Sun Microsystems, Inc.
spacerspacer
spacer www.sun.com docs.sun.com |
spacer
black dot
 
 
23.  Information in NIS+ Tables netgroup Table  Previous   Contents   Next 
   
 

A missing field indicates a wildcard. For example, the netgroup specification shown below includes all machines and users in all domains:

everybody ( , , )

A dash in a field is the opposite of a wildcard; it indicates that no machines or users belong to the group. Here are two examples:

(host1, -,doc.com.) (-,joe,doc.com.)

The first specification includes one machine, host1, in the doc.com. domain, but excludes all users. The second specification includes one user in the doc.com. domain, but excludes all machines.

netmasks Table

The netmasks table contains the network masks used to implement standard Internet subnetting. The table has three columns:

Table 23-10 netmasks Table

Column

Description

Addr

The IP number of the network

Mask

The network mask to use on the network

Comment

An optional comment about the entry

For network numbers, you can use the conventional IP dot notation used by machine addresses, but leave zeros in place of the machine addresses. For example, this entry

128.32.0.0 255.255.255.0

means that class B network 128.32.0.0 should have 24 bits in its subnet field, and 8 bits in its host field.

networks Table

The networks table lists the networks of the Internet. This table is normally created from the official network table maintained at the Network Information Control Center (NIC), though you might need to add your local networks to it. It has four columns:

Table 23-11 networks Table

Column

Description

Cname

The official name of the network, supplied by the Internet

Addr

The official IP number of the network

Name

An unofficial name for the network

Comment

An optional comment about the entry

passwd Table

The passwd table contains information about the accounts of users in a domain. These users generally are, but do not have to be, NIS+ principals. Remember though, that if they are NIS+ principals, their credentials are not stored here, but in the domain's cred table. The passwd table usually grants read permission to the world (or to nobody).


Note - The passwd table should not have an entry for the user root (user ID 0). Root's password information should be stored and maintained in the machine's /etc files.


The information in the passwd table is added when users' accounts are created.

The passwd table contains the following columns:

Table 23-12 passwd Table

Column

Description

Name

The user's login name, which is assigned when the user's account is created; the name can contain no uppercase characters and can have a maximum of eight characters

Passwd

The user's encrypted password

UID

The user's numerical ID, assigned when the user's account is created

GID

The numerical ID of the user's default group

GCOS

The user's real name plus information that the user wishes to include in the From: field of a mail-message heading; an "&" in this column simply uses the user's login name

Home

The path name of the user's home directory.

Shell

The user's initial shell program; the default is the Bourne shell: /usr/bin/sh.

Shadow

(See Table 23-13.)

The passwd table shadow column stores restricted information about user accounts. It includes the following information:

Table 23-13 passwd Table Shadow Column

Item

Description

Lastchg

The number of days between January 1, 1970, and the date the password was last modified

Min

The minimum number of days recommended between password changes

Max

The maximum number of days that the password is valid

Warn

The number of days' warning a user receives before being notified that his or her password has expired

Inactive

The number of days of inactivity allowed for the user

Expire

An absolute date past which the user's account is no longer valid

Flag

Reserved for future use: currently set to 0.

Earlier Solaris releases used a +/- syntax in local /etc/passwd files to incorporate or overwrite entries in the NIS password maps. Since the Solaris Release 2x environment uses the name service switch file to specify a machine's sources of information, this is no longer necessary. All you have to do in Solaris Release 2x systems is edit a client's /etc/nsswitch.conf file to specify files, followed by nisplus as the sources for the passwd information. This effectively adds the contents of the passwd table to the contents of the /etc/passwd file.

However, if you still want to use the +/- method, edit the client's nsswitch.conf file to add compat as the passwd source if you are using NIS. If you are using NIS+, add passwd_compat: nisplus.

protocols Table

The protocols table lists the protocols used by the Internet. It has four columns:

Table 23-14 protocols Table

Column

Description

Cname

The protocol name

Name

An unofficial alias used to identify the protocol

Number

The number of the protocol

Comments

Comments about the protocol

rpc Table

The rpc table lists the names of RPC programs. It has four columns:

Table 23-15 rpc Table

Column

Description

Cname

The name of the program

Name

Other names that can be used to invoke the program

Number

The program number

Comments

Comments about the RPC program

Here is an example of an input file for the rpc table:

#
# rpc file
#
rpcbind	00000	portmap	sunrpc	portmapper
rusersd	100002	rusers
nfs	100003	nfsprog
mountd	100005	mount	showmount
walld	100008	rwall	shutdown
sprayd	100012	spray
llockmgr	100020
nlockmgr	100021
status	100024
bootparam	100026
keyserv	100029	keyserver
nisd	100300	rpc.nisd
#

services Table

The services table stores information about the Internet services available on the Internet. It has five columns:

Table 23-16 services Table

Column

Description

Cname

The official Internet name of the service

Name

The list of alternate names by which the service can be requested

Proto

The protocol through which the service is provided (for instance, 512/tcp)

Port

The port number

Comment

Comments about the service

timezone Table

The timezone table lists the default timezone of every machine in the domain. The default time zone is used during installation but can be overridden by the installer. The table has three columns:

Table 23-17 timezone Table

Field

Description

Name

The name of the domain

Tzone

The name of the time zone (for example, US/Pacific)

Comment

Comments about the time zone

 
 
 
  Previous   Contents   Next