Sets the server's security level to 0, which is required at this point for bootstrapping.
Because no cred table exists yet, no NIS+ principals can have credentials. If you use a higher security level, you are locked out of the server.
Supports DNS forwarding
Starts the NIS+ daemon in NIS-compatibility mode
Become superuser or assume an equivalent role.
Roles contain authorizations and privileged commands. For more information about roles, see Chapter 9, Using Role-Based Access Control (Tasks), in System Administration Guide: Security Services.
Stop the NIS+ service.
# svcadm disable network/rpc/nisplus:default
Open the /lib/svc/method/nisplus file.
Use your preferred text editor.
Edit the file to add the desired options.
/usr/sbin/rpc.nisd $nisd_flags || exit $?
/usr/sbin/rpc.nisd $nisd_flags -Y -B || exit $?
In this example, the -Y and -B options are added to rpc.nisd, so the options are automatically implemented at startup.
Save and quit.
Start the NIS+ service.
# svcadm enable network/rpc/nisplus:default