When the SECURITY extension is enabled on an X display server,
you can generate additional authorization keys. Generated keys
enable you to further manage server access and control the type
of operations performed over the connection. For example, you
can revoke a generated key at will, set it to expire after a
certain time period, or use it to further grant or restrict the
operations (at the X atom level) that can be performed over the
connection.
Use the XAUTH GENERATE command to produce a new authorization
key. Note that the generated key overwrites any existing key for
the current session. To preserve the existing key, specify an
alternate X authority file on the XAUTH command line.
For example, the following commands specify the alternate X
authority file UNTRUSTED.DECW$XAUTH, generate and display a new
key for the local display, and write the generated key to the
alternate file:
$ XAUTH -f UNTRUSTED.DECW$XAUTH
Using authority file untrusted.decw$xauth
xauth> LIST :0
local/ZEPHYR:0 MIT-MAGIC-COOKIE-1 cfcc5ef98f9718f90154f355c0ae9f62
xauth> GENERATE :0
xauth> LIST :0
local/ZEPHYR:0 MIT-MAGIC-COOKIE-1 cfcc4ff77f3709c46222c355f0ea1c93
xauth> EXIT
Writing X authority file untrusted.decw$xauth