SECURETTY(5) Linux Programmer's Manual SECURETTY(5)
securetty - list of terminals on which root is allowed to login
The file /etc/securetty contains the names of terminals (one per line, without leading /dev/) which are considered secure for the transmission of certain authentication tokens. It is used by (some versions of) login(1) to restrict the terminals on which root is allowed to login. See login.defs(5) if you use the shadow suite. On PAM enabled systems, it is used for the same purpose by pam_securetty(8) to restrict the terminals on which empty passwords are accepted.
login(1), login.defs(5), pam_securetty(8)
This page is part of release 5.13 of the Linux man-pages project. A description of the project, information about reporting bugs, and the latest version of this page, can be found at https://www.kernel.org/doc/man-pages/. Linux 2020-06-09 SECURETTY(5)
Pages that refer to this page: login(1@@shadow-utils), pam_securetty(8)
Copyright and license for this manual page