SECURETTY(5)              Linux Programmer's Manual             SECURETTY(5)

NAME         top

       securetty - file which lists terminals from which root can log in

DESCRIPTION         top

       The file /etc/securetty contains the names of terminals (one per
       line, without leading /dev/) which are considered secure for the
       transmission of certain authentication tokens.

       It is used by (some versions of) login(1) to restrict the terminals
       on which root is allowed to login.  See login.defs(5) if you use the
       shadow suite.

       On PAM enabled systems, it is used for the same purpose by
       pam_securetty(8) to restrict the terminals on which empty passwords
       are accepted.

FILES         top


SEE ALSO         top

       login(1), login.defs(5), pam_securetty(8)

COLOPHON         top

       This page is part of release 4.10 of the Linux man-pages project.  A
       description of the project, information about reporting bugs, and the
       latest version of this page, can be found at

Linux                            2015-03-29                     SECURETTY(5)

Pages that refer to this page: login(1@@shadow-utils)pam_securetty(8)