Commit | Line | Data |
---|---|---|
11a514e8 C |
1 | .TH NETLOGIN 1 "6 February 1980" |
2 | .UC 4 | |
3 | .ds s 1 | |
4 | .ds o 1 | |
5 | .SH NAME | |
6 | netlogin \- provide login name and password for a remote machine | |
7 | .SH SYNOPSIS | |
8 | .B netlogin | |
9 | .B \-m | |
10 | machine [ | |
11 | .B \-l | |
12 | login | |
13 | ] | |
14 | .SH DESCRIPTION | |
15 | The | |
16 | .I netlogin | |
17 | command sets the login name and password for the specified | |
18 | .I machine | |
19 | in a rather unusual way. | |
20 | The user should type (to the C shell) | |
21 | .IP | |
22 | setenv\ MACH\fImachine\fR\ \(ganetlogin\ \-m\ \fImachine\fR\(ga | |
23 | .LP | |
24 | or (to the default Version 7 ``Bourne'' shell) | |
25 | .IP | |
26 | MACH\fImachine\fR=\(ganetlogin\ \-m\ \fImachine\fR\(ga; export MACH\fImachine\fR | |
27 | .PP | |
28 | to his login shell. (Note the back-quotes). | |
29 | For example, | |
30 | .IP | |
31 | setenv\ MACHA\ `netlogin\ \-m\ A` | |
32 | .PP | |
33 | will prompt the user for his login name and password on the A machine and | |
34 | .IP | |
35 | setenv\ MACHA\ `netlogin\ \-m\ A \-l\ myname` | |
36 | .PP | |
37 | will prompt the user for the password to account `A:myname'. | |
38 | .PP | |
39 | The | |
40 | .IR net (\*s) | |
41 | command will read the environment looking for environment variables | |
42 | beginning with ``MACH'' and followed by a valid machine name on the | |
43 | local network. | |
44 | If found it will use that information rather than prompt the user | |
45 | every time he executes a network command. | |
46 | This environment information is ignored if login names and passwords | |
47 | are specified on the command line of network commands using the | |
48 | .B \-l | |
49 | and | |
50 | .B \-p | |
51 | options or in the | |
52 | .I \&.netrc | |
53 | file. | |
54 | .PP | |
55 | This procedure for specifying passwords is somewhat safer than | |
56 | putting the remote passwords in the | |
57 | .I \&.netrc | |
58 | file. | |
59 | The passwords in the environment are encrypted and the environment | |
60 | information is useless after the user logs out. | |
61 | Use the | |
62 | .IR printenv (\*o) | |
63 | command to see the encrypted password. | |
64 | .SH AUTHOR | |
65 | Eric Schmidt | |
66 | .SH "SEE ALSO" | |
67 | net(\*s), netrm(\*s), netq(\*s), netlog(\*s), netcp(\*s), | |
68 | netlpr(\*s), netmail(\*s), printenv(\*o), csh(\*o) | |
69 | .SH BUGS |