<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restricted login in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-login/m-p/2439223#M6665</link>
    <description>Edit /etc/securetty.&lt;BR /&gt;"Only root can successfully login on the ttys listed in this file" - qoutes from man login.&lt;BR /&gt;So, have /etc/securetty as&lt;BR /&gt;console&lt;BR /&gt;</description>
    <pubDate>Wed, 23 Aug 2000 17:11:26 GMT</pubDate>
    <dc:creator>Antoanetta Naghiu</dc:creator>
    <dc:date>2000-08-23T17:11:26Z</dc:date>
    <item>
      <title>Restricted login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-login/m-p/2439222#M6664</link>
      <description>How can I restrict the login for users to one device (eg: console) ?&lt;BR /&gt;&lt;BR /&gt;MDF</description>
      <pubDate>Wed, 23 Aug 2000 17:08:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-login/m-p/2439222#M6664</guid>
      <dc:creator>Marcelo De Florio</dc:creator>
      <dc:date>2000-08-23T17:08:26Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-login/m-p/2439223#M6665</link>
      <description>Edit /etc/securetty.&lt;BR /&gt;"Only root can successfully login on the ttys listed in this file" - qoutes from man login.&lt;BR /&gt;So, have /etc/securetty as&lt;BR /&gt;console&lt;BR /&gt;</description>
      <pubDate>Wed, 23 Aug 2000 17:11:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-login/m-p/2439223#M6665</guid>
      <dc:creator>Antoanetta Naghiu</dc:creator>
      <dc:date>2000-08-23T17:11:26Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-login/m-p/2439224#M6666</link>
      <description>Hi:&lt;BR /&gt;&lt;BR /&gt;Assuming that the user(s) in question always looged on from a static name device (most notably 'console') then you could always exit in their .profile.&lt;BR /&gt;&lt;BR /&gt;...JRF...</description>
      <pubDate>Wed, 23 Aug 2000 17:23:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-login/m-p/2439224#M6666</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2000-08-23T17:23:57Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-login/m-p/2439225#M6667</link>
      <description>Since there are many ways to login (telnet, terminal, console, modem, rlogin), there may be several answers. The easiest for 'normal' UNIX logins (terminals, modems, telnet) is to edit /etc/profile.  (.profile can be edited or removed by users)  In /etc/profile, you would write a test to look for the user's login name in a file and compare that user with the allowed terminal. You can read the user's login in /etc/profile with the whoami command and the terminal name with the tty command.</description>
      <pubDate>Wed, 23 Aug 2000 18:12:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-login/m-p/2439225#M6667</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2000-08-23T18:12:00Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-login/m-p/2439226#M6668</link>
      <description>.profile is under user ownership. Can be modified by the owner anytime.</description>
      <pubDate>Wed, 23 Aug 2000 19:01:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-login/m-p/2439226#M6668</guid>
      <dc:creator>Antoanetta Naghiu</dc:creator>
      <dc:date>2000-08-23T19:01:32Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-login/m-p/2439227#M6669</link>
      <description>And, sorry for the /etc/securetty, I did not read care fully the question.&lt;BR /&gt;If your concern is about a group of users, and the environment permited, you can play with different run levels. (define diferent entry in inittab file).</description>
      <pubDate>Wed, 23 Aug 2000 19:08:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-login/m-p/2439227#M6669</guid>
      <dc:creator>Antoanetta Naghiu</dc:creator>
      <dc:date>2000-08-23T19:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-login/m-p/2439228#M6670</link>
      <description>The user does not have to own his .profile. Even if it is owned by root and it does not have write permissions for the user, it will work as long as it has read and execute permissions either for a group that the user belongs to or for the world.</description>
      <pubDate>Wed, 23 Aug 2000 19:16:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-login/m-p/2439228#M6670</guid>
      <dc:creator>Duane Gorder</dc:creator>
      <dc:date>2000-08-23T19:16:04Z</dc:date>
    </item>
  </channel>
</rss>

