Download Managing NFS and NIS by Mike Eisler, Ricardo Labiaga, Hal Stern PDF

By Mike Eisler, Ricardo Labiaga, Hal Stern

Cross-platform dossier sharing less than community dossier procedure (NFS) is so trustworthy that during so much enterprises, it really works pretty well unattended. Ditto for the listing prone that community info process (NIS) offers. dealing with NFS and NIS is for those that need to know extra approximately how NFS and NIS do their very important paintings, and the way to lead them to function in strange conditions. all in favour of the Solaris and Linux implementations of NFS and NIS, this booklet is perfect for the Unix method administrator who is acquainted with TCP/IP networking and daily approach management. the second one variation of this booklet gets rid of a lot of the programming fabric that seemed in its predecessor and replaces it with info on NFS three, its help of IPsec and Kerberos safety, and its operation below Solaris 8.This is a blue O'Reilly booklet, packed to the gunwales with details of curiosity to humans in a rush to optimize their platforms and get to the bottom of problems. it is easy to find the passage you wish through the index or throughout the desk of contents, and such a lot entries offer a very good mixture of how-to fabric (in the shape of input-and-output listings) and explanatory textual content (expert observation, frequently with notes on acceptable variations). If there is a command, choice, or configuration parameter linked to NIS or NFS, you will find documentation of it the following.

Show description

Read Online or Download Managing NFS and NIS PDF

Similar unix books

Command Line Kung Fu: Bash Scripting Tricks, Linux Shell Programming Tips, and Bash One-Liners

Turn into a Linux Ninja with Command Line Kung Fu! Do you're thinking that you want to lock your self in a basement studying cryptic guy pages for months on lead to order to have ninja like command line talents? in fact, in the event you had an individual percentage their strongest command line information, methods, and styles you'd shop your self loads of time and frustration.

GCC.The complete reference

This is often the definitive connection with the GCC open-source compiler. Get up to date details at the most recent features--including compiling Java code, development functions utilizing a number of languages, utilizing the debugger, linking, libraries, and masses extra.

DB2 9 for Linux, UNIX, and Windows : DBA guide, reference, and exam prep

DB2® nine builds at the world's #1 firm database to simplify the supply of knowledge as a provider, speed up improvement, and dramatically enhance operational potency, defense, and resiliency. Now, this new version bargains entire, start-to-finish assurance of DB2 nine management and improvement for Linux®, UNIX®, and home windows® structures, in addition to authoritative training for the most recent IBM DB2 certification examination.

Additional info for Managing NFS and NIS

Example text

These files are read first, and if an appropriate entry isn't found in the local file, the corresponding NIS map is consulted. For example, when a user logs in, an NIS client will first look up the user's login name in the local passwd file; if it does not find anything that matches, it will refer to the NIS passwd map. Although the replaced files aren't consulted once NIS is running, they shouldn't be deleted. In particular, the /etc/hosts file is used by an NIS client during the boot process, before it starts NIS, but is ignored as soon as NIS is running.

Solaris 8 includes a fully integrated LDAP client, but no server. Moreover, LDAP is more complex to administer than other directory services. NIS is perhaps the easiest to administer, but it is also the most limited. It is, however, the universal directory for Unix systems. 29 Managing NFS and NIS DNS is the standard for hostnames and addresses, and you'll find it handy for accessing hosts outside your domain. NIS+ has gained some acceptance among other non-Solaris Unix operating systems, including HP's HP-UX, IBM, AIX, and Linux.

It's also important to realize that nicknames are recognized by only two NIS utilities: ypmatch and ypcat. byname map. On the master NIS server, this map is not based on any single source file, but instead is derived from information in the group, password, and hosts files, via /var/yp/Makefile. It contains one entry for each user in the password file. The data associated with the username is a list of every group to which the user belongs. The netid is used to determine group memberships quickly when 42 Managing NFS and NIS a user logs in.

Download PDF sample

Rated 4.05 of 5 – based on 11 votes