1SECURETTY(5) Linux Programmer's Manual SECURETTY(5)
2
3
4
6 securetty - list of terminals on which root is allowed to login
7
9 The file /etc/securetty contains the names of terminals (one per line,
10 without leading /dev/) which are considered secure for the transmission
11 of certain authentication tokens.
12
13 It is used by (some versions of) login(1) to restrict the terminals on
14 which root is allowed to login. See login.defs(5) if you use the
15 shadow suite.
16
17 On PAM enabled systems, it is used for the same purpose by pam_se‐
18 curetty(8) to restrict the terminals on which empty passwords are ac‐
19 cepted.
20
22 /etc/securetty
23
25 login(1), login.defs(5), pam_securetty(8)
26
28 This page is part of release 5.10 of the Linux man-pages project. A
29 description of the project, information about reporting bugs, and the
30 latest version of this page, can be found at
31 https://www.kernel.org/doc/man-pages/.
32
33
34
35Linux 2020-06-09 SECURETTY(5)