Your workstation requires that you log in to identify yourself as a user, log out to signal that you are finished using the workstation, and use a “System Shutdown” command before turning off the workstation.
This chapter contains the following sections:
Identifying yourself as a user—logging in—is the first step you take to begin using your workstation. Creating your own login account is the second step. Initially, you can log in using one of the default login accounts. See “Using Existing Login Accounts” to learn why you should limit your use of these accounts; see “Why Create a Login Account?” to learn about the benefits of having your own login account.
See “Creating a User Login Account” in the Personal System Administration Guide to learn how to create your account.
When you first turn on the system, you see icons for several existing accounts. Here's a brief description of four existing login accounts and their use:
| guest account | The guest account lets you log in when you don't yet have your own account. It also allows other people to log in to your workstation and copy and view certain files. | |
| OutOfBox account |
| |
| root account | The root account is for the administrator of the workstation. The root account gives the administrator special permissions and access to utilities that are not available to ordinary users. For example, when you are logged in as root, you can delete any file, regardless of who owns the file. Unless you are responsible for system administration on your workstation, you should log in as root infrequently. For an explanation of system administration, see “Performing System Administration Tasks,” in the Personal System Administration Guide. | |
| EZsetup account |
|
Creating a login account provides:
Security. You can set a password that prevents other people from logging in with your name.
Privacy. The system uses your login name to label files and directories that belong to you. You can read, change, and delete files and directories that belong to you, and you can protect your work from other users via permissions. See “Understanding Permissions.”
Personal Preferences. You can modify your working environment in a variety of ways. For instance, you can place the icons you use frequently onto the desktop. When you log in, the desktop displays these icons.
See “Creating a User Login Account” in the Personal System Administration Guide to learn how to create your account.
When you see the login screen, you are ready to log in. Each icon on this screen represents a user who has a login account on the workstation. To log in, select an icon, then click the Login button.
If you don't yet have a login account, see “Creating a User Login Account” in the Personal System Administration Guide to learn how to create your account.
![]() | Note: You can designate one account as the autologin account. The system bypasses the login window and logs in that person every time the system starts up. For instructions, see “Customizing the Login Window” in Chapter 7 of the Personal System Administration Guide. |
If your workstation is part of a network of workstations, you may be able to log in to another workstation remotely — that is, sit in front of your workstation but access files on another workstation. Five sections are dedicated to this topic:
If your system is on a network, and you want to access files on another system, you can open the toolchest or a directory on the remote system by using the Access Desktop form.
To open the Access Desktop form, click the words “Access Desktop” now, or choose “on a Remote Workstation ” from the Access Files menu in the Desktop toolchest.
To access a files on a remote system:
Type in the name of the remote workstation.
Type in an account name and password.
You need to type in the name of a user who has a login account on the remote system. If you do not have an account on the remote system, or know another account name on the system, try guest.
Select “Directory” to open an Icon View of a directory or “Toolchest” to open the remote system's toolchest.
If you're opening a directory, type in the pathname for the directory you want to open.
After you have filled in the above information, click the Apply button.
If you specified a directory name, an Icon View of the remote directory appears on your desktop. You can now navigate through other directories on the remote system, as long as the user you specified has read privileges on the directories you want to view.
If you selected “Toolchest,” the remote toolchest appears on your desktop. You can access applications and various tools on the remote system through the toolchest.
Check the following if the Icon View or toolchest doesn't appear:
Is the workstation name correct?
Does the user you specified have an account on the remote system?
Did you type in the correct password?
Is the directory you specified a valid directory on the remote system?
Does the user you specified have read privileges on the directory? If not, the owner of the directory must change the read permissions for that user.
The rlogin command lets you log in to another system. This example shows how to log in remotely to IRIS9 as guest.
![]() | Note: If IRIS9 is in a different domain (bldg2, for example), you would use IRIS9.bldg2 in the example below instead of IRIS9. |
Open a shell by choosing “Unix Shell” from the Desktop toolchest.
Type: rlogin IRIS9 -l guest
To log out of IRIS9 when you are finished, type:
exit
Then press <Enter>.
rsh connects you to a remote workstation just long enough to run commands that you specify on the same command line as rsh. Once the command is finished, the connection is broken. For example, to find out who is logged in on IRIS9:
Open a shell by choosing “Unix Shell” from the Desktop toolchest.
Type:
rsh IRIS9 -l guest who
This runs the command who on IRIS9 and returns the information to your shell window. If you don't specify a command, rsh behaves just like rlogin; it logs you into the remote workstation.
For further details, see the reference pages (man pages) for rsh and rlogin.
The telnet program offers you another way of logging in to a remote workstation. To use telnet, type a set of information into a shell window.
![]() | Note: If IRIS9 is in a different domain (bldg2, for example), you would use IRIS9.bldg2 in the example below instead of IRIS9. |
Open a shell by choosing “Unix Shell” from the Desktop toolchest.
Type the name of the system to which you want to log in. For example, to log in to IRIS9, type:
telnet IRIS9
The screen shows:
Trying 192.26.180.10... Connected to IRIS9. Escape character is '^]'. IRIX System V.3 (IRIS9) login: |
Type your login name (or guest, if you don't have an account on that system).
Press <Enter>.
If the system asks for a password, type it, then press <Enter>.
Use the remote workstation just as you use a shell window on your own system.
When you are finished and want to end the connection to the remote system, type:
logout
Then press <Enter>.
The screen displays:
Connection closed by foreign host.
The telnet program has many options. See the telnet reference page (man page) for further details. (If you need instructions on accessing reference pages, see the online IRIS Utilities Guide.)
Signal that you are finished using the system by logging out.
Choose “Log Out” from the Desktop toolchest.
A notifier appears asking if you really want to log out.
Click the Yes button in the notifier to confirm that you want to log out.
Before turning off your workstation, you need to shut down the operating system. Shutting down the operating system safely closes all of the files and logs you out. If you turn off the workstation without shutting it down properly, files may be lost or damaged.
To shut down the system:
Choose “System Shutdown” from the System toolchest.
If the system administrator's account has a password, a form appears. Type the password, then press <Enter>.
If you do not know the password, you cannot shut down the system. Contact the Primary Administrator.
Click the Yes button on the notifier that appears to shut down the system.
The system sends a message to everyone who is logged in remotely to your workstation — that is, people who are sitting in front of their own workstation but accessing files on your workstation. The message tells people that the system is about to be shut down and that they will be logged out.
After a few seconds, you see this message on your workstation screen:
Okay to power off the system now.
Press any key to restart
Turn off the workstation using the power switch.