AIX® Version 6.1 Network Information Services (NIS and NIS+) Guide About This Book
Total Page:16
File Type:pdf, Size:1020Kb
AIX® Ver sion 6.1 Network Information Services (NIS and NIS+) Guide AIX® Ver sion 6.1 Network Information Services (NIS and NIS+) Guide Note Before using this information and the product it supports, read the information in Appendix C, “Notices,” on page 245. First Edition (November 2007) This edition applies to AIX Version 6.1 and to all subsequent releases and modifications until otherwise indicated in new editions. (c) Copyright AT&T, 1984, 1985, 1986, 1987, 1988, 1989. All rights reserved. Copyright Sun Microsystems, Inc. 1985, 1986, 1987, 1988, 1995. All rights reserved. The Network Information System (NIS) and NIS+ were developed by Sun Microsystems, Inc. This software and documentation is based in part on the Fourth Berkeley Software Distribution under license from The Regents of the University of California. We acknowledge the following institutions for their role in its development: the Electrical Engineering and Computer Sciences Department at the Berkeley Campus. Portion of the code and documentation described in this book were derived from code and documentation developed under the auspices of the Regents of the University of California and have been acquired and modified under the provisions that the following copyright notice and permission notice appear: Copyright Regents of the University of California, 1986, 1987. All rights reserved. Redistribution and use in source and binary forms are permitted provided that this notice is preserved and that due credit is given to the University of California at Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. This software is provided "as is" without express or implied warranty. Copyright TITN, Inc., 1984, 1989. All rights reserved. © Copyright IBM Corporation 1999, 2012. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About This Book.................................v Highlighting ...................................v Case-Sensitivity in AIX ...............................v ISO 9000 ....................................v Related Publications ................................v Chapter 1. Introduction to Name Services .......................1 Name Services Overview ..............................1 Domain Name System (DNS) Overview.........................2 Network Information Service (NIS) Overview .......................3 Network Information Service+ (NIS+) Overview ......................4 NIS and NIS+ Differences ..............................5 NIS+ Security Overview ..............................8 NIS-Compatibility Mode...............................8 Using NIS+ Commands...............................9 Chapter 2. Network Information Service .......................11 NIS Overview ..................................11 Components of NIS................................11 NIS Domain ..................................12 NIS Maps ...................................13 Maintaining Consistent System Information with NIS ...................15 NIS Installation and Configuration ..........................16 NIS Maintenance ................................27 NIS Automount .................................33 NIS Reference .................................37 Chapter 3. Moving from NIS to NIS+.........................39 Changes Required to Move to NIS+ .........................39 Suggested Transition Phases ............................39 Designing the NIS+ Namespace ...........................41 Planning NIS+ Security Measures ..........................51 Using NIS-Compatibility Mode ............................56 Prerequisites to Transition .............................60 Implementing the Transition.............................64 Chapter 4. NIS+ Namespace and Structure ......................69 NIS+ Files and Directories .............................69 NIS+ Namespace Structure .............................69 NIS+ Clients and Principals .............................73 Naming Conventions ...............................76 NIS_PATH Environment Variable ...........................81 NIS+ Tables and Information ............................82 Chapter 5. NIS+ Installation and Configuration ....................87 Setting Up NIS+ .................................87 Using NIS+ Setup Scripts .............................92 Setting Up the Root Domain ............................115 Setting Up NIS+ Servers .............................123 Setting Up NIS+ Tables ..............................127 Setting Up a Nonroot Domain ...........................136 Setting Up NIS+ Clients..............................140 © Copyright IBM Corp. 1999, 2012 iii Chapter 6. NIS+ Administration ..........................147 Administering NIS+ Credentials ...........................147 Administering NIS+ Keys .............................160 Administering NIS+ Access Rights ..........................164 Administering Passwords .............................178 Administering NIS+ Groups ............................184 Administering NIS+ Directories ...........................188 Administering NIS+ Tables.............................198 Removing NIS+.................................204 Chapter 7. NIS and NIS+ Troubleshooting ......................207 Troubleshooting NIS-Related Problems ........................207 Troubleshooting NIS+ Namespace Administration Problems ................211 Troubleshooting NIS+ Namespace Database Problems ..................213 Troubleshooting NIS Compatibility Problems ......................214 Troubleshooting Object Not Found Problems ......................215 Ownership and Permission Problems.........................216 Troubleshooting Security Problems .........................218 Troubleshooting Slow Performance and System Hang Problems...............223 Troubleshooting System Resource Problems ......................226 Troubleshooting User Problems ...........................227 Troubleshooting Other NIS+ Problems ........................228 Appendix A. Information in NIS+ Tables .......................231 Auto_Home Table ................................231 Auto_Master Table ...............................232 Bootparams Table ................................233 Client_info Table ................................233 Cred Table ..................................234 Ethers Table ..................................234 Group Table ..................................235 Hosts Table ..................................235 Mail_aliases Table................................235 Netgroup Table .................................236 Netmasks Table ................................237 Networks Table .................................237 Passwd Table .................................238 Protocols Table .................................238 RPC Table ..................................239 Services Table .................................239 Timezone Table.................................240 Appendix B. Migrating from NIS and NIS+ to RFC 2307-compliant LDAP services ......241 Considerations .................................241 Server Setup..................................241 Migrating Data to LDAP..............................241 Client Setup ..................................242 Netgroup Setup.................................243 Appendix C. Notices ..............................245 Trademarks ..................................246 Index ....................................247 iv AIX® Version 6.1 Network Information Services (NIS and NIS+) Guide About This Book This book provides system administrators with complete information about how to perform such tasks as configuring and managing NIS and NIS+. It includes information about the structure, installation, transition, security, troubleshooting, and differences and interoperability of NIS and NIS+. This publication is also available on the documentation CD that is shipped with the operating system. Highlighting The following highlighting conventions are used in this book: Bold Identifies commands, subroutines, keywords, files, structures, directories, and other items whose names are predefined by the system. Also identifies graphical objects such as buttons, labels, and icons that the user selects. Italics Identifies parameters whose actual names or values are to be supplied by the user. Monospace Identifies examples of specific data values, examples of text similar to what you might see displayed, examples of portions of program code similar to what you might write as a programmer, messages from the system, or information you should actually type. Case-Sensitivity in AIX® Everything in the AIX® operating system is case-sensitive, which means that it distinguishes between uppercase and lowercase letters. For example, you can use the ls command to list files. If you type LS, the system responds that the command is "not found." Likewise, FILEA, FiLea, and filea are three distinct file names, even if they reside in the same directory. To avoid causing undesirable actions to be performed, always ensure that you use the correct case. ISO 9000 ISO 9000 registered quality systems were used in the development and manufacturing of this product. Related Publications The following books contains information about or related to NIS and NIS+: v Networks and communication management v Operating system and device management v AIX Version 6.1 General Programming Concepts: Writing and Debugging Programs v AIX® Version 6.1 Commands Reference v Installation and migration v Security © Copyright