1SECURETTY(5)               Linux Programmer's Manual              SECURETTY(5)
2
3
4

NAME

6       securetty - file which lists terminals from which root can log in
7

DESCRIPTION

9       The  file /etc/securetty contains the names of terminals (one per line,
10       without leading /dev/) which are considered secure for the transmission
11       of certain authentication tokens.
12
13       It  is used by (some versions of) login(1) to restrict the terminals on
14       which root is allowed to login.   See  login.defs(5)  if  you  use  the
15       shadow suite.
16
17       On   PAM   enabled  systems,  it  is  used  for  the  same  purpose  by
18       pam_securetty(8) to restrict the terminals on which empty passwords are
19       accepted.
20

FILES

22       /etc/securetty
23

SEE ALSO

25       login(1), login.defs(5), pam_securetty(8)
26

COLOPHON

28       This  page  is  part of release 4.15 of the Linux man-pages project.  A
29       description of the project, information about reporting bugs,  and  the
30       latest     version     of     this    page,    can    be    found    at
31       https://www.kernel.org/doc/man-pages/.
32
33
34
35Linux                             2015-03-29                      SECURETTY(5)
Impressum