11-02-2018
Hi Stellaman;
The group ID's are not so much of a problem - however it is best practice to keep them aligned as some users may depend on group permissions for access to files/programs.
If you check the /etc/group file on each of the system, you should be able to bring both accounts into alignment. This can be done in the same manner that you aligned the user ID's, but you should check the group memberships as unlike user ID's many users can be members of groups.
Regards
Gull04
7 More Discussions You Might Find Interesting
1. HP-UX
Im trying to simply share a directory on one unix server and mount that share on a different unix server.
There is no "share" command like on sun. What is the command to create a share on HP-UX? (2 Replies)
Discussion started by: bski
2 Replies
2. IP Networking
Sometimes you get the tiger...but sometimes he get you and this latest home network “project” of mine has gnawed on me pretty badly. Perhaps you can offer some technical help. It will be heartily appreciated.
I have a small home network initially comprising two computers running Windows... (1 Reply)
Discussion started by: Annatar
1 Replies
3. UNIX for Advanced & Expert Users
Hi,
Im running 32-bit solaris on sparc. We have a NAS(Network attached drive), with its IP address, username and password.
I'd like to be able to mount it on the solaris machine, and unmount it.
The best possibility would be able to mount it simulataneously on 2 or more systems.
Please... (9 Replies)
Discussion started by: 0ktalmagik
9 Replies
4. Solaris
How to move home directory of NIS user from one system to another system in Solaris.
Thanks & Regards
Durgaprasad (1 Reply)
Discussion started by: durgaprasadr13
1 Replies
5. UNIX for Dummies Questions & Answers
Hi,
I have two machines. M1 and M2 and having a generic id catadm, these two machines having common mount of /u/catadm directory.
with this setup, ssh autologin is failing for me and asking me to enter password when i try autologin using this generc id from M1 to M2
catadm-M1$ ssh... (3 Replies)
Discussion started by: rbalaj16
3 Replies
6. Solaris
Hi,
I recently added a disk on a solaris 9 and I wanted to make it accessible for another machine, using the same name
here is what i did :
On the machine holding the internal disk
in vfstab i added the line
/dev/dsk/c1t1d0s4 /dev/rdsk/c1t1d0s4 /SHARED2 ufs 2 yes ... (2 Replies)
Discussion started by: zionassedo
2 Replies
7. Solaris
Hi,
I am having some NFS directory consistency problems with the below setup on a local (192.) network:
1. Different permissions (chmod) for the same NFS dir are reflected on different clients.
2. (more serious) an NFS dir created on client1 cannot be accessed on client2; this applies to some... (10 Replies)
Discussion started by: cosmojetz
10 Replies
LEARN ABOUT CENTOS
pppd-radius
PPPD-RADIUS(8) System Manager's Manual PPPD-RADIUS(8)
NAME
radius.so - RADIUS authentication plugin for pppd(8)
SYNOPSIS
pppd [ options ] plugin radius.so
DESCRIPTION
The RADIUS plugin for pppd permits pppd to perform PAP, CHAP, MS-CHAP and MS-CHAPv2 authentication against a RADIUS server instead of the
usual /etc/ppp/pap-secrets and /etc/ppp/chap-secrets files.
The RADIUS plugin is built on a library called radiusclient which has its own configuration files (usually in /etc/radiusclient), consult
those files for more information on configuring the RADIUS plugin
OPTIONS
The RADIUS plugin introduces one additional pppd option:
radius-config-file filename
The file filename is taken as the radiusclient configuration file. If this option is not used, then the plugin uses
/etc/radiusclient/radiusclient.conf as the configuration file.
avpair attribute=value
Adds an Attribute-Value pair to be passed on to the RADIUS server on each request.
map-to-ifname
Sets Radius NAS-Port attribute to number equal to interface name (Default)
map-to-ttyname
Sets Radius NAS-Port attribute value via libradiusclient library
USAGE
To use the plugin, simply supply the plugin radius.so option to pppd, and edit /etc/radiusclient/radiusclient.conf appropriately. If you
use the RADIUS plugin, the normal pppd authentication schemes (login, checking the /etc/ppp/*-secrets files) are skipped. The RADIUS
server should assign an IP address to the peer using the RADIUS Framed-IP-Address attribute.
SEE ALSO
pppd(8) pppd-radattr(8)
AUTHOR
David F. Skoll <dfs@roaringpenguin.com>
PPPD-RADIUS(8)