Commit | Line | Data |
---|---|---|
fbfecad0 KM |
1 | .\" Copyright (c) 1980 Regents of the University of California. |
2 | .\" All rights reserved. The Berkeley software License Agreement | |
3 | .\" specifies the terms and conditions for redistribution. | |
4 | .\" | |
7c71a5ca | 5 | .\" @(#)netlogin.1 6.1 (Berkeley) %G% |
fbfecad0 | 6 | .\" |
7c71a5ca | 7 | .TH NETLOGIN 1 "%G%" |
fbfecad0 KM |
8 | .UC 4 |
9 | .ds s 1 | |
10 | .ds o 1 | |
11 | .SH NAME | |
12 | netlogin \- provide login name and password for a remote machine | |
13 | .SH SYNOPSIS | |
14 | .B netlogin | |
15 | .B \-m | |
16 | machine [ | |
17 | .B \-l | |
18 | login | |
19 | ] | |
20 | .SH DESCRIPTION | |
21 | The | |
22 | .I netlogin | |
23 | command sets the login name and password for the specified | |
24 | .I machine | |
25 | in a rather unusual way. | |
26 | The user should type (to the C shell) | |
27 | .IP | |
28 | setenv\ MACH\fImachine\fR\ \(ganetlogin\ \-m\ \fImachine\fR\(ga | |
29 | .LP | |
30 | or (to the default Version 7 ``Bourne'' shell) | |
31 | .IP | |
32 | MACH\fImachine\fR=\(ganetlogin\ \-m\ \fImachine\fR\(ga; export MACH\fImachine\fR | |
33 | .PP | |
34 | to his login shell. (Note the back-quotes). | |
35 | For example, | |
36 | .IP | |
37 | setenv\ MACHA\ `netlogin\ \-m\ A` | |
38 | .PP | |
39 | will prompt the user for his login name and password on the A machine and | |
40 | .IP | |
41 | setenv\ MACHA\ `netlogin\ \-m\ A \-l\ myname` | |
42 | .PP | |
43 | will prompt the user for the password to account `A:myname'. | |
44 | .PP | |
45 | The | |
46 | .IR net (\*s) | |
47 | command will read the environment looking for environment variables | |
48 | beginning with ``MACH'' and followed by a valid machine name on the | |
49 | local network. | |
50 | If found it will use that information rather than prompt the user | |
51 | every time he executes a network command. | |
52 | This environment information is ignored if login names and passwords | |
53 | are specified on the command line of network commands using the | |
54 | .B \-l | |
55 | and | |
56 | .B \-p | |
57 | options or in the | |
58 | .I \&.netrc | |
59 | file. | |
60 | .PP | |
61 | This procedure for specifying passwords is somewhat safer than | |
62 | putting the remote passwords in the | |
63 | .I \&.netrc | |
64 | file. | |
65 | The passwords in the environment are encrypted and the environment | |
66 | information is useless after the user logs out. | |
67 | Use the | |
68 | .IR printenv (\*o) | |
69 | command to see the encrypted password. | |
70 | .SH AUTHOR | |
71 | Eric Schmidt | |
72 | .SH "SEE ALSO" | |
73 | net(\*s), netrm(\*s), netq(\*s), netlog(\*s), netcp(\*s), | |
74 | netlpr(\*s), netmail(\*s), printenv(\*o), csh(\*o) | |
75 | .SH BUGS |