9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Environment: CentOS 7
I would like to have a solution where a service account can access a server in only these ways:
ssh non-interactively via password or ssh key; that is, run commands or scripts (but running anything in /etc/shells will not be allowed)
not ssh interactively
regular... (2 Replies)
Discussion started by: bgstack15
2 Replies
2. Windows & DOS: Issues & Discussions
Hello,
Does anyone know what happens to your skype account if you close the outlook.com email account which are linked together? As you know they are both owned by Microsoft.
Thanks (0 Replies)
Discussion started by: milhan
0 Replies
3. AIX
Hi Everyone,
I want to know is it possible, restrict user login to AIX by IP and user name?
e.g.
user alice can login to AIX (via ssh or telnet) from 192.168.1.100
user alice can not login to AIX (via ssh or telnet) from 172.16.1.100
user bob can not login to AIX (via ssh or telnet)... (6 Replies)
Discussion started by: nnnnnnine
6 Replies
4. How to Post in the The UNIX and Linux Forums
I have made password less connection to my remote account. and i tried to execute commands at a time. but i am unable to execute the commands.
ssh $ACCOUNT_DETAILS@$HOST_DETAILS
cd ~/JEE/*/logs/ (1 Reply)
Discussion started by: kishored005
1 Replies
5. UNIX for Dummies Questions & Answers
Can some one help me with this issue . I require to restrict a particular user to a particular folder alone when they log in. I dont want this particular user to come out of this folder.
Kindly help (7 Replies)
Discussion started by: kirbhas72
7 Replies
6. Linux
Hi ,
I am faceing lot of problem due to "disk space is not enough".
senerio is like as,
In system has 5 account.
a,b,c,d,e
say account c if very critical.
Due to other user's data, user 'c' is faceing disk space issue.
I want to dedicate 3 GB for user 'c'.
No user... (1 Reply)
Discussion started by: ashokd009
1 Replies
7. UNIX for Dummies Questions & Answers
I have access to 15+ UNIX boxes at work, and I do not consistently log onto all of them over time. When I do try to access one I havent been on in awhile, my account is locked as the password has expired.
I need to request to the UNIX SA's that the password expiration is 90 days and that if it... (1 Reply)
Discussion started by: stringzz
1 Replies
8. UNIX for Dummies Questions & Answers
Is there a way to easily change an account to be a non login account (NP in the shadow) file?
I know I can just edit the file but that is not what we want to do. We use access control software and want to provide a way to set an account to be non-login using simple commands that can be mapped... (0 Replies)
Discussion started by: LordJezo
0 Replies
9. UNIX for Dummies Questions & Answers
I like to use mailx -s to send an entire xxxxx.log to my outlook e-mail account.
Any help will be appreciated.
Thanks. (6 Replies)
Discussion started by: simt
6 Replies
LOGIN(1) BSD General Commands Manual LOGIN(1)
NAME
login -- log into the computer
SYNOPSIS
login [-fp] [-h hostname] [user]
DESCRIPTION
The login utility logs users (and pseudo-users) into the computer system.
If no user is specified, or if a user is specified and authentication of the user fails, login prompts for a user name. Authentication of
users is done via passwords.
The options are as follows:
-f The -f option is used when a user name is specified to indicate that proper authentication has already been done and that no password
need be requested. This option may only be used by the super-user or when an already logged in user is logging in as themselves.
-h The -h option specifies the host from which the connection was received. It is used by various daemons such as telnetd(8). This
option may only be used by the super-user.
-p By default, login discards any previous environment. The -p option disables this behavior.
If the file /etc/nologin exists, login dislays its contents to the user and exits. This is used by shutdown(8) to prevent users from logging
in when the system is about to go down.
Immediately after logging a user in, login displays the system copyright notice, the date and time the user last logged in, the message of
the day as well as other information. If the file ``.hushlogin'' exists in the user's home directory, all of these messages are suppressed.
This is to simplify logins for non-human users, such as uucp(1). Login then records an entry in the wtmp(5) and utmp(5) files and executes
the user's command interpreter.
Login enters information into the environment (see environ(7)) specifying the user's home directory (HOME), command interpreter (SHELL),
search path (PATH), terminal type (TERM) and user name (both LOGNAME and USER).
The standard shells, csh(1) and sh(1), do not fork before executing the login utility.
FILES
/etc/motd message-of-the-day
/etc/nologin disallows logins
/var/run/utmp current logins
/var/log/lastlog last login account records
/var/log/wtmp login account records
/var/mail/user system mailboxes
.hushlogin makes login quieter
SEE ALSO
chpass(1), passwd(1), rlogin(1), getpass(3), utmp(5), environ(7),
HISTORY
A login appeared in Version 6 AT&T UNIX.
4th Berkeley Distribution May 5, 1994 4th Berkeley Distribution