id.1 (9b50d9027575220cb6dd09b3e62f03f511e908b8) id.1 (93e0d62d1c2a83232e87912c20f74ab92b0f22b2)
1.\" Copyright (c) 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" This code is derived from software contributed to Berkeley by
5.\" the Institute of Electrical and Electronics Engineers, Inc.
6.\"
7.\" Redistribution and use in source and binary forms, with or without
8.\" modification, are permitted provided that the following conditions

--- 19 unchanged lines hidden (view full) ---

28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33.\" SUCH DAMAGE.
34.\"
35.\" @(#)id.1 8.1 (Berkeley) 6/6/93
1.\" Copyright (c) 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" This code is derived from software contributed to Berkeley by
5.\" the Institute of Electrical and Electronics Engineers, Inc.
6.\"
7.\" Redistribution and use in source and binary forms, with or without
8.\" modification, are permitted provided that the following conditions

--- 19 unchanged lines hidden (view full) ---

28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33.\" SUCH DAMAGE.
34.\"
35.\" @(#)id.1 8.1 (Berkeley) 6/6/93
36.\" $Id$
36.\"
37.Dd "June 6, 1993"
38.Dt ID 1
39.Os BSD 4.4
40.Sh NAME
41.Nm id
42.Nd return user identity
43.Sh SYNOPSIS
37.\"
38.Dd "June 6, 1993"
39.Dt ID 1
40.Os BSD 4.4
41.Sh NAME
42.Nm id
43.Nd return user identity
44.Sh SYNOPSIS
44.Nm id
45.Nm
45.Op Ar user
46.Op Ar user
46.Nm id
47.Nm
47.Fl G Op Fl n
48.Op Ar user
48.Fl G Op Fl n
49.Op Ar user
49.Nm id
50.Nm
50.Fl g Op Fl nr
51.Op Ar user
51.Fl g Op Fl nr
52.Op Ar user
52.Nm id
53.Nm
53.Fl p
54.Fl p
54.Nm id
55.Nm
55.Fl u Op Fl nr
56.Op Ar user
57.Sh DESCRIPTION
58The
56.Fl u Op Fl nr
57.Op Ar user
58.Sh DESCRIPTION
59The
59.Nm id
60.Nm
60utility displays the user and group names and numeric IDs, of the
61calling process, to the standard output.
62If the real and effective IDs are different, both are displayed,
63otherwise only the real ID is displayed.
64.Pp
65If a
66.Ar user
67(login name or user ID)

--- 18 unchanged lines hidden (view full) ---

86displayed as usual.
87.It Fl p
88Make the output human-readable.
89If the user name returned by
90.Xr getlogin 2
91is different from the login name referenced by the user ID, the name
92returned by
93.Xr getlogin 2
61utility displays the user and group names and numeric IDs, of the
62calling process, to the standard output.
63If the real and effective IDs are different, both are displayed,
64otherwise only the real ID is displayed.
65.Pp
66If a
67.Ar user
68(login name or user ID)

--- 18 unchanged lines hidden (view full) ---

87displayed as usual.
88.It Fl p
89Make the output human-readable.
90If the user name returned by
91.Xr getlogin 2
92is different from the login name referenced by the user ID, the name
93returned by
94.Xr getlogin 2
94is displayed, preceded by the keyword ``login''.
95The user ID as a name is displayed, preceded by the keyword ``uid''.
95is displayed, preceded by the keyword
96.Dq login .
97The user ID as a name is displayed, preceded by the keyword
98.Dq uid .
96If the effective user ID is different from the real user ID, the real user
99If the effective user ID is different from the real user ID, the real user
97ID is displayed as a name, preceded by the keyword ``euid''.
100ID is displayed as a name, preceded by the keyword
101.Dq euid .
98If the effective group ID is different from the real group ID, the real group
102If the effective group ID is different from the real group ID, the real group
99ID is displayed as a name, preceded by the keyword ``rgid''.
103ID is displayed as a name, preceded by the keyword
104.Dq rgid .
100The list of groups to which the user belongs is then displayed as names,
105The list of groups to which the user belongs is then displayed as names,
101preceded by the keyword ``groups''.
106preceded by the keyword
107.Dq groups .
102Each display is on a separate line.
103.It Fl r
104Display the real ID for the
105.Fl g
106and
107.Fl u
108options instead of the effective ID.
109.It Fl u
110Display the effective user ID as a number.
111.El
112.Pp
113The
108Each display is on a separate line.
109.It Fl r
110Display the real ID for the
111.Fl g
112and
113.Fl u
114options instead of the effective ID.
115.It Fl u
116Display the effective user ID as a number.
117.El
118.Pp
119The
114.Nm id
120.Nm
115utility exits 0 on success, and >0 if an error occurs.
116.Sh SEE ALSO
117.Xr who 1
118.Sh STANDARDS
119The
121utility exits 0 on success, and >0 if an error occurs.
122.Sh SEE ALSO
123.Xr who 1
124.Sh STANDARDS
125The
120.Nm id
126.Nm
121function is expected to conform to
122.St -p1003.2 .
123.Sh HISTORY
124The
125historic
126.Xr groups 1
127command is equivalent to
128.Dq Nm id Fl Gn Op Ar user .
129.Pp
130The
131historic
132.Xr whoami 1
133command is equivalent to
134.Dq Nm id Fl un .
135.Pp
136The
137.Nm
127function is expected to conform to
128.St -p1003.2 .
129.Sh HISTORY
130The
131historic
132.Xr groups 1
133command is equivalent to
134.Dq Nm id Fl Gn Op Ar user .
135.Pp
136The
137historic
138.Xr whoami 1
139command is equivalent to
140.Dq Nm id Fl un .
141.Pp
142The
143.Nm
138command appears in
144command appeared in
139.Bx 4.4 .
145.Bx 4.4 .