Sponsored Content
Full Discussion: Setting up NIS
Operating Systems Solaris Setting up NIS Post 41091 by meyersp on Monday 29th of September 2003 01:04:34 PM
Old 09-29-2003
ok here we go...

I started by setting the domain name on my server to test.com and creating the /etc/defaultdomain file. Then I created the /etc/nodename file containing the machine name unixnis.

I copied the folling files to a new directory call /nisfiles:
auto_master
auto_home
bootparams (created blank file)
ethers (created blank file)
group
hosts (added ip of client to be)
ipnodes
netgroup
netmask
networks
protocols
rpc
services
user_attr

These are the default file unless otherwise specified.

Next i copied passwd and shadow to /passfiles and then removed the line for root.

I then opened the /var/yp/makefile and changed the DIR value to /nisfiles and the PWDIR value to /passfiles.
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Solaris NIS+ and RedHat NIS+

Hello all, I'm not sure if this is the right forum, but I would like to know if Redhat running NIS ( not NIS +) would have conflict with Solaris running NIS+. Currently I am running NIS+ on Solaris but will be adding RedHat to the network. I seem to be unable to find and information regarding... (2 Replies)
Discussion started by: larry
2 Replies

2. IP Networking

differences nis nis+

Hello together. Is there someone who is able to explain me the differences between NIS and NIS+. thanks in advance joerg (2 Replies)
Discussion started by: joerg
2 Replies

3. UNIX for Dummies Questions & Answers

NIS map mail.aliases specified, but NIS not running

Hi all, I just took over the admin role from someone and I wanna setup sendmail (just to send mail from the host) however, after I config all the resolv.conf, nssitch.conf, hosts file and when I try to send a mail out, after I punched ctl-D, it returned he following, "NIS map mail.aliases... (2 Replies)
Discussion started by: stancwong
2 Replies

4. UNIX for Advanced & Expert Users

SUSE 9 and 10 NIS clients with RedHat 8.0 NIS server not working

We have a RedHat 8.0 NIS master, with a RedHat 8.0 NIS Slave. We also have a small number of SUSE 9.1 and SUSE 10 machines here for evaluation. However, no matter what i do, the SUSE machines will not talk to the NIS Servers. If i broadcast for NIS Servers for the specified NIS domain, it... (1 Reply)
Discussion started by: fishsponge
1 Replies

5. UNIX for Advanced & Expert Users

User Quota setting with NIS and NAS

Hi Guru, Need some advice on the PROs and CONs between setting up user quota with NAS and Nis. Thanks Regards. YLL (1 Reply)
Discussion started by: yll
1 Replies

6. Solaris

How to configure a NIS client bound to the NIS server in another subnet?

Hi, all. I have a Solaris client here needs to bind to NIS server in another subnet. Following is the configuration i made on the client, 1) edit /etc/inet/hosts to add an entry of the NIS server -- nserver01 2) execute `domainname` to set local NIS domain to the domain of the NIS server.... (1 Reply)
Discussion started by: sn_wukong
1 Replies

7. Shell Programming and Scripting

Validating that the NIS and NIS+ services are disabled

I'm creating a scrip for auditing our AIX box's to ensure that they are built according to our system standards. I'm not sure on the logic for checking to see if the NIS and NIS+ services are disabled. any idea's? (2 Replies)
Discussion started by: sport
2 Replies

8. Solaris

Problem while setting NIS master on Solaris 10

Hi All, I get below error while running cd /var/yp /usr/sbin/ypinit -m Error Code - 1 updated netmasks make : warning : target all not remade because of errors current working dir /var/yp *** error code 1 *** make : fatal error : command failed for target 'k' error running... (4 Replies)
Discussion started by: naw_deepak
4 Replies

9. Linux

NIS

Hi All, I have configured NIS server in linux rhel5 and made one client member to that server. nfs share created for users home directory i have created one nis user, user not able to change the passwd of his login. getting below mentioned error " yppasswdd not running on NIS master... (1 Reply)
Discussion started by: vinay_ks
1 Replies

10. Solaris

Is there a difference between setting a user as nologin and setting it as a role?

Trying to figure out the best method of security for oracle user accounts. In Solaris 10 they are set as regular users but have nologin set forcing the dev's to login as themselves and then su to the oracle users. In Solaris11 we have the option of making it a role because RBAC is enabled but... (1 Reply)
Discussion started by: os2mac
1 Replies
ldapaddent(1M)						  System Administration Commands					    ldapaddent(1M)

NAME
ldapaddent - create LDAP entries from corresponding /etc files SYNOPSIS
ldapaddent [-cpv] [-a authenticationMethod] [-b baseDN] -D bindDN -w bind_password [-f filename] database ldapaddent -d [-v] [-a authenticationMethod] [-b baseDN] [-D bindDN] [-w bind_password] database DESCRIPTION
ldapaddent creates entries in LDAP containers from their corresponding /etc files. This operation is customized for each of the standard containers that are used in the administration of Solaris systems. The database argument specifies the type of the data being processed. Legal values for this type are one of aliases, auto_*, bootparams, ethers, group, hosts (including both IPv4 and IPv6 addresses), ipnodes (alias for hosts), netgroup, netmasks, networks, passwd, shadow, protocols, publickey, rpc, and services. In addition to the preceding, the database argument can be one of the RBAC-related files (see rbac(5)): o /etc/user_attr o /etc/security/auth_attr o /etc/security/prof_attr o /etc/security/exec_attr By default, ldapaddent reads from the standard input and adds this data to the LDAP container associated with the database specified on the command line. An input file from which data can be read is specified using the -f option. The entries will be stored in the directory based on the client's configuration, thus the client must be configured to use LDAP naming ser- vices. The location where entries are to be written can be overridden by using the -b option. If the entry to be added exists in the directory, the command displays an error and exits, unless the -c option is used. Although, there is a shadow database type, there is no corresponding shadow container. Both the shadow and the passwd data is stored in the people container itself. Similarly, data from networks and netmasks databases are stored in the networks container. The user_attr and audit_user data is stored by default in the people container. The prof_attr and exec_attr data is stored by default in the SolarisProfAttr container. You must add entries from the passwd database before you attempt to add entries from the shadow database. The addition of a shadow entry that does not have a corresponding passwd entry will fail. The passwd database must precede both the user_attr and audit_user databases. For better performance, the recommended order in which the databases should be loaded is as follows: o passwd database followed by shadow database o networks database followed by netmasks database o bootparams database followed by ethers database Only the first entry of a given type that is encountered will be added to the LDAP server. The ldapaddent command skips any duplicate entries. OPTIONS
The ldapaddent command supports the following options: -a authenticationMethod Specify authentication method. The default value is what has been configured in the profile. The supported authentication methods are: simple sasl/CRAM-MD5 sasl/DIGEST-MD5 tls:simple tls:sasl/CRAM-MD5 tls:sasl/DIGEST-MD5 Selecting simple causes passwords to be sent over the network in clear text. Its use is strongly discouraged. Additionally, if the client is configured with a profile which uses no authentication, that is, either the credentialLevel attribute is set to anonymous or authenticationMethod is set to none, the user must use this option to provide an authentication method. -b baseDN Create entries in the baseDN directory. baseDN is not relative to the client's default search base, but rather. it is the actual loca- tion where the entries will be created. If this parameter is not specified, the first search descriptor defined for the service or the default container will be used. -c Continue adding entries to the directory even after an error. Entries will not be added if the directory server is not responding or if there is an authentication problem. -D bindDN Create an entry which has write permission to the baseDN. When used with -d option, this entry only needs read permission. -d Dump the LDAP container to the standard output in the appropriate format for the given database. -f filename Indicates input file to read in an /etc/ file format. -p Process the password field when loading password information from a file. By default, the password field is ignored because it is usu- ally not valid, as the actual password appears in a shadow file. -w bind_password Password to be used for authenticating the bindDN. If this parameter is missing, the command will prompt for a password. NULL passwords are not supported in LDAP. When you use -w bind_password to specify the password to be used for authentication, the password is visible to other users of the sys- tem by means of the ps command, in script files or in shell history. -v Verbose. OPERANDS
The following operands are supported: database The name of the database or service name. Supported values are: aliases, auto_*, bootparams, ethers, group, hosts (including IPv6 addresses), netgroup, netmasks, networks, passwd, shadow, protocols, publickey, rpc, and services. Also supported are auth_attr, prof_attr, exec_attr, and user_attr. EXAMPLES
Example 1: Adding Password Entries to the Directory Server The following example show how to add password entries to the directory server: example# ldapaddent -D "cn=directory manager" -w secret -f /etc/passwd passwd Example 2: Adding Group Entries The following example shows how to add group entries to the directory server using sasl/CRAM-MD5 as the authentication method: example# ldapaddent -D "cn=directory manager" -w secret -a "sasl/CRAM-MD5" -f /etc/group group Example 3: Adding auto_master Entries The following example shows how to add auto_master entries to the directory server: example# dapaddent -D "cn=directory manager" -w secret -f /etc/auto_master auto_master Example 4: Dumping password Entries from the Directory to File The following examples shows how to dump password entries from the directory to a file foo: example# ldapaddent -d passwd > foo EXIT STATUS
The following exit values are returned: 0 Successful completion. >0 An error occurred. FILES
/var/ldap/ldap_client_file /var/ldap/ldap_client_cred Files containing the LDAP configuration of the client. These files are not to be modified manually. Their content is not guaranteed to be human readable. Use ldapclient(1M) to update these files. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWnisu | +-----------------------------+-----------------------------+ |Interface Stability |Evolving | +-----------------------------+-----------------------------+ SEE ALSO
ldap(1), ldaplist(1), ldapmodify(1), ldapmodrdn(1), ldapsearch(1), idsconfig(1M), ldapclient(1M), suninstall(1M), attributes(5) System Administration Guide: Security Services SunOS 5.10 6 Jan 2004 ldapaddent(1M)
All times are GMT -4. The time now is 10:22 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy