id.1 (9b50d9027575220cb6dd09b3e62f03f511e908b8) | id.1 (93e0d62d1c2a83232e87912c20f74ab92b0f22b2) |
---|---|
1.\" Copyright (c) 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" This code is derived from software contributed to Berkeley by 5.\" the Institute of Electrical and Electronics Engineers, Inc. 6.\" 7.\" Redistribution and use in source and binary forms, with or without 8.\" modification, are permitted provided that the following conditions --- 19 unchanged lines hidden (view full) --- 28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33.\" SUCH DAMAGE. 34.\" 35.\" @(#)id.1 8.1 (Berkeley) 6/6/93 | 1.\" Copyright (c) 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" This code is derived from software contributed to Berkeley by 5.\" the Institute of Electrical and Electronics Engineers, Inc. 6.\" 7.\" Redistribution and use in source and binary forms, with or without 8.\" modification, are permitted provided that the following conditions --- 19 unchanged lines hidden (view full) --- 28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33.\" SUCH DAMAGE. 34.\" 35.\" @(#)id.1 8.1 (Berkeley) 6/6/93 |
36.\" $Id$ |
|
36.\" 37.Dd "June 6, 1993" 38.Dt ID 1 39.Os BSD 4.4 40.Sh NAME 41.Nm id 42.Nd return user identity 43.Sh SYNOPSIS | 37.\" 38.Dd "June 6, 1993" 39.Dt ID 1 40.Os BSD 4.4 41.Sh NAME 42.Nm id 43.Nd return user identity 44.Sh SYNOPSIS |
44.Nm id | 45.Nm |
45.Op Ar user | 46.Op Ar user |
46.Nm id | 47.Nm |
47.Fl G Op Fl n 48.Op Ar user | 48.Fl G Op Fl n 49.Op Ar user |
49.Nm id | 50.Nm |
50.Fl g Op Fl nr 51.Op Ar user | 51.Fl g Op Fl nr 52.Op Ar user |
52.Nm id | 53.Nm |
53.Fl p | 54.Fl p |
54.Nm id | 55.Nm |
55.Fl u Op Fl nr 56.Op Ar user 57.Sh DESCRIPTION 58The | 56.Fl u Op Fl nr 57.Op Ar user 58.Sh DESCRIPTION 59The |
59.Nm id | 60.Nm |
60utility displays the user and group names and numeric IDs, of the 61calling process, to the standard output. 62If the real and effective IDs are different, both are displayed, 63otherwise only the real ID is displayed. 64.Pp 65If a 66.Ar user 67(login name or user ID) --- 18 unchanged lines hidden (view full) --- 86displayed as usual. 87.It Fl p 88Make the output human-readable. 89If the user name returned by 90.Xr getlogin 2 91is different from the login name referenced by the user ID, the name 92returned by 93.Xr getlogin 2 | 61utility displays the user and group names and numeric IDs, of the 62calling process, to the standard output. 63If the real and effective IDs are different, both are displayed, 64otherwise only the real ID is displayed. 65.Pp 66If a 67.Ar user 68(login name or user ID) --- 18 unchanged lines hidden (view full) --- 87displayed as usual. 88.It Fl p 89Make the output human-readable. 90If the user name returned by 91.Xr getlogin 2 92is different from the login name referenced by the user ID, the name 93returned by 94.Xr getlogin 2 |
94is displayed, preceded by the keyword ``login''. 95The user ID as a name is displayed, preceded by the keyword ``uid''. | 95is displayed, preceded by the keyword 96.Dq login . 97The user ID as a name is displayed, preceded by the keyword 98.Dq uid . |
96If the effective user ID is different from the real user ID, the real user | 99If the effective user ID is different from the real user ID, the real user |
97ID is displayed as a name, preceded by the keyword ``euid''. | 100ID is displayed as a name, preceded by the keyword 101.Dq euid . |
98If the effective group ID is different from the real group ID, the real group | 102If the effective group ID is different from the real group ID, the real group |
99ID is displayed as a name, preceded by the keyword ``rgid''. | 103ID is displayed as a name, preceded by the keyword 104.Dq rgid . |
100The list of groups to which the user belongs is then displayed as names, | 105The list of groups to which the user belongs is then displayed as names, |
101preceded by the keyword ``groups''. | 106preceded by the keyword 107.Dq groups . |
102Each display is on a separate line. 103.It Fl r 104Display the real ID for the 105.Fl g 106and 107.Fl u 108options instead of the effective ID. 109.It Fl u 110Display the effective user ID as a number. 111.El 112.Pp 113The | 108Each display is on a separate line. 109.It Fl r 110Display the real ID for the 111.Fl g 112and 113.Fl u 114options instead of the effective ID. 115.It Fl u 116Display the effective user ID as a number. 117.El 118.Pp 119The |
114.Nm id | 120.Nm |
115utility exits 0 on success, and >0 if an error occurs. 116.Sh SEE ALSO 117.Xr who 1 118.Sh STANDARDS 119The | 121utility exits 0 on success, and >0 if an error occurs. 122.Sh SEE ALSO 123.Xr who 1 124.Sh STANDARDS 125The |
120.Nm id | 126.Nm |
121function is expected to conform to 122.St -p1003.2 . 123.Sh HISTORY 124The 125historic 126.Xr groups 1 127command is equivalent to 128.Dq Nm id Fl Gn Op Ar user . 129.Pp 130The 131historic 132.Xr whoami 1 133command is equivalent to 134.Dq Nm id Fl un . 135.Pp 136The 137.Nm | 127function is expected to conform to 128.St -p1003.2 . 129.Sh HISTORY 130The 131historic 132.Xr groups 1 133command is equivalent to 134.Dq Nm id Fl Gn Op Ar user . 135.Pp 136The 137historic 138.Xr whoami 1 139command is equivalent to 140.Dq Nm id Fl un . 141.Pp 142The 143.Nm |
138command appears in | 144command appeared in |
139.Bx 4.4 . | 145.Bx 4.4 . |