1
.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.38.2.
2
.TH VERSION "1" "July 2011" "version x.xx" "User Commands"
4
version \- Eucalyptus tool:
6
.B euare-userlistmfadevices
10
\fB\-h\fR, \fB\-\-help\fR
11
show this help message and exit
13
\fB\-u\fR USER_NAME, \fB\-\-user\-name\fR=\fIUSER_NAME\fR
14
Name of the User whose MFA devices you want to list.
16
\fB\-m\fR MARKER, \fB\-\-marker\fR=\fIMARKER\fR
17
Use this only when paginating results, and only in a
19
subsequent request after you've received a response
20
where the results are truncated. Set it to the value
21
of the Marker element in the response you just
24
\fB\-\-max\-items\fR=\fIMAX_ITEMS\fR
25
Use this only when paginating results to indicate the
27
maximum number of keys you want in the response. If
28
there are additional keys beyond the maximum you
29
specify, the IsTruncated response element is true.
33
\fB\-D\fR, \fB\-\-debug\fR
34
Turn on all debugging output
37
Enable interactive debugger on error
39
\fB\-U\fR URL, \fB\-\-url\fR=\fIURL\fR
40
Override service URL with value provided
42
\fB\-\-region\fR=\fIREGION\fR
43
Name of the region to connect to
45
\fB\-I\fR ACCESS_KEY_ID, \fB\-\-access\-key\-id\fR=\fIACCESS_KEY_ID\fR
46
Override access key value
48
\fB\-S\fR SECRET_KEY, \fB\-\-secret\-key\fR=\fISECRET_KEY\fR
49
Override secret key value
52
Display version string