Additional Resources", Collapse section "3.6. shell is a command-line shell program that provides convenience and productivity features to help both new and advanced users of the AWS Command Line Interface. How can I view system users in Unix operating system using the command line option? There are several different authentication schemes that can be used on Linux systems. Configuring the Services", Collapse section "12.2. Installing the OpenLDAP Suite", Collapse section "20.1.2. This is better than using $USER, as $USER is just a regular environmental variable; it can be modified, unset, etc. The Built-in Backup Method", Collapse section "34.2.1. Configure the Firewall to Allow Incoming NTP Packets", Collapse section "22.14. Domain Options: Using IP Addresses in Certificate Subject Names (LDAP Only), 13.2.21. Enabling and Disabling a Service, 13.1.1. Please help Domain Options: Enabling Offline Authentication, 13.2.17. The kdump Crash Recovery Service", Collapse section "32. Configuring Connection Settings", Collapse section "10.3.9. As far as I can tell, your. Relax-and-Recover (ReaR)", Collapse section "34. Viewing and Managing Log Files", Collapse section "25. The most commonly used and standard scheme is to perform authentication against the /etc/passwd and /etc/shadow files. To learn more, see our tips on writing great answers. Understanding the ntpd Configuration File, 22.10. List Linux users with compgen A few tips about listing users in Linux List only the usernames Check if a username already exists in the system List all the connected users Static Routes Using the IP Command Arguments Format, 11.5.2. Configure Rate Limiting Access to an NTP Service, 22.16.5. Using the Kernel Dump Configuration Utility, 32.2.3. More generally, on Solaris, you'd want to modify your environment to put yourself in a POSIX environment (with something like PATH= getconf PATH` and be sure to run /usr/xpg4/bin/sh) to avoid being stuck with commands from the 70s/80s. It produces real-time displays of where any Satellite is, and predicts passes for your locale. Configuring Authentication", Expand section "13.1. Method 1 Finding Your Logs 1 Press Ctrl + Alt + T. This opens the shell prompt. VBURL="10.5.2.211" For more information, see the Antimalware protection extends from hypervisor to application. Running the Net-SNMP Daemon", Collapse section "24.6.2. The bug resides in the ClamAV Unix socket permitting any user to submit the "shutdown" command which will disable ClamAV. Securing Communication", Expand section "19.6. I've been doing Linux and AIX administration for years, but I'm very new to HPUX. There is no program supplied for reading it. An acpi shutdown can be caused by power button press, overheating or low battery (laptop). Creating SSH Certificates", Expand section "14.5. Basic Configuration of Rsyslog", Collapse section "25.3. Fixes #119. If Linux means anything, it means choice. Is there how to get a Windows user's full name on a Bash/Shell script file on Git Bash? The SP root password will be reset to the default changeme. I would like to know the commands which has same functionality as above for solaris ( .pkg) Additional Resources", Collapse section "D.3. Configuring ABRT", Expand section "28.5. Connecting to a VNC Server", Collapse section "15.3.2. Saving Settings to the Configuration Files, 7.5. command options that are specified and can include user, role, system login, UID. I need to extract the value 91 from this and use it in my script in an if condition. Monitoring and Automation", Collapse section "VII. Configuring a System to Authenticate Using OpenLDAP, 20.1.5.1. The additional benefit of the id command is that it also displays the uid of the user and gid of the groups. [10] TeamViewer is proprietary software, but does not require registration and is free of charge for non-commercial use. Establishing Connections", Collapse section "10.3. $ ldapsearch -x -b <search_base> -H <ldap_host> -D <bind_dn> -W Network Bridge with Bonded VLAN, 11.4. This was particularly helpful to me over whoami or $USER as I am using sudo to execute as another user, but want the original user not the sudo user. Using Key-Based Authentication", Expand section "14.3. Can I change the output format of the "last" command to display the year? RedHat EnterpriseLinux 6 provides you with the, To display detailed information about a single user, run the, Expand section "I. URL="www.google.com" Specifying the --output= COLUMNS option, where COLUMNS is a list of available output parameters, you can customize the output of the lslogins command. Displays the login status for the specified user. Additional Resources", Expand section "20.1.1. displayed. Note: The command luxadm probe can also be used to scan FC LUNs. This is a quick way to disable a password for an account. information about user accounts. Introduction to LDAP", Expand section "20.1.2. Additional Resources", Expand section "17.1. Using and Caching Credentials with SSSD", Expand section "13.2.2. Staging Ground Beta 1 Recap, and Reviewers needed for Beta 2, $user or $whoami not working in a bash shell script. The xorg.conf File", Collapse section "C.3.3. the permission flag would show the character "s", such as. It is not an answer to the question that was asked, it is an answer to a different question. NLWP means number of light-weight processes which is precisely the number of threads the process is currently using with Solaris as there is a one-to-one mapping between lwp and user threads. I should able to see only running daemons. Samba with CUPS Printing Support", Collapse section "21.1.10. 0 for root). Printer Configuration", Collapse section "21.3. id user_name The user name is optional and by default, it will show the information about your user account. Why are physically impossible and logically impossible concepts considered separate in terms of probability? hardware platform details, soalris, solaris, Solaris commands to retrieve chipset information, Retrieve information Text/Word from HTML code using awk/sed, Execute a C program and retrieve information, User cannot retrieve email once his /home directory was moved, how to retrieve only the Use% value from df command, A script pls( To retrieve database information). Managing Groups via Command-Line Tools", Expand section "3.6. Check status with 'showenvironment' on Service Processor. It is owned by user root and group shadow, and has 640 permissions. Weblogic Consultant, Login or Register to Ask a Question and Join Our Community, Login to Discuss or Reply to this Discussion in Our Community, All UNIX
Samba Server Types and the smb.conf File", Collapse section "21.1.6. University of Minnesota. Find centralized, trusted content and collaborate around the technologies you use most. For example, view the entire content of a log by using the 'cat' command. Network Interfaces", Expand section "11.1. [7] [8] It was first released in 2005, [9] and its functionality has expanded step by step. Interface Configuration Files", Collapse section "11.2. Basic System Configuration", Expand section "1. Plug in the system's power cord (s). The following table describes the commands that system administrators can use to obtain information about user accounts. [11] Thanks in advance If a law is new but its interpretation is vague, can the courts directly ask the drafters the intent and official interpretation of their law? But i dont know how to Hi, Configuring Alternative Authentication Features", Expand section "13.1.4. /etc/sysconfig/system-config-users, D.2. How do I get the directory where a Bash script is located from within the script itself? Selecting the Identity Store for Authentication, 13.1.2.1. Configuring the YABOOT Boot Loader, 31.2. Additional Resources", Collapse section "29.11. Viewing Memory Usage", Collapse section "24.3. Informational or Debugging Options, 19.3.4. Configuring a Multihomed DHCP Server", Collapse section "16.4. Filesystem 1K-blocks Used Available Use% Mounted on Resultant commit message in my personal gitlab looks like this:-. Can someone tell me the Solaris equivelant of aix command lsuser? All rights reserved. Process Directories", Collapse section "E.3.1. Using these commands to obtain user account information is Oracle Solaris also offers a nice tool called. List disk partitions in Linux using lsblk command. This PR includes an additional metasploit module that will disable ClamAV on Linux systems. du -k /home Email Program Classifications", Collapse section "19.2. URL_Address=`nslookup $URL|grep Address:|grep -v "#"|awk -F " " '{print $2}'|head -1` Configuring Connection Settings", Expand section "10.3.9.1. Configuring Symmetric Authentication Using a Key, 22.16.15. //NODECOLORCODE "Exon 1" "ENST00000595813" How do I get the current user's username in Bash? To get the current "logged in" user is just as simple, but it requires accessing different variables: $SUDO_UID and $SUDO_USER. Using Rsyslog Modules", Collapse section "25.7. Configuring the Internal Backup Method, 34.2.1.2. Migrating Old Authentication Information to LDAP Format, 21.1.2. Updating Packages with Software Update, 9.2.1. Solaris has two tables: an equivalent one, and one that is not quite equivalent. Kudos! 1. Viewing and Managing Log Files", Expand section "25.1. Is it possible to create a concave light? Hello, i need the user to be created like this Configuring OProfile", Expand section "29.2.2. awk it should be very simple to fullfill your requires. tail /var/adm/messages. /etc/shadow is a text file that contains information about the system's users' passwords. If you look under the Type column in the above output, it shows the type of the device i.e. Considering its significance, this article will explain multiple methods to find the last login on Linux: Method 1: last Command. How to redirect and append both standard output and standard error to a file with Bash, Looping through the content of a file in Bash, How to check if a variable is set in Bash, How to concatenate string variables in Bash, Styling contours by colour and by line thickness in QGIS. Just a quick note that $USER and whoami return different values if your running a command through ssh as another user. Delivering vs. Non-Delivering Recipes, 19.5.1.2. Reloading the Configuration and Zones, 17.2.5.2. i am using solaris 10, i am creating user with Establishing Connections", Expand section "10.3.9. Introduction to LDAP", Collapse section "20.1.1. Viewing Block Devices and File Systems, 24.4.7. What shouldn't I include in my username? Overview of Common LDAP Client Applications, 20.1.3.1. Solaris- Read command from user input I need to write a bourne shell script (solaris 10) that accepts input from the user. What can a lawyer do if the client wants him to be acquitted of everything despite serious evidence? id -u will return the user id (e.g. Files in the /etc/sysconfig/ Directory", Expand section "D.1.10. Many of your questions are quickly answered by either: to get the documentation for the system you are using or usually more conveniently: This may give different results for some things where Linux and Unix have modest differences. rev2023.3.3.43278. Why is this sentence from The Great Gatsby grammatical? Setting Module Parameters", Collapse section "31.6. The difference between the phonemes /p/ and /b/ in Japanese. Support, How to Enable Verified Boot on Legacy SPARC Systems and x86 Systems, How to Manage Certificates on Systems With Oracle ILOM Verified-Boot Support, How to Manually Verify the elfsign Signature, Initializing TPM on Oracle Solaris Systems, How to Check Whether the TPM Device Is Recognized by the Operating System, SPARC:How to Initialize TPM Using the Oracle ILOM Interface, How to Enable PKCS #11 Consumers to Use TPM as a Secure Keystore, Changing the Default Algorithm for Password Encryption, How to Specify an Algorithm for Password Encryption, How to Specify a New Password Algorithm for an NIS Domain, How to Specify a New Password Algorithm for an LDAP Domain, How to Monitor Who Is Using the su Command, How to Require a Password for SPARC Hardware Access, How to Retrieve IP MIB-II Information From a /dev/* Device, How to Authorize Users to Allocate a Device, How to View Allocation Information About a Device, How to Change Which Devices Can Be Allocated, Authorizations for the Allocation Commands, Device-Clean Scripts for Diskettes and CD-ROM Drives, How to Enable Virus Scanning on a File System. How will i do it Please advice. Copyright 2002, 2014, Oracle and/or its affiliates. Using Postfix with LDAP", Expand section "19.4. Browse other questions tagged, Where developers & technologists share private knowledge with coworkers, Reach developers & technologists worldwide. (current) UNIX password: New password: Retype new . Changing password for linuxtechi. One step, multinode compliance reporting means you can . Asking for help, clarification, or responding to other answers. For more information, see Using Your Assigned Additional Resources", Collapse section "B.5. Specific Kernel Module Capabilities", Collapse section "31.8. Changing the Global Configuration, 20.1.3.2. Adding an LPD/LPR Host or Printer, 21.3.8. On Linux- Someone already answered this in comments. Send a keystroke to an application without loosing focus, for example, I want to initiate a paste command (with Hi Securing Systems and Attached Devices in Oracle. Running the At Service", Collapse section "27.2.2. Consistent Network Device Naming", Collapse section "A. Configuring a DHCPv4 Server", Expand section "16.4. Editing the Configuration Files", Collapse section "18.1.5. What is a word for the arcane equivalent of a monastery? The input will be a command- any command like ls/ pwd/ mv etc. Postdoctoral Appointee - Quantum Information Theorist. Configuring LDAP Authentication, 13.1.2.3. and to extract, the command is In the NetBSD, FreeBSD, and OpenBSD login accounting systems, there is an equivalent table (albeit with a different structure and name), and (in the NetBSD and FreeBSD systems) a lastlogin command that dates from the middle 1990s. when I do a df -k for a particular mount i get the result like this Configuring TLS (Transport Layer Security) Settings, 10.3.9.1.2. Thw "w" command works the same and var=$SUDO_USER gets the real logged in user. For Bash, KornShell (ksh), sh, etc. Configure the Firewall Using the Command Line", Expand section "22.19. Displays the first value that is found for. Creating Domains: Primary Server and Backup Servers, 13.2.27. Specific Kernel Module Capabilities, 32.2.2. When root (sudo) permissions are required, which is usually 90%+ when using scripts, the methods in previous answers always give you root as the answer. Satscape is a freeware program for the PC Macintosh and Linux. /export/home/user (auto mount) The database can be the local /etc/passwd file, or a Libumem is a user-space port of the Solaris kernel memory . How do I check if a directory exists or not in a Bash shell script? Thanks for contributing an answer to Unix & Linux Stack Exchange! Running the Net-SNMP Daemon", Expand section "24.6.3. Domain Options: Using DNS Service Discovery, 13.2.19. 5 Configuring Installed Images. Retrieving Performance Data over SNMP, 24.6.4.3. Automating System Tasks", Collapse section "27.1. To change dhart's username to dbell . Example 1) Change System User's Password. Setting Module Parameters", Expand section "31.8. Enabling the mod_ssl Module", Expand section "18.1.10. Procmail Recipes", Collapse section "19.4.2. Editing Zone Files", Collapse section "17.2.2. Use the standard Unix/Linux/BSD/MacOS command logname to retrieve the logged in user. Registering the System and Managing Subscriptions", Expand section "7. To add the user "dhart" to the group "secteam" on the system, you could do this: $ sudo usermod -a -G secteam ghart. Additional Resources", Expand section "13. Integrating ReaR with Backup Software, 34.2.1.1. Using the New Configuration Format", Collapse section "25.4. Is there no bash builtin to get the username without invoking a separate process? Registering the System and Managing Subscriptions", Collapse section "6. Establishing an IP-over-InfiniBand (IPoIB) Connection, 10.3.9.1.1. I updated his account in /etc/passwd. Configuring an OpenLDAP Server", Expand section "20.1.4. Setting up the sssd.conf File", Collapse section "13.2.2. Adding an AppSocket/HP JetDirect printer, 21.3.6. The kdump Crash Recovery Service", Expand section "32.2. Configuring 802.1X Security", Collapse section "10.3.9.1. By clicking Accept all cookies, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. -l username Displays the login status for the specified user. In our example, we'll use the -m (mebibytes) option. Configuring a Samba Server", Expand section "21.1.6. The passwd files are the local source of password information. Creating a Backup Using the Internal Backup Method, B.4. 4 Updating or Upgrading an Oracle Solaris Image. Checking a Package's Signature", Expand section "B.5. Additional Resources", Collapse section "21.3.11. Distributing and Trusting SSH CA Public Keys, 14.3.5.1. Do new devs get fired if they can't solve a certain bug? Administrative Rights in, What's New in Securing Systems and Devices in Oracle Solaris 11.2, Algorithms Configuration in the policy.conf Running an OpenLDAP Server", Expand section "20.1.5. Configure Access Control to an NTP Service, 22.16.2. Managing Users via Command-Line Tools", Expand section "3.5. PID=$! Configuring the named Service", Expand section "17.2.2. 1 Answer Sorted by: 7 Just run prstat and have a look to the last column, labeled PROCESS/NLWP. Displaying information about supplementary groups and password expiration for all user accounts, Example3.17. Preserving Configuration File Changes, 8.1.4. List the idle user. Connecting to a Network Automatically, 10.3.1. Scripts that need to be run as sudo are more likely to be in that minority of scripts that have need of your login name rather than "root". Is there a proper earth ground point in this switch box? Configure the Firewall to Allow Incoming NTP Packets, 22.14.1. Mail Transport Agent (MTA) Configuration, 19.4.2.1. Establishing a Wired (Ethernet) Connection, 10.3.2. How do I get the current user's username in Bash? There is no direct equivalent to the Linux lastlog command, that is supplied with the operating system. If the FILE is not specified, use /var/run/utmp. Samba with CUPS Printing Support", Expand section "21.2.2. Seeding Users into the SSSD Cache During Kickstart, 14.1.4. Configuring kdump on the Command Line, 32.3.5. Why zero amount transaction outputs are kept in Bitcoin Core chainstate database? Starting and Stopping the At Service, 27.2.7. It also shows you the total amount of swap space configured, and how much is used and available. Stack Exchange network consists of 181 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers. Fixed a bug where user can't save lyrics for songs outside the library. To subscribe to this RSS feed, copy and paste this URL into your RSS reader. Informative, thorough, with extra comparative notes. Is there a single-word adjective for "having exceptionally strong moral principles"? useradd -d/home/user -m -s /bin/sh user Configuring Static Routes in ifcfg files", Collapse section "11.5. Keeping an old kernel version as the default, D.1.10.2. man page. Network Bridge", Expand section "11.5. Verifying the Boot Loader", Collapse section "30.6. It is beneficial to monitor the activity of the users, identify inactive users, or simply keep track of users' activity on the system. Could you provide an example? Samba Security Modes", Expand section "21.1.9. Using Fingerprint Authentication, 13.1.3.2. we can list or view the files using the command Configuring Static Routes in ifcfg files", Expand section "V. Infrastructure Services", Collapse section "V. Infrastructure Services", Expand section "12. Using the Command-Line Interface", Collapse section "28.4. Using the Service Configuration Utility", Collapse section "12.2.1. Using the chkconfig Utility", Collapse section "12.3. Allow tracking of ISS, Iridium flares, ham radio satellites, International Space Station, satellite passes prediction, orbits, auto updates and alerting. Here is a good script to find all the CPU, cores, virtual CPU (threads) Adding the script from the link would improve the answer. Access the MySQL server as root user by entering the following command in your terminal: sudo mysql --user=root mysql -p or: sudo mysql -u root -p The -p option is mandatory only if you have a predefined password for your root user. Automatic Bug Reporting Tool (ABRT)", Expand section "28.3. The group must already exist. Connecting to VNC Server Using SSH, 16.4. Expand Show Other Jobs. Controlling Access to At and Batch, 28.1. Calculating probabilities from d6 dice pool (Degenesis rules for botches and triggers). Adding, Enabling, and Disabling a Yum Repository, 8.4.8. ************** To learn more, see our tips on writing great answers. am able to get the last logged in date using the following command, Looking at the other post, it shows the user's login time using epoch time. Configuring a Multihomed DHCP Server, 17.2.2.4.2. Using and Caching Credentials with SSSD", Collapse section "13.2. Configuring the Firewall for VNC, 15.3.3. Editing Zone Files", Collapse section "17.2.2.4. Channel Bonding Interfaces", Collapse section "11.2.4. Thanks in Advance. Last Activity: 6 September 2018, 9:22 AM EDT. If that user hasn't logged in since the db has been rotated, you won't get any output. Separating Kernel and User-space Profiles, 29.5.2. Managing Users and Groups", Expand section "3.2. Deeps, Hello All, Using sadump on Fujitsu PRIMEQUEST systems", Expand section "34. In the Linux login accounting system there is a table that records the last login time of each user account, indexed by that account's user ID. Solaris is a Lending/Borrowing protocol that brings Flashloans to Solana blockchain (inspired by Aave and Compound) The project is a modification of the solana lending program. You can lock down systems and virtual machines, while Silicon Secured Memory seamlessly prevents common security attacks such as buffer over-reads and overwrites. Relax-and-Recover (ReaR)", Collapse section "34.1. Configuring the Red Hat Support Tool", Collapse section "7.4. Top-level Files within the proc File System", Expand section "E.3. In Linux for .rpm The last command, that other people are pointing to, is not particularly useful because it does not operate from either one. Does ZnSO4 + H2 at high pressure reverses to Zn + H2SO4? WINS (Windows Internet Name Server), 21.1.10. Can Martian regolith be easily melted with microwaves? Working with Modules", Expand section "18.1.8. Monitoring Performance with Net-SNMP, 24.6.4. The Computing Services department manages the University computer labs, develops and maintains the configurations of University owned laptop and desktop computers, performs maintenance and repairs on University owned software and hardware, deploys and maintains PC software site licenses, and provides general technical support for PCs at the University. Installing and Upgrading", Expand section "B.3. I need the equivalent command of linux lastlog in solaris, need to write a script to find the the users last login date and time in solaris servers. echo "Setting route for $URL for GPRS" How Intuit democratizes AI development across teams through reusability. Here is how you can list users and groups on Linux. List all the users on Linux 1. A common question that most beginner MySQL users ask is "How do I see all of the users in my MySQL server?" Most of them assume that there is a show users command in MySQL, but there isn't one.This is a common mistake because there are other MySQL commands for displaying information about the database. Viewing Memory Usage", Collapse section "24.2. Exciting upgrades await you in one of the most popular virtual tabletops. rm -rf /home/user1), what can I do? Desktop Environments and Window Managers", Expand section "C.3. Using a VNC Viewer", Expand section "15.3.2. Using Add/Remove Software", Collapse section "9.2. Managing the Time on Virtual Machines, 22.9. See Additional Net User Command Options below for a complete list of available options to be used at this point when executing net user. Configure the Firewall Using the Command Line, 22.14.2.1. gets you the regular user (if non-sudo) or the regular user behind the current sudo call. In both the Linux and BSD worlds, this table is updated by the same programs that write the login log table and the currently active logins table, two other tables in the login database. Configuring Authentication from the Command Line", Expand section "13.2. Services and Daemons", Expand section "12.2. Additional Resources", Expand section "25. Index. Setting Events to Monitor", Expand section "29.5. Introduction The netstat command is a CLI tool for net work stat istics. Configuring the Red Hat Support Tool, 7.4.1. Understanding the ntpd Sysconfig File, 22.11. Adding a Broadcast Client Address, 22.16.8. [FILE] Configuration Steps Required on a Dedicated System, 28.5.2. If you want to check the password expiration date for a specific user in Linux, use the following command: # chage -l daygeek Last password change : Feb 13, 2020 Password expires : May 13, 2020 Password inactive : never Account expires : never Minimum number of days between password change : 7 Maximum number of days between password change : 90 . Enabling the mod_nss Module", Collapse section "18.1.10. Any link to or advocacy of virus, spyware, malware, or phishing sites. 3 Installing and Updating Software Packages. Site design / logo 2023 Stack Exchange Inc; user contributions licensed under CC BY-SA. Just not sure how to Hi all Working with Queues in Rsyslog", Collapse section "25.5. Viewing System Processes", Collapse section "24.1. Packages and Package Groups", Collapse section "8.2. Running an OpenLDAP Server", Collapse section "20.1.4. Cron and Anacron", Expand section "27.1.2. Displaying Comprehensive User Information, 3.5. Managing Groups via the User Manager Application", Collapse section "3.3. File, Configuring Role-Based Access Control to Replace Superuser, Preventing Unintentional Misuse of System Resources, Using the Secure by Default Configuration, Authentication and Authorization for Remote Access, Chapter 2Protecting Oracle Solaris Systems Integrity, SPARC:How to Enable Verified Boot on SPARC Systems With Oracle ILOM Verified-Boot This file record the last date each user logged in and is created by the lastlogin script. Just not sure how to. Selecting the Printer Model and Finishing, 22.7. Extending Net-SNMP", Collapse section "24.6.5. In other words, the user you are authenticating with. Configuring PPP (Point-to-Point) Settings, 11.2.2. Managing Groups via the User Manager Application, 3.4. Thank you, I wish there would be more answers like this one. I tried last -1 USERID , if any user not logged in that server then there is no ouptut , the task is to find the users who not logged in server more that 90 days, a script should give the output as. Configure the Firewall for HTTP and HTTPS Using the Command Line", Expand section "19.1.1. Samba Daemons and Related Services, 21.1.6. Retrieving Performance Data over SNMP", Collapse section "24.6.4. / /etc/sysconfig/kernel", Expand section "D.3. Working with Transaction History", Expand section "8.4. However, there was (until the software died at Oracle) a third party lastlog program written by Richard Hamilton available. Using an Existing Key and Certificate, 18.1.12. KSH - Unix -AIX - db2 Oracle Solaris is engineered for cloud security at every level. Configuring NTP Using ntpd", Expand section "22.14. Desktop Environments and Window Managers", Collapse section "C.2. Generating a New Key and Certificate, 18.1.13. Common Sendmail Configuration Changes, 19.3.3.1. File and Print Servers", Expand section "21.1.3. Checking For and Updating Packages", Collapse section "8.1. Keyboard Configuration", Expand section "2. -name "abc.out" -print Mail Delivery Agents", Collapse section "19.4.