EnglishFrenchSpanish

OnWorks favicon

login.heimdal - Online in the Cloud

Run login.heimdal in OnWorks free hosting provider over Ubuntu Online, Fedora Online, Windows online emulator or MAC OS online emulator

This is the command login.heimdal that can be run in the OnWorks free hosting provider using one of our multiple free online workstations such as Ubuntu Online, Fedora Online, Windows online emulator or MAC OS online emulator

PROGRAM:

NAME


login — authenticate a user and start new session

SYNOPSIS


login [-fp] [-a level] [-h hostname] [username]

DESCRIPTION


This manual page documents the login program distributed with the Heimdal Kerberos 5
implementation, it may differ in important ways from your system version.

The login programs logs users into the system. It is intended to be run by system daemons
like getty(8) or telnetd(8). If you are already logged in, but want to change to another
user, you should use su(1).

A username can be given on the command line, else one will be prompted for.

A password is required to login, unless the -f option is given (indicating that the calling
program has already done proper authentication). With -f the user will be logged in without
further questions.

For password authentication Kerberos 5, OTP (if compiled in) and local (/etc/passwd)
passwords are supported. OTP will be used if the the user is registered to use it, and login
is given the option -a otp. When using OTP, a challenge is shown to the user.

Further options are:

-a string
Which authentication mode to use, the only supported value is currently “otp”.

-f Indicates that the user is already authenticated. This happens, for instance, when
login is started by telnetd, and the user has proved authentic via Kerberos.

-h hostname
Indicates which host the user is logging in from. This is passed from telnetd, and
is entered into the login database.

-p This tells login to preserve all environment variables. If not given, only the TERM
and TZ variables are preserved. It could be a security risk to pass random variables
to login or the user shell, so the calling daemon should make sure it only passes
“safe” variables.

The process of logging user in proceeds as follows.

First a check is made that logins are allowed at all. This usually means checking
/etc/nologin. If it exists, and the user trying to login is not root, the contents is
printed, and then login exits.

Then various system parameters are set up, like changing the owner of the tty to the user,
setting up signals, setting the group list, and user and group id. Also various machine
specific tasks are performed.

Next login changes to the users home directory, or if that fails, to /. The environment is
setup, by adding some required variables (such as PATH), and also authentication related
ones (such as KRB5CCNAME). If an environment file exists (/etc/environment), variables are
set according to it.

If one or more login message files are configured, their contents is printed to the
terminal.

If a login time command is configured, it is executed. A logout time command can also be
configured, which makes login fork, and wait for the user shell to exit, and then run the
command. This can be used to clean up user credentials.

Finally, the user's shell is executed. If the user logging in is root, and root's login
shell does not exist, a default shell (usually /bin/sh) is also tried before giving up.

ENVIRONMENT


These environment variables are set by login (not including ones set by /etc/environment):

PATH the default system path
HOME the user's home directory (or possibly /)
USER, LOGNAME both set to the username
SHELL the user's shell
TERM, TZ set to whatever is passed to login
KRB5CCNAME if the password is verified via Kerberos 5, this will point to the
credentials cache file

Use login.heimdal online using onworks.net services


Free Servers & Workstations

Download Windows & Linux apps

Linux commands

  • 1
    AClock
    AClock
    AClock - Analog dockapp clock for
    GNUstep ...
    Run AClock
  • 2
    acl_gran
    acl_gran
    rsbac-admin - Rule Set Based Access
    Control DESCRIPTION: rsbac-admin is a
    set of tool used to manage systems using
    a Rule Set Based Access Control (RSBAC)
    kern...
    Run acl_gran
  • 3
    cpupower-frequency-set
    cpupower-frequency-set
    cpupower frequency-set - A small tool
    which allows to modify cpufreq settings.
    SYNTAX: cpupower [ -c cpu ]
    frequency-set [options] DESCRIPTION:
    cpupower freque...
    Run cpupower-frequency-set
  • 4
    cpupower-idle-info
    cpupower-idle-info
    cpupower idle-info - Utility to
    retrieve cpu idle kernel information
    SYNTAX: cpupower [ -c cpulist ]
    idle-info [options] DESCRIPTION: A tool
    which prints out p...
    Run cpupower-idle-info
  • 5
    gbker
    gbker
    gbker - Produce kernel density
    estimation ...
    Run gbker
  • 6
    gbker2d
    gbker2d
    gbker2d - Kernel density estimate for
    bivariate data ...
    Run gbker2d
  • More »

Ad