the last release to support trusted systems functionality. AUTHOR
was developed by HP. FILES
Terminal control database file SEE ALSO
login(1), getprtcent(3), devassign(4), authcap(4), default(4). TO BE OBSOLETED ttys(4)

Check Out this Related Man Page

devassign(4)						     Kernel Interfaces Manual						      devassign(4)

NAME
devassign - device assignment database file for a trusted system SYNOPSIS
DESCRIPTION
The system supports a single device assignment database that contains entries for local login terminals. The format of the terminal control database file is identical to other trusted system authentication database files. For more information on the file format, see authcap(4). The file consists of keyword field identifiers and values for those fields. The keyword identifiers supported and their use include: This field specifies a comma separated list of aliases that refer to the same device defined by the entry. Use of this field avoids the need to replicate device assignment database entries for all device aliases. This field specifies the device that is described by the entry. Device types supported include: The device is assigned as a local login terminal device. This field, if specified, contains a comma separated list of user names that are permitted to use the device for login or the import/export of data. If the list is not present, all users are permitted to use the device. If the list is present, it is searched for a match by the login program to determine if the user is per- mitted to use the device. EXAMPLES
The following is an example of a device assignment database entry for a terminal device assigned as a login device: WARNINGS
Remote terminals (ptys) should not be added to the or databases. Device name formats treated as ptys by login are: where x is a letter, and y is a hex number where x is a letter, and y is a hex number HP-UX 11i Version 3 is the last release to support trusted systems functionality. AUTHOR
was developed by HP. SEE ALSO
login(1), getdvagent(3), ttys(4), authcap(4), default(4). TO BE OBSOLETED devassign(4)

Featured Tech Videos