[
Top
]
[
Contents
]
[Index]
[
?
]
Table of Contents
The GNU General Public License
Preamble
How to Apply These Terms to Your New Programs
Introduction
1. Becoming someone else
1.1 Terminology
1.2 How Become sets up the environment
1.2.1 Environment variables created by Become
1.2.2 Login styles
1.2.2.1 The `preserve' login style
1.2.2.2 The `set-user' login style
1.2.2.3 The `login' login style
1.2.3 Tweaking individual environment variables
1.2.4 Variables removed from the environment
1.3 How Become handles groups
1.3.1 Choosing a new primary group
1.3.2 Handling subsidiary group memberships
1.4 Considerations for X authority
1.4.1 The user-group method for handling X authority
1.4.2 The
xauth
method for handling X authority
1.5 Executing specific commands
2. Become administration
2.1 Configuration files
2.2 Installation types
2.3 The configuration file
2.3.1 Requests and rules
2.3.2 Basic configuration file syntax
2.3.3 Classes
2.3.4 Predefined classes
2.3.5 Allow statements
2.3.6 Other statements
2.3.7 An example configuration file
2.3.8 Checking and querying the configuration file
2.3.8.1 Verifying configuration files
2.3.8.2 Querying configuration files
2.3.8.3 Output formats
2.3.8.4 Restricting output
2.3.8.5
bcquery
options summary
2.3.9 Complete grammar for configuration files
2.4 Networked configuration
2.4.1 Choosing servers
2.4.2 Setting up keys
2.4.3 Issuing a new key
3. Invoking Become
3.1 Becoming another user
3.1.1 Synopsis
3.1.2 Usage
3.2 Starting Become daemons
3.2.1 Synopsis
3.2.2 Usage
3.3 Debugging options
[
Top
]
[
Contents
]
[Index]
[
?
]
This document was generated by
Mark Wooding
on
March, 14 2006
using
texi2html 1.76
.