su(1) [ultrix man page]
su(1) General Commands Manual su(1) Name su - substitute a user ID Syntax su [username] su - [username] su -f [username] Description The command requests the password of the specified username. If the correct password is given, changes to that username without changing the current directory. The user environment is unchanged except for HOME and SHELL which are taken from the password file entry for user- name. The shell that is run is also taken from the password file entry for username. The new user ID stays in force until the shell exits. If no username is specified, `root' is assumed. To remind the superuser of his responsibilities, the shell substitutes `#' for its usual prompt. Options -f Prevents from executing the .cshrc file, making start up faster. - Simulates a full login. Diagnostics Sorry An invalid password was supplied for the specified username. Unknown login: username The specified username was not found in the passwd database. No directory The home directory for the username is not accessible at this time (only with ``-'' argument). No shell The shell specified in the passwd database entry for username could not be executed. Kerberos initialization failure Consult your system administrator. If enhanced security features are enabled the following error messages are also possible: Requires secure terminal Attempt to su to UID 0 on a line that is not marked secure in User's password has expired Access is denied because the password for username is expired. This account is disabled Access is denied because the auth entry corresponding to username is marked disabled. Files Log file of anyone who became root, with a date mark. See Also csh(1), sh(1), passwd(5yp), environ(7), edauth(8) Security Guide for Administrators Security Guide for Users su(1)
Check Out this Related Man Page
getauth(8) System Manager's Manual getauth(8) Name getauth, setauth, rmauth - auth database maintenance Syntax getauth [username] setauth rmauth username Description The command takes as it's only argument a user name or UID. If a user name is supplied it is converted to a UID by searching through The UID is then used to look up the users entry in the database. If an entry is found it is converted to an ASCII string with a syntax resem- bling that of the passwd file and printed out as a single line. If no entry is found nothing is printed and an exit status of `1' is returned. # getauth username 1000:idvidfy8d:1920129:3600:2678400:0e:0:1000:0:00:00 The first field is the UID of the entry which is used as the key into the database. Then follows: the encrypted password, password modifi- cation time, minimum password lifetime, maximum password lifetime, account mask, login failure count, audit ID, audit control, audit mask, and a reserved field. If the optional username argument is not supplied to getauth it will produce an output line for every entry in the auth database. The command expects one or more lines from the standard input which must be of a form identical to that produced by the command. The com- mand converts and stores these lines into the database, one entry per line, replacing any entry already existing for the given UID. By piping the output of the command into the input of the command an expensive NOP can be produced: # /usr/etc/sec/getauth | /usr/etc/sec/setauth The command expects exactly one argument, the user name or UID of an auth entry to be deleted. If the entry is found it is erased and deleted. If it is not found no action is taken and an exit status of 1 is returned. Restrictions Only the superuser and members of the group may read information from the auth database. Only the superuser may modify the auth database. Diagnostics An exit value of 0 indicates a successful operation. An exit status of 1 indicates the entry was not found on a lookup or deletion opera- tion. Any other exit status indicates an error. Files See Also getauthuid(3), getpwent(3), auth(5), edauth(8) Security Guide for Administrators getauth(8)