Copyright Digital Equipment Corp. All rights reserved.

Generating_Authorization_Keys

   When the SECURITY extension is enabled on an X display server,
   you can generate additional authorization keys. Generated keys
   enable you to further manage server access and control the type
   of operations performed over the connection. For example, you
   can revoke a generated key at will, set it to expire after a
   certain time period, or use it to further grant or restrict the
   operations (at the X atom level) that can be performed over the
   connection.

   Use the XAUTH GENERATE command to produce a new authorization
   key. Note that the generated key overwrites any existing key for
   the current session. To preserve the existing key, specify an
   alternate X authority file on the XAUTH command line.

   For example, the following commands specify the alternate X
   authority file UNTRUSTED.DECW$XAUTH, generate and display a new
   key for the local display, and write the generated key to the
   alternate file:

   $  XAUTH -f UNTRUSTED.DECW$XAUTH
   Using authority file untrusted.decw$xauth

   xauth> LIST :0
   local/ZEPHYR:0  MIT-MAGIC-COOKIE-1  cfcc5ef98f9718f90154f355c0ae9f62

   xauth> GENERATE :0

   xauth> LIST :0
   local/ZEPHYR:0  MIT-MAGIC-COOKIE-1  cfcc4ff77f3709c46222c355f0ea1c93

   xauth> EXIT
   Writing X authority file untrusted.decw$xauth