Paul Lussier wrote:
> Well, yes and no. You don't want anyone to be able to 'ypcat shadow' for
> example, then you're right back to where we are now. You need to be able to
> have clients authenticate against the shadow file somehow, so I suppose all
> authentication requests could be sent to the NIS server, which could then do
> the lookup, responding either yes or no.
http://www.linuxdoc.org/HOWTO/NIS-HOWTO-6.html#ss6.8
--
Bob Bell Compaq Computer Corporation
Software Engineer 110 Spit Brook Rd - ZKO3-3U/14
TruCluster Group Nashua, NH 03062-2698
[EMAIL PROTECTED] 603-884-0595
**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************