.\" Copyright (c) 1980, 1990 Regents of the University of California.
.\" All rights reserved. The Berkeley software License Agreement
.\" specifies the terms and conditions for redistribution.
.\" @(#)login.1 6.9 (Berkeley) %G%
is used when a user initially
It may also be used at any time to change
from one user to another.
This case is the one summarized first above and described here.
for how to connect initially.
is made by a system program or server using the latter form of the command
is invoked without an argument,
it asks for a user name, and, if
Echoing is turned off (if possible) during the typing of the password,
so it will not appear on the written record of the
After a successful login,
accounting files are updated and
the user is informed of the
The message of the day is printed,
as is the time of his last login.
Both are suppressed if he has a
file in his home directory; this
is mostly used to make life easier for non-human users, such as
initializes the user and group IDs and the working directory,
then executes a command interpreter (usually
according to specifications found in a password file.
Argument 0 of the command interpreter is
the name of the command interpreter with
with information specifying home directory, command interpreter, terminal
type (if available) and user name.
Causes the remainder of the environment to be preserved,
otherwise any previous environment is discarded.
and other servers to list the host from which
the connection was received.
Used with a username on the command line, at initial login,
to indicate that proper authentication has already been done
and that no password need be requested.
This option may be used by the superuser
or by the user specified on the command line.
prints its contents on the user's terminal and exits. This is
to stop users logging in when the system is about to go down.
and executed directly (without forking).
appeared in Version 6 AT&T Unix.
if the name or the password is bad.
.Dp Li cannot open password file
consult a programming counselor.