VMS Help  —  XAUTH  Generating Authorization Keys
    When the SECURITY extension is enabled on an X display server,
    you can generate additional authorization keys. Generated keys
    enable you to further manage server access and control the type
    of operations performed over the connection. For example, you
    can revoke a generated key at will, set it to expire after a
    certain time period, or use it to further grant or restrict the
    operations (at the X atom level) that can be performed over the
    connection.

    Use the XAUTH GENERATE command to produce a new authorization
    key. Note that the generated key overwrites any existing key for
    the current session. To preserve the existing key, specify an
    alternate X authority file on the XAUTH command line.

    For example, the following commands specify the alternate X
    authority file UNTRUSTED.DECW$XAUTH, generate and display a new
    key for the local display, and write the generated key to the
    alternate file:

    $  XAUTH -f UNTRUSTED.DECW$XAUTH
    Using authority file untrusted.decw$xauth

    xauth> LIST :0
    local/ZEPHYR:0  MIT-MAGIC-COOKIE-1  cfcc5ef98f9718f90154f355c0ae9f62

    xauth> GENERATE :0

    xauth> LIST :0
    local/ZEPHYR:0  MIT-MAGIC-COOKIE-1  cfcc4ff77f3709c46222c355f0ea1c93

    xauth> EXIT
    Writing X authority file untrusted.decw$xauth
Close Help