Paul Lussier wrote:

> Well, yes and no.  You don't want anyone to be able to 'ypcat shadow' for
> example, then you're right back to where we are now.  You need to be able to
> have clients authenticate against the shadow file somehow, so I suppose all
> authentication requests could be sent to the NIS server, which could then do
> the lookup, responding either yes or no.

http://www.linuxdoc.org/HOWTO/NIS-HOWTO-6.html#ss6.8

--
Bob Bell                Compaq Computer Corporation
Software Engineer       110 Spit Brook Rd - ZKO3-3U/14
TruCluster Group        Nashua, NH 03062-2698
[EMAIL PROTECTED]     603-884-0595




**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to