Home
last modified time | relevance | path

Searched full:account (Results 1 – 25 of 1612) sorted by relevance

12345678910>>...65

/freebsd/crypto/krb5/doc/admin/
H A Dlockout.rst3 Account lockout
8 time. Account lockout can make it more difficult to attack a
13 Configuring account lockout
16 Account lockout only works for principals with the
26 Account lockout parameters are configured via :ref:`policy objects
31 The policy parameters related to account lockout are:
48 Testing account lockout
51 To test that account lockout is working, try authenticating as the
66 Account lockout principal state
69 A principal entry keeps three pieces of state related to account
[all …]
H A Dhost_config.rst53 whether a Kerberos principal is allowed to access a local account.
55 By default, a Kerberos principal is allowed access to an account if
56 its realm matches the default realm and its name matches the account
60 is granted access to the ``alice`` account if ``ATHENA.MIT.EDU`` is
65 of each account listing the principal names which should have login
66 access to that account. If it is not desirable to use ``.k5login``
67 files located in account home directories, the **k5login_directory**
69 containing one file per account uname.
95 # principal name as the account name.
/freebsd/crypto/krb5/doc/html/_sources/admin/
H A Dlockout.rst.txt3 Account lockout
8 time. Account lockout can make it more difficult to attack a
13 Configuring account lockout
16 Account lockout only works for principals with the
26 Account lockout parameters are configured via :ref:`policy objects
31 The policy parameters related to account lockout are:
48 Testing account lockout
51 To test that account lockout is working, try authenticating as the
66 Account lockout principal state
69 A principal entry keeps three pieces of state related to account
[all …]
H A Dhost_config.rst.txt53 whether a Kerberos principal is allowed to access a local account.
55 By default, a Kerberos principal is allowed access to an account if
56 its realm matches the default realm and its name matches the account
60 is granted access to the ``alice`` account if ``ATHENA.MIT.EDU`` is
65 of each account listing the principal names which should have login
66 access to that account. If it is not desirable to use ``.k5login``
67 files located in account home directories, the **k5login_directory**
69 containing one file per account uname.
95 # principal name as the account name.
/freebsd/crypto/krb5/doc/html/admin/
H A Dlockout.html9 <title>Account lockout &#8212; MIT Kerberos Documentation</title>
55 <section id="account-lockout">
56 <span id="lockout"></span><h1>Account lockout<a class="headerlink" href="#account-lockout" title="P…
59 time. Account lockout can make it more difficult to attack a
62 <section id="configuring-account-lockout">
63 <h2>Configuring account lockout<a class="headerlink" href="#configuring-account-lockout" title="Per…
64 <p>Account lockout only works for principals with the
74 <p>Account lockout parameters are configured via <a class="reference internal" href="database.html#…
77 <p>The policy parameters related to account lockout are:</p>
94 <section id="testing-account-lockout">
[all …]
/freebsd/usr.sbin/pw/
H A Dpw.8318 Specify the user/account name.
327 Specify the user/account numeric id.
332 changes the numeric id of the named user/account.
335 as the account name will imply the uid, or vice versa.
339 or overriding the default uid when creating a new account with
348 Either the account or userid can also be provided immediately after the
376 This option sets the account's home directory.
383 with the account name as a subdirectory.
385 Set the account's expiration date.
400 Set the account'
[all...]
H A Dpw.conf.5100 days after which account expires
112 force the password to be the account name
123 to set a password before the account may be used.
278 The user and group id's actually used when creating an account with
291 on which an account is created when the account will expire or the
292 user will be forced to change the account's password.
295 in either field will disable the corresponding (account or password)
/freebsd/usr.sbin/sa/
H A Dsa.853 .Pa /var/account/acct
55 .Pa /var/account/savacct
57 .Pa /var/account/usracct ,
62 .Pa /var/account/acct
69 .Pa /var/account/acct .
151 .Pa /var/account/savacct .
169 .Pa /var/account/usracct .
220 .Bl -tag -width /var/account/usracct -compact
221 .It Pa /var/account/acct
223 .It Pa /var/account/savacct
[all …]
/freebsd/usr.bin/logins/
H A Dlogins.133 .Nd display account information
47 Display information about the password change and account expiration
48 times for each account.
61 Display the information for each account on a single line of
69 account (UID 65534).
77 account (UID 65534).
79 Display information about each account's home directory and shell.
/freebsd/lib/libpam/pam.d/
H A Dother11 # account
12 account required pam_nologin.so
13 #account required pam_krb5.so
14 account required pam_login_access.so
15 account required pam_unix.so
H A Dsshd11 # account
12 account required pam_nologin.so
13 #account required pam_krb5.so
14 account required pam_login_access.so
15 account required pam_unix.so
H A Dlogin10 # account
11 account requisite pam_securetty.so
12 account required pam_nologin.so
13 account include system
H A Dftpd11 # account
12 account required pam_nologin.so
13 #account required pam_krb5.so
14 account required pam_unix.so
H A Dxdm11 # account
12 account required pam_nologin.so
13 #account required pam_krb5.so
14 account required pam_unix.so
H A Dsystem11 # account
12 #account required pam_krb5.so
13 account required pam_login_access.so
14 account required pam_unix.so
/freebsd/lib/libpam/modules/pam_unix/
H A Dpam_unix.853 authentication, account management, and password management.
58 .Dq Li account ,
97 themselves, not as the account they are attempting to access.
136 .Ss Ux Ss Account Management Module
139 account management component provides a function to perform account
143 into the local user account by checking the following criteria:
146 locked status of the account compatible with
/freebsd/lib/libpam/modules/pam_krb5/
H A Dpam-krb5.870 \& account required pam_krb5.so minimum_uid=1000
77 operations: authentication, account management, session management, and
119 this function is to check the user's account for a \fI.k5login\fR file and,
123 the principal matches the account name (this can be changed by configuring
129 treating the username as a principal, map it to a local account name,
130 \&\fBpam_authenticate()\fR will change the PAM user to that local account name.
132 do the mapping to an account. This can be disabled with the
163 .IP account 4
164 .IX Item "account"
189 Both the account and session management calls of the Kerberos PAM module
[all …]
/freebsd/contrib/ntp/
H A DREADME.pullrequests37 1) If you haven't, create a fork of ntp-project/ntp with your github account.
38 i) Log on to github.com with your github account.
39 …one, create one first. (read: https://help.github.com/articles/signing-up-for-a-new-github-account)
40 - Make sure you also have a SSH key associated with your github account.
45 ntp master to your own account. Once done, it will go to your account's
65 iv) Once you are satisfied, you can push to your github account's
/freebsd/release/
H A DMakefile.azure47 --account-name ${AZURE_ACCOUNT} --account-key ${AZURE_KEY} \
50 @echo "The disk has been uploaded to Storage Account, use following information"
53 @echo "Storage Account name: ${AZURE_ACCOUNT}"
64 --account-name ${AZURE_ACCOUNT} --account-key ${AZURE_KEY} \
/freebsd/usr.sbin/adduser/
H A Dadduser.8187 Disable the account.
188 This option will lock the account by prepending the string
191 The account may be unlocked
208 If an error is encountered while processing an account, it will write a
209 message to standard error and move to the next account.
313 option is used, the account information must be stored in a specific
347 This field denotes the password change date for the account.
373 Account expiration.
374 This field denotes the expiry date of the account.
375 The account may not be used after the specified date.
[all …]
/freebsd/contrib/pam-krb5/docs/
H A Dpam_krb5.pod17 account required pam_krb5.so minimum_uid=1000
24 operations: authentication, account management, session management, and
69 this function is to check the user's account for a F<.k5login> file and,
73 the principal matches the account name (this can be changed by configuring
79 treating the username as a principal, map it to a local account name,
80 pam_authenticate() will change the PAM user to that local account name.
82 do the mapping to an account. This can be disabled with the
115 =item account
144 Both the account and session management calls of the Kerberos PAM module
201 account qualified with a realm, that realm will not be used when
[all …]
/freebsd/crypto/openssh/
H A Dauth-shadow.c47 * For the account and password expiration functions, we assume the expiry
52 * Check if specified account is expired. Returns 1 if account is expired,
68 debug3("account expiration disabled"); in auth_shadow_acctexpired()
70 logit("Account %.100s has expired", spw->sp_namp); in auth_shadow_acctexpired()
73 debug3("account will expire in %lld days", daysleft); in auth_shadow_acctexpired()
75 "Your account will expire in %lld day%s.\n", daysleft, in auth_shadow_acctexpired()
/freebsd/share/man/man5/
H A Dpasswd.586 Account expiration time.
114 field is the login used to access the computer account, and the
171 password authentication is disabled for that account
182 means that the account is temporarily locked out
184 For a convenient command-line interface to account locking, see
210 password for the account must be changed.
219 account expires.
220 This field may be left empty to turn off the account aging feature;
276 The conventional way to disable logging into an account once and for all,
/freebsd/contrib/llvm-project/llvm/tools/llvm-xray/
H A Dxray-account.cpp1 //===- xray-account.h - XRay Function Call Accounting ---------------------===//
19 #include "xray-account.h"
31 static cl::SubCommand Account("account", "Function call accounting"); variable
34 cl::Required, cl::sub(Account));
37 cl::sub(Account), cl::init(false));
42 cl::sub(Account), cl::init(false));
46 cl::sub(Account), cl::init(false));
53 cl::sub(Account));
63 cl::sub(Account));
81 cl::sub(Account), cl::init(SortField::FUNCID),
[all …]
/freebsd/contrib/file/magic/Magdir/
H A Dber21 # TAP -> Transferred Account Procedure
31 >>>>&0 byte x TAP 3.%d Batch (TD.57, Transferred Account)
39 >>>&0 byte x TAP 3.%d Notification (TD.57, Transferred Account)
58 >>>>&0 byte x RAP 1.%d Batch (TD.32, Returned Account Procedure),
64 >&1 search/b5 \x5f\x81\x44 RAP Acknowledgement (TD.32, Returned Account Procedure)

12345678910>>...65