Access provides a simple yet powerful method of controlling user access
to a system.  Simply specify access in place of a login shell in the
password file for each user who is to have restricted accessibility to
a system.  Access will in turn, execute the login shell specified in
its argument list if the current tty and time falls within one or more
of the access constraints given.

Accessibility constraints limit users by tty port and/or up to 6
accessibility classes of time.

One of the most valued uses of access is to reserve modem use for UUCP
or high priority users.  See the manual page for examples.

Be sure to disable users ability to change their login shell and
thereby defeat this control.  For example, "chmod o-x /usr/ucb/chsh".


     Copyright (c) 1988 by George M. Sipe.  All rights reserved.

This software may only be redistributed without fee and without any
other form of monetary gain (including sold, rented, leased, or
traded), unless the express written permission of the copyright holder
is obtained in advance.

This copyright notice must be reproduced in its entirety on all copies
of this software.  Further, acknowledgment of the authorship of this
software must not be removed from its current or derived
documentation.

No expressed or implied warranty is made for this software.  No party
connected with this software assumes any liability or responsibility
for its use, the correctness of its operation, or its fitness for any
purpose.

Any distributor of copies of this software shall grant the recipient
permission for further redistribution as permitted by this notice.

Permission is hereby granted to copy, reproduce, redistribute and
otherwise use this software as long as the conditions above are
strictly adhered to.
