Deleted Added
full compact
id.1 (145671) id.1 (162571)
1.\" Copyright (c) 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" This code is derived from software contributed to Berkeley by
5.\" the Institute of Electrical and Electronics Engineers, Inc.
6.\"
7.\" Redistribution and use in source and binary forms, with or without
8.\" modification, are permitted provided that the following conditions

--- 19 unchanged lines hidden (view full) ---

28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33.\" SUCH DAMAGE.
34.\"
35.\" @(#)id.1 8.1 (Berkeley) 6/6/93
1.\" Copyright (c) 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" This code is derived from software contributed to Berkeley by
5.\" the Institute of Electrical and Electronics Engineers, Inc.
6.\"
7.\" Redistribution and use in source and binary forms, with or without
8.\" modification, are permitted provided that the following conditions

--- 19 unchanged lines hidden (view full) ---

28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33.\" SUCH DAMAGE.
34.\"
35.\" @(#)id.1 8.1 (Berkeley) 6/6/93
36.\" $FreeBSD: head/usr.bin/id/id.1 145671 2005-04-29 08:37:52Z robert $
36.\" $FreeBSD: head/usr.bin/id/id.1 162571 2006-09-23 12:30:31Z rwatson $
37.\"
38.Dd May 3, 2004
39.Dt ID 1
40.Os
41.Sh NAME
42.Nm id
43.Nd return user identity
44.Sh SYNOPSIS
45.Nm
46.Op Ar user
47.Nm
48.Fl G Op Fl n
49.Op Ar user
50.Nm
51.Fl M
52.Nm
53.Fl P
54.Op Ar user
55.Nm
37.\"
38.Dd May 3, 2004
39.Dt ID 1
40.Os
41.Sh NAME
42.Nm id
43.Nd return user identity
44.Sh SYNOPSIS
45.Nm
46.Op Ar user
47.Nm
48.Fl G Op Fl n
49.Op Ar user
50.Nm
51.Fl M
52.Nm
53.Fl P
54.Op Ar user
55.Nm
56.Fl a
57.Nm
56.Fl g Op Fl nr
57.Op Ar user
58.Nm
59.Fl p
60.Op Ar user
61.Nm
62.Fl u Op Fl nr
63.Op Ar user

--- 15 unchanged lines hidden (view full) ---

79.Bl -tag -width indent
80.It Fl G
81Display the different group IDs (effective, real and supplementary)
82as white-space separated numbers, in no particular order.
83.It Fl M
84Display the MAC label of the current process.
85.It Fl P
86Display the id as a password file entry.
58.Fl g Op Fl nr
59.Op Ar user
60.Nm
61.Fl p
62.Op Ar user
63.Nm
64.Fl u Op Fl nr
65.Op Ar user

--- 15 unchanged lines hidden (view full) ---

81.Bl -tag -width indent
82.It Fl G
83Display the different group IDs (effective, real and supplementary)
84as white-space separated numbers, in no particular order.
85.It Fl M
86Display the MAC label of the current process.
87.It Fl P
88Display the id as a password file entry.
89.It Fl a
90Display the process audit user ID and other process audit properties, which
91requires privilege.
87.It Fl g
88Display the effective group ID as a number.
89.It Fl n
90Display the name of the user or group ID for the
91.Fl G ,
92.Fl g
93and
94.Fl u

--- 59 unchanged lines hidden ---
92.It Fl g
93Display the effective group ID as a number.
94.It Fl n
95Display the name of the user or group ID for the
96.Fl G ,
97.Fl g
98and
99.Fl u

--- 59 unchanged lines hidden ---