dwww Home | Manual pages | Find package

LOGIN(1)                        Comandi utente                        LOGIN(1)

NOME
       login - apre una sessione sul sistema

SINOSSI
       login [-p] [-h host] [nome] [ENV=VAR...]

       login [-p] [-h host] -f nome

       login [-p] -r host

DESCRIZIONE
       The login program is used to establish a new session with the system.
       It is normally invoked automatically by responding to the login: prompt
       on the user's terminal.  login may be special to the shell and may not
       be invoked as a sub-process. When called from a shell, login should be
       executed as exec login which will cause the user to exit from the
       current shell (and thus will prevent the new logged in user to return
       to the session of the caller). Attempting to execute login from any
       shell but the login shell will produce an error message.

       The user is then prompted for a password, where appropriate. Echoing is
       disabled to prevent revealing the password. Only a small number of
       password failures are permitted before login exits and the
       communications link is severed.

       If password aging has been enabled for your account, you may be
       prompted for a new password before proceeding. You will be forced to
       provide your old password and the new password before continuing.
       Please refer to passwd(1) for more information.

       Your user and group ID will be set according to their values in the
       /etc/passwd file. The value for $HOME, $SHELL, $PATH, $LOGNAME, and
       $MAIL are set according to the appropriate fields in the password
       entry. Ulimit, umask and nice values may also be set according to
       entries in the GECOS field.

       On some installations, the environmental variable $TERM will be
       initialized to the terminal type on your tty line, as specified in
       /etc/ttytype.

       Può anche essere eseguito uno script di inizializzazione per il proprio
       interprete dei comandi. Fare riferimento alla relativa sezione di
       manuale per maggiori informazioni su questa funzione.

       Un sottosistema di login è indicato dalla presenza del carattere «*»
       all'inizio della shell di login. La directory home impostata sarà
       utilizzata come root di un nuovo file system al quale l'utente accede.

       The login program is NOT responsible for removing users from the utmp
       file. It is the responsibility of getty(8) and init(8) to clean up
       apparent ownership of a terminal session. If you use login from the
       shell prompt without exec, the user you use will continue to appear to
       be logged in even after you log out of the "subsession".

OPZIONI
       -f
           Non effettua l'autenticazione, l'utente è già autenticato

           Note: In that case, username is mandatory.

       -h
           Nome dell'host remoto per questo login.

       -p
           Non modifica l'ambiente.

       -r
           Attiva il protocollo autologin di rlogin.

       The -r, -h and -f options are only used when login is invoked by root.

AVVISI/CAVEAT
       This version of login has many compilation options, only some of which
       may be in use at any particular site.

       La posizione dei file è soggetta a differenze in base alla
       configurazione del sistema.

       The login program is NOT responsible for removing users from the utmp
       file. It is the responsibility of getty(8) and init(8) to clean up
       apparent ownership of a terminal session. If you use login from the
       shell prompt without exec, the user you use will continue to appear to
       be logged in even after you log out of the "subsession".

       As with any program, login's appearance can be faked. If non-trusted
       users have physical access to a machine, an attacker could use this to
       obtain the password of the next person coming to sit in front of the
       machine. Under Linux, the SAK mechanism can be used by users to
       initiate a trusted path and prevent this kind of attack.

CONFIGURAZIONE
       The following configuration variables in /etc/login.defs change the
       behavior of this tool:

FILE
       /var/run/utmp
           Elenco delle sessioni attive.

       /var/log/wtmp
           Elenco delle precedenti sessioni di login.

       /etc/passwd
           Informazioni sugli account utente.

       /etc/shadow
           Informazioni sicure sugli account utente.

       /etc/motd
           File di sistema con il messaggio del giorno.

       /etc/nologin
           Impedisce l'accesso al sistema per utenti diversi da root.

       /etc/ttytype
           Elenco di tipi di terminale.

       $HOME/.hushlogin
           Impedisce che vengano mostrati i messaggi di sistema.

       /etc/login.defs
           Configurazione del pacchetto password shadow

VEDERE ANCHE
       mail(1), passwd(1), sh(1), su(1), login.defs(5), nologin(5), passwd(5),
       securetty(5), getty(8).

shadow-utils 4.13                 23/03/2023                          LOGIN(1)

Generated by dwww version 1.15 on Mon Jul 1 05:30:59 CEST 2024.