diff options
Diffstat (limited to 'usr.bin/login')
-rw-r--r-- | usr.bin/login/login.1 | 2 | ||||
-rw-r--r-- | usr.bin/login/login.access.5 | 6 |
2 files changed, 4 insertions, 4 deletions
diff --git a/usr.bin/login/login.1 b/usr.bin/login/login.1 index 312cad8..f6367f7 100644 --- a/usr.bin/login/login.1 +++ b/usr.bin/login/login.1 @@ -107,7 +107,7 @@ file. .Pp If the file .Pa /etc/skeykeys -exists, +exists, .Nm will offer S/key password validation if the user has an entry in the file. .Pa /etc/skey.access diff --git a/usr.bin/login/login.access.5 b/usr.bin/login/login.access.5 index 18685e8..d5af0ee 100644 --- a/usr.bin/login/login.access.5 +++ b/usr.bin/login/login.access.5 @@ -11,15 +11,15 @@ .Sh DESCRIPTION The .Nm -file specifies (user, host) combinations and/or (user, tty) +file specifies (user, host) combinations and/or (user, tty) combinations for which a login will be either accepted or refused. .Pp -When someone logs in, the +When someone logs in, the .Nm is scanned for the first entry that matches the (user, host) combination, or, in case of non-networked logins, the first entry that matches the (user, tty) combination. The -permissions field of that table entry determines whether the login will +permissions field of that table entry determines whether the login will be accepted or refused. .Pp Each line of the login access control table has three fields separated by a |