2 LOGIN.ACCESS(5) UNIX Programmer's Manual LOGIN.ACCESS(5)
5 l
\blo
\bog
\bgi
\bin
\bn.
\b.a
\bac
\bcc
\bce
\bes
\bss
\bs - login access control table
7 D
\bDE
\bES
\bSC
\bCR
\bRI
\bIP
\bPT
\bTI
\bIO
\bON
\bN
8 The l
\blo
\bog
\bgi
\bin
\bn.
\b.a
\bac
\bcc
\bce
\bes
\bss
\bs file specifies on which ttys or from which hosts certain
9 users are allowed to login.
11 At login, the _
\b/_
\be_
\bt_
\bc_
\b/_
\bl_
\bo_
\bg_
\bi_
\bn_
\b._
\ba_
\bc_
\bc_
\be_
\bs_
\bs file is checked for the first entry that
12 matches a specific user/host or user/tty combination. That entry can ei-
13 ther allow or deny login access to that user.
15 Each entry have three fields separated by colon:
17 +
\b+
\bo
\bo The first field indicates the permission given if the entry matches.
18 It can be either ``+'' (allow access) or ``-'' (deny access) .
20 +
\b+
\bo
\bo The second field is a comma separated list of users or groups for
21 which the current entry applies. NIS netgroups can used (if config-
22 ured) if preceeded by @. The magic string ALL matches all users. A
23 group will match if the user is a member of that group, or it is the
26 +
\b+
\bo
\bo The third field is a list of ttys, or network names. A network name
27 can be either a hostname, a domain (indicated by a starting period),
28 or a netgroup. As with the user list, ALL matches anything. LOCAL
29 matches a string not containing a period.
31 If the string EXCEPT is found in either the user or from list, the rest
32 of the list are exceptions to the list before EXCEPT.
35 If there's a user and a group with the same name, there is no way to make
36 the group match if the user also matches.
38 S
\bSE
\bEE
\bE A
\bAL
\bLS
\bSO
\bO
41 A
\bAU
\bUT
\bTH
\bHO
\bOR
\bRS
\bS
42 The l
\blo
\bog
\bgi
\bin
\bn_
\b_a
\bac
\bcc
\bce
\bes
\bss
\bs() function was written by Wietse Venema. This manual
43 page was written for Heimdal.
45 HEIMDAL March 21, 2003 1