1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
|
.\" Copyright, the authors of the Linux man-pages project
.\"
.\" SPDX-License-Identifier: GPL-2.0-or-later
.\"
.TH securetty 5 2025-05-17 "Linux man-pages (unreleased)"
.SH NAME
securetty \- list of terminals on which root is allowed to login
.SH DESCRIPTION
The file
.I /etc/securetty
contains the names of terminals
(one per line, without leading
.IR /dev/ )
which are considered secure for the transmission of certain authentication
tokens.
.P
It is used by (some versions of)
.BR login (1)
to restrict the terminals
on which root is allowed to login.
See
.BR login.defs (5)
if you use the shadow suite.
.P
On PAM enabled systems, it is used for the same purpose by
.BR pam_securetty (8)
to restrict the terminals on which empty passwords are accepted.
.SH FILES
.I /etc/securetty
.SH SEE ALSO
.BR login (1),
.BR login.defs (5),
.BR pam_securetty (8)
|