securetty(5) — Linux manual page


SECURETTY(5)            Linux Programmer's Manual           SECURETTY(5)

NAME         top

       securetty - list of terminals on which root is allowed to login

DESCRIPTION         top

       The file /etc/securetty contains the names of terminals (one per
       line, without leading /dev/) which are considered secure for the
       transmission of certain authentication tokens.

       It is used by (some versions of) login(1) to restrict the
       terminals on which root is allowed to login.  See login.defs(5)
       if you use the shadow suite.

       On PAM enabled systems, it is used for the same purpose by
       pam_securetty(8) to restrict the terminals on which empty
       passwords are accepted.

FILES         top


SEE ALSO         top

       login(1), login.defs(5), pam_securetty(8)

COLOPHON         top

       This page is part of release 5.13 of the Linux man-pages project.
       A description of the project, information about reporting bugs,
       and the latest version of this page, can be found at

Linux                          2020-06-09                   SECURETTY(5)

Pages that refer to this page: login(1@@shadow-utils)pam_securetty(8)