/freebsd/crypto/krb5/doc/admin/ |
H A D | lockout.rst | 3 Account lockout 8 time. Account lockout can make it more difficult to attack a 13 Configuring account lockout 16 Account lockout only works for principals with the 26 Account lockout parameters are configured via :ref:`policy objects 31 The policy parameters related to account lockout are: 48 Testing account lockout 51 To test that account lockout is working, try authenticating as the 66 Account lockout principal state 69 A principal entry keeps three pieces of state related to account [all …]
|
H A D | host_config.rst | 53 whether a Kerberos principal is allowed to access a local account. 55 By default, a Kerberos principal is allowed access to an account if 56 its realm matches the default realm and its name matches the account 60 is granted access to the ``alice`` account if ``ATHENA.MIT.EDU`` is 65 of each account listing the principal names which should have login 66 access to that account. If it is not desirable to use ``.k5login`` 67 files located in account home directories, the **k5login_directory** 69 containing one file per account uname. 95 # principal name as the account name.
|
/freebsd/crypto/krb5/doc/html/_sources/admin/ |
H A D | lockout.rst.txt | 3 Account lockout 8 time. Account lockout can make it more difficult to attack a 13 Configuring account lockout 16 Account lockout only works for principals with the 26 Account lockout parameters are configured via :ref:`policy objects 31 The policy parameters related to account lockout are: 48 Testing account lockout 51 To test that account lockout is working, try authenticating as the 66 Account lockout principal state 69 A principal entry keeps three pieces of state related to account [all …]
|
H A D | host_config.rst.txt | 53 whether a Kerberos principal is allowed to access a local account. 55 By default, a Kerberos principal is allowed access to an account if 56 its realm matches the default realm and its name matches the account 60 is granted access to the ``alice`` account if ``ATHENA.MIT.EDU`` is 65 of each account listing the principal names which should have login 66 access to that account. If it is not desirable to use ``.k5login`` 67 files located in account home directories, the **k5login_directory** 69 containing one file per account uname. 95 # principal name as the account name.
|
/freebsd/crypto/krb5/doc/html/admin/ |
H A D | lockout.html | 9 <title>Account lockout — MIT Kerberos Documentation</title> 55 <section id="account-lockout"> 56 <span id="lockout"></span><h1>Account lockout<a class="headerlink" href="#account-lockout" title="P… 59 time. Account lockout can make it more difficult to attack a 62 <section id="configuring-account-lockout"> 63 <h2>Configuring account lockout<a class="headerlink" href="#configuring-account-lockout" title="Per… 64 <p>Account lockout only works for principals with the 74 <p>Account lockout parameters are configured via <a class="reference internal" href="database.html#… 77 <p>The policy parameters related to account lockout are:</p> 94 <section id="testing-account-lockout"> [all …]
|
/freebsd/usr.sbin/pw/ |
H A D | pw.8 | 318 Specify the user/account name. 327 Specify the user/account numeric id. 332 changes the numeric id of the named user/account. 335 as the account name will imply the uid, or vice versa. 339 or overriding the default uid when creating a new account with 348 Either the account or userid can also be provided immediately after the 376 This option sets the account's home directory. 383 with the account name as a subdirectory. 385 Set the account's expiration date. 400 Set the account' [all...] |
H A D | pw.conf.5 | 100 days after which account expires 112 force the password to be the account name 123 to set a password before the account may be used. 278 The user and group id's actually used when creating an account with 291 on which an account is created when the account will expire or the 292 user will be forced to change the account's password. 295 in either field will disable the corresponding (account or password)
|
/freebsd/usr.sbin/sa/ |
H A D | sa.8 | 53 .Pa /var/account/acct 55 .Pa /var/account/savacct 57 .Pa /var/account/usracct , 62 .Pa /var/account/acct 69 .Pa /var/account/acct . 151 .Pa /var/account/savacct . 169 .Pa /var/account/usracct . 220 .Bl -tag -width /var/account/usracct -compact 221 .It Pa /var/account/acct 223 .It Pa /var/account/savacct [all …]
|
/freebsd/usr.bin/logins/ |
H A D | logins.1 | 33 .Nd display account information 47 Display information about the password change and account expiration 48 times for each account. 61 Display the information for each account on a single line of 69 account (UID 65534). 77 account (UID 65534). 79 Display information about each account's home directory and shell.
|
/freebsd/lib/libpam/pam.d/ |
H A D | other | 11 # account 12 account required pam_nologin.so 13 #account required pam_krb5.so 14 account required pam_login_access.so 15 account required pam_unix.so
|
H A D | sshd | 11 # account 12 account required pam_nologin.so 13 #account required pam_krb5.so 14 account required pam_login_access.so 15 account required pam_unix.so
|
H A D | login | 10 # account 11 account requisite pam_securetty.so 12 account required pam_nologin.so 13 account include system
|
H A D | ftpd | 11 # account 12 account required pam_nologin.so 13 #account required pam_krb5.so 14 account required pam_unix.so
|
H A D | xdm | 11 # account 12 account required pam_nologin.so 13 #account required pam_krb5.so 14 account required pam_unix.so
|
H A D | system | 11 # account 12 #account required pam_krb5.so 13 account required pam_login_access.so 14 account required pam_unix.so
|
/freebsd/lib/libpam/modules/pam_unix/ |
H A D | pam_unix.8 | 53 authentication, account management, and password management. 58 .Dq Li account , 97 themselves, not as the account they are attempting to access. 136 .Ss Ux Ss Account Management Module 139 account management component provides a function to perform account 143 into the local user account by checking the following criteria: 146 locked status of the account compatible with
|
/freebsd/lib/libpam/modules/pam_krb5/ |
H A D | pam-krb5.8 | 70 \& account required pam_krb5.so minimum_uid=1000 77 operations: authentication, account management, session management, and 119 this function is to check the user's account for a \fI.k5login\fR file and, 123 the principal matches the account name (this can be changed by configuring 129 treating the username as a principal, map it to a local account name, 130 \&\fBpam_authenticate()\fR will change the PAM user to that local account name. 132 do the mapping to an account. This can be disabled with the 163 .IP account 4 164 .IX Item "account" 189 Both the account and session management calls of the Kerberos PAM module [all …]
|
/freebsd/contrib/ntp/ |
H A D | README.pullrequests | 37 1) If you haven't, create a fork of ntp-project/ntp with your github account. 38 i) Log on to github.com with your github account. 39 …one, create one first. (read: https://help.github.com/articles/signing-up-for-a-new-github-account) 40 - Make sure you also have a SSH key associated with your github account. 45 ntp master to your own account. Once done, it will go to your account's 65 iv) Once you are satisfied, you can push to your github account's
|
/freebsd/release/ |
H A D | Makefile.azure | 47 --account-name ${AZURE_ACCOUNT} --account-key ${AZURE_KEY} \ 50 @echo "The disk has been uploaded to Storage Account, use following information" 53 @echo "Storage Account name: ${AZURE_ACCOUNT}" 64 --account-name ${AZURE_ACCOUNT} --account-key ${AZURE_KEY} \
|
/freebsd/usr.sbin/adduser/ |
H A D | adduser.8 | 187 Disable the account. 188 This option will lock the account by prepending the string 191 The account may be unlocked 208 If an error is encountered while processing an account, it will write a 209 message to standard error and move to the next account. 313 option is used, the account information must be stored in a specific 347 This field denotes the password change date for the account. 373 Account expiration. 374 This field denotes the expiry date of the account. 375 The account may not be used after the specified date. [all …]
|
/freebsd/contrib/pam-krb5/docs/ |
H A D | pam_krb5.pod | 17 account required pam_krb5.so minimum_uid=1000 24 operations: authentication, account management, session management, and 69 this function is to check the user's account for a F<.k5login> file and, 73 the principal matches the account name (this can be changed by configuring 79 treating the username as a principal, map it to a local account name, 80 pam_authenticate() will change the PAM user to that local account name. 82 do the mapping to an account. This can be disabled with the 115 =item account 144 Both the account and session management calls of the Kerberos PAM module 201 account qualified with a realm, that realm will not be used when [all …]
|
/freebsd/crypto/openssh/ |
H A D | auth-shadow.c | 47 * For the account and password expiration functions, we assume the expiry 52 * Check if specified account is expired. Returns 1 if account is expired, 68 debug3("account expiration disabled"); in auth_shadow_acctexpired() 70 logit("Account %.100s has expired", spw->sp_namp); in auth_shadow_acctexpired() 73 debug3("account will expire in %lld days", daysleft); in auth_shadow_acctexpired() 75 "Your account will expire in %lld day%s.\n", daysleft, in auth_shadow_acctexpired()
|
/freebsd/share/man/man5/ |
H A D | passwd.5 | 86 Account expiration time. 114 field is the login used to access the computer account, and the 171 password authentication is disabled for that account 182 means that the account is temporarily locked out 184 For a convenient command-line interface to account locking, see 210 password for the account must be changed. 219 account expires. 220 This field may be left empty to turn off the account aging feature; 276 The conventional way to disable logging into an account once and for all,
|
/freebsd/contrib/llvm-project/llvm/tools/llvm-xray/ |
H A D | xray-account.cpp | 1 //===- xray-account.h - XRay Function Call Accounting ---------------------===// 19 #include "xray-account.h" 31 static cl::SubCommand Account("account", "Function call accounting"); variable 34 cl::Required, cl::sub(Account)); 37 cl::sub(Account), cl::init(false)); 42 cl::sub(Account), cl::init(false)); 46 cl::sub(Account), cl::init(false)); 53 cl::sub(Account)); 63 cl::sub(Account)); 81 cl::sub(Account), cl::init(SortField::FUNCID), [all …]
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | ber | 21 # TAP -> Transferred Account Procedure 31 >>>>&0 byte x TAP 3.%d Batch (TD.57, Transferred Account) 39 >>>&0 byte x TAP 3.%d Notification (TD.57, Transferred Account) 58 >>>>&0 byte x RAP 1.%d Batch (TD.32, Returned Account Procedure), 64 >&1 search/b5 \x5f\x81\x44 RAP Acknowledgement (TD.32, Returned Account Procedure)
|