password for becoming
if no login is provided), and switches to that user and group ID after
verifying proper rights to do so. A shell is then executed. If
is executed by root, no password is requested and a shell with the
appropriate user ID is executed.
The invoked shell is the users own except when a shell is specified in
the configuration file
is specified on the command line, users profile files are read as if it
was a login shell.
the traditional behavior of
Only users specified in
to become another one with this method.
You can specify in the
file the list of logins allowed for users when using
for more details.
is installed as