Lines Matching +full:host +full:- +full:only

41 third-party packages.
46 non-root user without a valid login class in
57 to set user-defined environment settings which override those specified
59 Only a subset of login capabilities may be overridden, typically those
63 colon-separated fields.
97 for a more in-depth description of the format of a capability database.
108 .Bl -tag -width "program"
125 With a numeric type, only one numeric value is allowed.
136 .Bl -tag -offset indent -compact -width xxxx
138 explicitly selects 512-byte blocks
154 .Bl -tag -offset indent -compact -width xxxx
178 and -1
191 .Bl -column pseudoterminals indent indent
204 .It "pseudoterminals number Maximum number of pseudo-terminals."
206 .It "umtxp number Maximum number of process-shared pthread locks."
216 -max or -cur to the capability name.
218 .Bl -column ignorenologin indent xbinxxusrxbin
234 .It "ftp-chroot bool false Limit FTP access with"
253 .Pq -20 to 20 included ,
254 extended below with the 32 real-time class priorities
256 so -52 maps to priority 0 in the real-time class, -51 to 1, and so on until -21
270 .It "setenv list A comma-separated list of environment variables and"
288 .Bl -column passwd_prompt indent indent
292 .It "host.allow list List of remote host wildcards from which users in"
294 .It "host.deny list List of remote host wildcards from which users"
298 .It "login-backoff number 3 The number of login attempts"
302 .Em login-backoff
304 .It "login-retries number 10 The number of login attempts"
312 .No non- Ns Fx
347 .Em host.allow
349 .Em host.deny
359 If both lists are empty or not specified, then logins from any remote host
361 If host.allow contains one or more hosts, then only remote systems matching
363 If host.deny contains one or more hosts, then a login from any matching hosts
370 entries consist of a comma-separated list of time periods during which the users
374 For example, MoThSa0200-1300 translates to Monday, Thursday and Saturday between
380 is specified, then logins are only allowed during the periods given.
390 enforces only that the actual login falls within periods allowed by these entries.
392 monitor transitions from an allowed period to a non-allowed one.
398 entries contain a comma-separated list of tty devices (without the /dev/ prefix)
407 If only
409 is specified, then the user is restricted only to ttys in the given
411 If only
415 If both lists are given and are non-empty, the user is restricted to those
430 may be supported by third-party software.
432 .Bl -column host.accounted indent indent
438 .It "auth-" Ns Ar type Ta "list Allowed authentication styles for the"
441 .It "autodelete time Time after expiry when account is auto-deleted."
442 .It "bootfull bool false Enable 'boot only if ttygroup is full' strategy"
448 .It "host.accounted list List of remote host wildcards from which"
450 .It "host.exempt list List of remote host wildcards from which"
468 .It "warntime time Advance notice for pending out-of-time."
483 .Em host.accounted
485 .Em host.exempt