Lines Matching full:user
23 .Nd authenticating gateway user shell
29 is a user shell for authenticating gateways.
32 rules when a user authenticates and starts a session with
34 and to undo these changes when the user's session exits.
48 is a user shell
52 the gateway system, and can be directly associated with the user name.
68 the user's shell needs to be set to
76 syntax to change rules for an individual user or client IP address
77 as long as a user maintains an active
131 is assigned the user name.
136 .Pa /etc/authpf/users/$USER/ ,
143 Per-user rules from the
144 .Pa /etc/authpf/users/$USER/
146 are needed on an individual user basis.
151 It is important to ensure that a user cannot write or change
179 .Sh USER MESSAGES
182 displays a message telling the user they have been authenticated.
186 .Pa /etc/authpf/users/$USER/
198 This is done by creating a file with the banned user's login name as the
201 The contents of this file will be displayed to a banned user, thus providing
202 a method for informing the user that they have been banned, and where they can
217 is unable to verify the user's permission to use the gateway, it will
224 The user does not see these, but will be told the system is unavailable due to
231 maintains the changed rules as long as the user maintains an active session.
233 of this session means the user is authenticated.
259 will remove state table entries that were created during a user's
304 \- To illustrate the user-specific access control
305 mechanisms, let us consider a typical user named bob.
390 \- Once authenticated, the user is shown the contents of
401 To tell the user where to go when the system is broken,
413 well as the per-user rules should probably allow very few things beyond
465 # allow out ftp, ssh, www and https only, and allow user to negotiate
492 will be logged as in the example below, where the user may be identified
535 the connections can be authorized based on the userid of the user instead of
542 example below, the remote user could tunnel a remote desktop session to their
549 user $user_id
573 connection may be secured, but if the network is not secured the user may
575 attackers on the network to pretend to be the user by spoofing their IP