AT&T UNIX™PC Unix System V Users Manual - tenox
AT&T UNIX™PC Unix System V Users Manual - tenox AT&T UNIX™PC Unix System V Users Manual - tenox
SU ( 1) SU ( l ) NAME su - become super-user or another user SYNOPSIS su [ - ] [ name [ arg . . . ] ] DESCRIPTION Su allows one to become another user without logging off. The default user name is root (i.e., super-user). To use su, the appropriate password must be supplied (unless one is already super-user). If the password is correct, su will execute a new shell with the user ID set to that of the specified user. To restore normal user ID privileges, type an EOF to the new shell. Any additional arguments are passed to the shell, permitting the super-user to run shell procedures with restricted privileges ( an arg of the form -c string executes string via the shell). When additional arguments are passed, /bin/sh is always used. When no additional arguments are passed, su uses the shell specified in the password file. An initial - flag causes the environment to be changed to the one that would be expected if the user actually logged in again. This is done by invoking the shell with an argO of -su causing the .profile in the home directory of the new user ID to be executed. Otherwise, the environment is passed along with the possible exception of $PATH, which is set to /bin:/etc:Jusr/bin:/usr/local/bin for root. Note that the .profile can check argO for -sh or -su to determine how it was invoked. FILES fetcjpasswd $HOMEj.profile system's password file user's profile SEE ALSO env(l), login(IM), sh( l), environ(5). - 1 -
- Page 495: SCCSDIFF ( 1 ) SCCSDIFF ( 1 ) NAME
- Page 499 and 500: SDB ( l ) SDB ( 1) NAME sdb - symbo
- Page 501 and 502: � I SDB ( 1) SDB ( 1) file may ov
- Page 503 and 504: SDB ( 1) SDB ( 1) e directory file-
- Page 505 and 506: SDB ( 1 ) SDB ( 1 ) execution. B Pr
- Page 507: SDB ( 1 ) SDB ( 1 ) WARNINGS BUGS W
- Page 510 and 511: SDIFF ( 1) SDIFF(l) On exit from th
- Page 512 and 513: SED ( 1) SED ( 1) In the following
- Page 515 and 516: SETPRINT ( 1 ) SETPRINT ( 1 ) NAME
- Page 517 and 518: -� SH ( l ) NAME SH ( l ) sh, rsh
- Page 519 and 520: SH ( 1 ) SH(l) positional parameter
- Page 521 and 522: SH ( 1 ) word >> word
- Page 523 and 524: SH ( 1 ) SH ( 1) cd [ arg ] Change
- Page 525 and 526: SH (l) SH (l) Invocation . If the s
- Page 527 and 528: SHFORM (I) {AT&T UNIX PC only ) SHF
- Page 529 and 530: ( \ SHFORM(I) (AT&T UNIX PC only )
- Page 531 and 532: SIZE ( 1 ) SIZE ( 1) NAME size - pr
- Page 533: �· ! SLEEP (I) SLEEP (I) NAME sl
- Page 536 and 537: SORT(l) SORT(l) 0 The next argument
- Page 538 and 539: SPELL {l) SPELL (l) FILES spellin s
- Page 540 and 541: n__
- Page 543 and 544: STTY ( 1) STTY(l) NAME stty - set t
- Page 545: STTY ( 1) lfkc ( -lfkc) echonl ( -e
- Page 549 and 550: SUM ( 1 ) SUM ( 1) NAME sum - print
- Page 551 and 552: SYNC ( 1) NAME sync - update the su
- Page 553 and 554: TABS ( l ) TABS ( l ) NAME tabs - s
- Page 555 and 556: TABS (l) TABS (l) unknown tab code
- Page 557: TAIL ( l) TAIL ( 1) NAME tail - del
- Page 560 and 561: TAR ( 1) TAR ( 1) FILES r causes ta
- Page 562 and 563: TBL(l) TBL(l) If a data line consis
- Page 564 and 565: It) I�
- Page 570 and 571: � "'-·�r•'
- Page 572 and 573: I I I I I I I I I I I I I I I I I I
- Page 574 and 575: TEST ( 1) TEST (l) SEE ALSO find(l)
- Page 576 and 577: :)\ ... .._
- Page 579: TR ( l ) TR ( l ) NAME tr - transla
- Page 582 and 583: I I I I I I I I I I I I I I I I I I
- Page 584 and 585: TSET ( 1 ) (AT&T UNIX PC only ) TSE
- Page 587 and 588: TTY ( l ) TTY ( l ) NAME tty - get
- Page 589 and 590: UAHELP (l) (AT&T UNIX PC only ) UAH
- Page 591 and 592: UAUPD ( l ) ( AT&T UNIX PC only ) U
- Page 593: UMASK ( 1) UMASK ( 1) NAME umask -
SU ( 1) SU ( l )<br />
NAME su - become super-user or another user<br />
SYNOPSIS<br />
su [ - ] [ name [ arg . . . ] ]<br />
DESCRIPTION<br />
Su allows one to become another user without logging off. The<br />
default user name is root (i.e., super-user).<br />
To use su, the appropriate password must be supplied (unless one<br />
is already super-user). If the password is correct, su will execute a<br />
new shell with the user ID set to that of the specified user. To<br />
restore normal user ID privileges, type an EOF to the new shell.<br />
Any additional arguments are passed to the shell, permitting the<br />
super-user to run shell procedures with restricted privileges ( an<br />
arg of the form -c string executes string via the shell). When<br />
additional arguments are passed, /bin/sh is always used. When<br />
no additional arguments are passed, su uses the shell specified in<br />
the password file.<br />
An initial - flag causes the environment to be changed to the one<br />
that would be expected if the user actually logged in again. This<br />
is done by invoking the shell with an argO of -su causing the<br />
.profile in the home directory of the new user ID to be executed.<br />
Otherwise, the environment is passed along with the possible<br />
exception of $PATH, which is set to<br />
/bin:/etc:Jusr/bin:/usr/local/bin for root. Note that the<br />
.profile can check argO for -sh or -su to determine how it was<br />
invoked.<br />
FILES<br />
fetcjpasswd<br />
$HOMEj.profile<br />
system's password file<br />
user's profile<br />
SEE ALSO<br />
env(l), login(IM), sh( l), environ(5).<br />
- 1 -