Visit Our UNIX and Linux User Community

Linux and UNIX Man Pages

Test Your Knowledge in Computers #678
Difficulty: Medium
Wi-Fi positioning systems use the positions of local cellular towers to identify the location of a Wi-Fi device.
True or False?
Linux & Unix Commands - Search Man Pages

console.apps(5) [redhat man page]

console.apps(5) 					   System Administrator's Manual					   console.apps(5)

console.apps - specify console-accessible privileged applications DESCRIPTION
The /etc/security/console.apps/ directory should contain one file per application that wishes to allow access to console users. The file- name should be the same as the servicename, and the contents are irrelevant; the file may be a zero-length file. The application that the file is used by is free to specify the contents in any way that is useful for it. SEE ALSO
pam_console(8) console.perms(5) AUTHOR
Michael K. Johnson <> Red Hat Software 1999/2/4 console.apps(5)

Check Out this Related Man Page

console.perms(5)					   System Administrator's Manual					  console.perms(5)

console.perms - permissions control file for users at the system console DESCRIPTION
/etc/security/console.perms determines the permissions that will be given to priviledged users of the console at login time, and the per- missions to which to revert when the users log out. It is read by the pam_console module. The format is: <class>=space-separated list of words login-regexp|<login-class> perm dev-glob|<dev-class> revert-mode revert-owner[.revert-group] The revert-mode, revert-owner, and revert-group fields are optional, and default to 0600, root, and root, respectively. The words in a class definition are evaluated as globs if they refer to files, but as regular expressions if they apply to a console defi- nition. Do not mix them. Any line can be broken and continued on the next line by using a character as the last character on the line. The login-class class and the login-regexp word are evaluated as regular expressions. The dev-class and the dev-glob word are evaluated as shell-style globs. If a name given corresponds to a directory, and if it is a mount point listed in /etc/fstab, the device node associated with the filesystem mounted at that point will be substituted in its place. Classes are denoted by being contained in < angle bracket > characters; a lack of < angle brackets > indicates that the string is to be taken literally as a login-regexp or a dev-glob, depending on its input position. SEE ALSO
pam_console(8) pam_console_apply(8) console.apps(5) AUTHOR
Michael K. Johnson <> Red Hat Software 1999/2/3 console.perms(5)

4 More Discussions You Might Find Interesting

1. Red Hat

Increase Password length

Hello All, I am using RHEL 4. Currently maximum password length limit is set to 8 on my system. Please tell what do i need to change to increase this limit to say 20. I changed the login.defs and included the following line - " PASS_MAX_LEN 20 " but this dint work. I further... (7 Replies)
Discussion started by: shamik
7 Replies

2. AIX

websm: configuring embedded Web server ?

Hello, AIX v6.1 TL6 I need to install websm and have problems configuring AIX embedded Web server. In order to install windows client I must download it from AIX server using HTTP. This is from official IBM doc: I am able to launch configassist successfully but there is no word about websm... (0 Replies)
Discussion started by: vilius
0 Replies

3. AIX

TL upgrade failed

Hi I'm trying to upgrade the AIX TL on my test LPAR. current os level is "7100-01-06-1241" Planning to upgrade it to latest TL. "7100-02-03-1334" 1) Downloaded the TL files from fix central Selected "7100-02-03-1334" --> requisite "7100-02-00-1241" ==> Downloaded both 2) backedup... (9 Replies)
Discussion started by: System Admin 77
9 Replies

4. UNIX for Beginners Questions & Answers

What is wrong with file permission?

Friends, I have weird problem with my Linux OS. I have few files which is owned by root but could not be modified (edit, chmod, chown etc) # id uid=0(root) gid=0(root) groups=0(root) # whoami root # ls -l /etc/security/access-sshd.conf -rw-r--r-- 1 root root 431 Jun 22 03:31... (12 Replies)
Discussion started by: baluchen
12 Replies

Featured Tech Videos