1SECURETTY(5)               Linux Programmer's Manual              SECURETTY(5)
2
3
4

NAME

6       securetty - list of terminals on which root is allowed to login
7

DESCRIPTION

9       The  file /etc/securetty contains the names of terminals (one per line,
10       without leading /dev/) which are considered secure for the transmission
11       of certain authentication tokens.
12
13       It  is used by (some versions of) login(1) to restrict the terminals on
14       which root is allowed to login.   See  login.defs(5)  if  you  use  the
15       shadow suite.
16
17       On  PAM  enabled  systems,  it  is used for the same purpose by pam_se‐
18       curetty(8) to restrict the terminals on which empty passwords  are  ac‐
19       cepted.
20

FILES

22       /etc/securetty
23

SEE ALSO

25       login(1), login.defs(5), pam_securetty(8)
26

COLOPHON

28       This  page  is  part of release 5.10 of the Linux man-pages project.  A
29       description of the project, information about reporting bugs,  and  the
30       latest     version     of     this    page,    can    be    found    at
31       https://www.kernel.org/doc/man-pages/.
32
33
34
35Linux                             2020-06-09                      SECURETTY(5)
Impressum