Sponsored Content
Full Discussion: installing solaris securely
Operating Systems Solaris installing solaris securely Post 302195254 by liven on Wednesday 14th of May 2008 03:32:18 PM
Old 05-14-2008
Well I mean commands.

Bash is not installed (not the end of the world, but I prefer it for my shell).

But darn near every other command/tool I would normally use is absent.

I finally got some things installed from sun freeware so that is a start.

Just trying to figure out what is the best set of options to pick during installation.

thanks
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Installing Solaris 8

I'm new to Unix, and Installed Solaris 8 (IA) for the first time with the end user software group, I got the login screen at startup. When I re-installed it with the Full Distribution plus OEM support it bypasses the login screen and logs me as superuser (root). Is this normal? Thanks in... (3 Replies)
Discussion started by: tdrivas
3 Replies

2. Solaris

Installing Solaris 10

Hi All, Il jump straight in.. Iv been asked to install Sun Solaris 10 for a friend and Il be honest.. Iv never installed one before.. Iv looked at some documentation on installing but nbothing to represent my problem.. I downloaded the Solaris 10 Software from sun.com on 5 cd`s.. burnt them... (3 Replies)
Discussion started by: cjdude
3 Replies

3. UNIX for Advanced & Expert Users

Linux w/ local admin mounting nfs drives securely?

Got a situation where some people in the network using Linux would like local admin rights. People have admin rights in Windows and the Linux users want more flexibility. They need to be able to mount some nfs drives. If they have local admin rights, even with root squash set for the nfs... (5 Replies)
Discussion started by: Frostybeard
5 Replies

4. Solaris

How to securely invoke a Solaris privildged command (root) remotely?

Hi, What I would like to do "securely" is the following. From one central server invoke a script that does the following. --Store user/name passwords. (password possibly encrypted in config file) --From the central server invoke a privileged command (i.e. route add) on multiple... (1 Reply)
Discussion started by: topstuff
1 Replies

5. UNIX for Dummies Questions & Answers

How files can be transferred from one system to another securely using Linux?

i need to know how files can be transfered from one system to another securely in linux. (9 Replies)
Discussion started by: bibing
9 Replies

6. Solaris

Re-installing Solaris

I am a Windows admin but we require the use of at least one SUN for an application that cannot be installed on Windows. We've had two SUN Netra X1 boxes for some time that have seen some use, but I'm told the newest version of the application cannot be installed on the version of Solaris that is... (12 Replies)
Discussion started by: tawnos42
12 Replies

7. Solaris

Installing Solaris 8 bootblock without Solaris Install CD

Hello everyone, Background: I'm having an issue with booting a clone of hard drive with Solaris 8 installation. For cloning process I have used g4l, running under click'n'clone option. As far as I know the actual operation ran behind g4l's interface was dd, though I do not have any information... (12 Replies)
Discussion started by: johnny994
12 Replies

8. Solaris

Installing Solaris

Hello ladies and gentlemen I had a notebook 250 GB for windows 7, 250 GB for slackware, by the live dvd slaris i installed solaris in partition of windows, instalation ok, when i restart, i can not access menu bios or menu boot, and my notebook don't boot any dvd ,.. any help what i can do,... (7 Replies)
Discussion started by: gitac
7 Replies

9. Shell Programming and Scripting

How to store the passwords securely and use in scripts?

I want to store the passwords in a global file, so that all the users will not use them to login but a process should use it. One way is to keep the passwords in a .ini file and execute the file in the start of the script and use that variable. But with this, one can echo the variable in the... (15 Replies)
Discussion started by: karumudi7
15 Replies
KRB5-CONFIG(1)							   MIT Kerberos 						    KRB5-CONFIG(1)

NAME
krb5-config - tool for linking against MIT Kerberos libraries SYNOPSIS
krb5-config [--help | --all | --version | --vendor | --prefix | --exec-prefix | --defccname | --defktname | --defcktname | --cflags | --libs [libraries]] DESCRIPTION
krb5-config tells the application programmer what flags to use to compile and link programs against the installed Kerberos libraries. OPTIONS
--help prints a usage message. This is the default behavior when no options are specified. --all prints the version, vendor, prefix, and exec-prefix. --version prints the version number of the Kerberos installation. --vendor prints the name of the vendor of the Kerberos installation. --prefix prints the prefix for which the Kerberos installation was built. --exec-prefix prints the prefix for executables for which the Kerberos installation was built. --defccname prints the built-in default credentials cache location. --defktname prints the built-in default keytab location. --defcktname prints the built-in default client (initiator) keytab location. --cflags prints the compilation flags used to build the Kerberos installation. --libs [library] prints the compiler options needed to link against library. Allowed values for library are: +------------+------------------------------------------------+ |krb5 | Kerberos 5 applications (default) | +------------+------------------------------------------------+ |gssapi | GSSAPI applications with Kerberos 5 bindings | +------------+------------------------------------------------+ |kadm-client | Kadmin client | +------------+------------------------------------------------+ |kadm-server | Kadmin server | +------------+------------------------------------------------+ |kdb | Applications that access the Kerberos database | +------------+------------------------------------------------+ EXAMPLES
krb5-config is particularly useful for compiling against a Kerberos installation that was installed in a non-standard location. For exam- ple, a Kerberos installation that is installed in /opt/krb5/ but uses libraries in /usr/local/lib/ for text localization would produce the following output: shell% krb5-config --libs krb5 -L/opt/krb5/lib -Wl,-rpath -Wl,/opt/krb5/lib -L/usr/local/lib -lkrb5 -lk5crypto -lcom_err SEE ALSO
kerberos(1), cc(1) AUTHOR
MIT COPYRIGHT
1985-2013, MIT 1.11.3 KRB5-CONFIG(1)
All times are GMT -4. The time now is 03:10 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy