PAM_SECURETTY(8)              Linux-PAM Manual              PAM_SECURETTY(8)

NAME         top

       pam_securetty - Limit root login to special devices

SYNOPSIS         top [debug]

DESCRIPTION         top

       pam_securetty is a PAM module that allows root logins only if the
       user is logging in on a "secure" tty, as defined by the listing in
       /etc/securetty. pam_securetty also checks to make sure that
       /etc/securetty is a plain file and not world writable. It will also
       allow root logins on the tty specified with console= switch on the
       kernel command line and on ttys from the

       This module has no effect on non-root users and requires that the
       application fills in the PAM_TTY item correctly.

       For canonical usage, should be listed as a required authentication
       method before any sufficient authentication methods.

OPTIONS         top

           Print debug information.

           Do not automatically allow root logins on the kernel console
           device, as specified on the kernel command line or by the sys
           file, if it is not also specified in the /etc/securetty file.


       Only the auth module type is provided.

RETURN VALUES         top

           The user is allowed to continue authentication. Either the user
           is not root, or the root user is trying to log in on an
           acceptable device.

           Authentication is rejected. Either root is attempting to log in
           via an unacceptable device, or the /etc/securetty file is world
           writable or not a normal file.

           An application error occurred. pam_securetty was not able to get
           information it required from the application that called it.

           An error occurred while the module was determining the user's
           name or tty, or the module could not open /etc/securetty.

           The module could not find the user name in the /etc/passwd file
           to verify whether the user had a UID of 0. Therefore, the results
           of running this module are ignored.

EXAMPLES         top

           auth  required
           auth  required

SEE ALSO         top

       securetty(5), pam.conf(5), pam.d(5), pam(8)

AUTHOR         top

       pam_securetty was written by Elliot Lee <>.

COLOPHON         top

       This page is part of the linux-pam (Pluggable Authentication Modules
       for Linux) project.  Information about the project can be found at 
       ⟨⟩.  If you have a bug report for
       this manual page, see ⟨⟩.
       This page was obtained from the tarball Linux-PAM-1.3.0.tar.gz
       fetched from ⟨⟩ on 2017-03-13.  If
       you discover any rendering problems in this HTML version of the page,
       or you believe there is a better or more up-to-date source for the
       page, or you have corrections or improvements to the information in
       this COLOPHON (which is not part of the original manual page), send a
       mail to

Linux-PAM Manual                 04/01/2016                 PAM_SECURETTY(8)