JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
System Administration Guide: Naming and Directory Services (NIS+)
search filter icon
search icon

Document Information

Preface

Part I About Naming and Directory Services

1.  Name Service Switch

Part II NIS+ Setup and Configuration

2.  NIS+: An Introduction

3.  NIS+ Setup Scripts

4.  Configuring NIS+ With Scripts

5.  Setting Up the NIS+ Root Domain

6.  Configuring NIS+ Clients

7.  Configuring NIS+ Servers

8.  Configuring an NIS+ Non-Root Domain

9.  Setting Up NIS+ Tables

Part III NIS+ Administration

10.  NIS+ Tables and Information

11.  NIS+ Security Overview

Solaris Security and NIS+

NIS+ Security Overview

NIS+ Principals

NIS+ Security Levels

NIS+ Security Levels and Password Commands

NIS+ Authentication and Credentials

NIS+ User and Machine Credentials

DES Credentials and LOCAL Credentials in NIS+

DES Credentials in NIS+

LOCAL Credentials in NIS+

NIS+ User Types and Credential Types

NIS+ Authorization and Access

NIS+ Authorization Classes

NIS+ Owner Class

NIS+ Group Class

NIS+ World Class

NIS+ Nobody Class

Authorization Classes and the NIS+ Object Hierarchy

NIS+ Access Rights

NIS+ Administrator

NIS+ Password, Credential, and Key Commands

12.  Administering NIS+ Credentials

13.  Administering NIS+ Keys

14.  Administering Enhanced NIS+ Security Credentials

15.  Administering NIS+ Access Rights

16.  Administering NIS+ Passwords

17.  Administering NIS+ Groups

18.  Administering NIS+ Directories

19.  Administering NIS+ Tables

20.  NIS+ Server Use Customization

21.  NIS+ Backup and Restore

22.  Removing NIS+

23.  Information in NIS+ Tables

24.  NIS+ Troubleshooting

A.  NIS+ Error Messages

About NIS+ Error Messages

Common NIS+ Namespace Error Messages

B.  Updates to NIS+ During the Solaris 10 Release

Solaris 10 and NIS+

Glossary

Index

Solaris Security and NIS+

In essence, Solaris security is provided by gates that users must pass through in order to enter the Solaris system, and permission matrixes that determine what they are able to do once inside. (See Figure 11-1 for a schematic representation of this system.)

Figure 11-1 Solaris Security Gates and Filters

Diagram shows relationship between Solaris security gates and filters

As you can see in the above figure, the overall system is composed of four gates and two permission matrixes: