When the SECURITY extension is enabled on an X display server, you can generate additional authorization keys. Generated keys enable you to further manage server access and control the type of operations performed over the connection. For example, you can revoke a generated key at will, set it to expire after a certain time period, or use it to further grant or restrict the operations (at the X atom level) that can be performed over the connection. Use the XAUTH GENERATE command to produce a new authorization key. Note that the generated key overwrites any existing key for the current session. To preserve the existing key, specify an alternate X authority file on the XAUTH command line. For example, the following commands specify the alternate X authority file UNTRUSTED.DECW$XAUTH, generate and display a new key for the local display, and write the generated key to the alternate file: $ XAUTH -f UNTRUSTED.DECW$XAUTH Using authority file untrusted.decw$xauth xauth> LIST :0 local/ZEPHYR:0 MIT-MAGIC-COOKIE-1 cfcc5ef98f9718f90154f355c0ae9f62 xauth> GENERATE :0 xauth> LIST :0 local/ZEPHYR:0 MIT-MAGIC-COOKIE-1 cfcc4ff77f3709c46222c355f0ea1c93 xauth> EXIT Writing X authority file untrusted.decw$xauth