Documentation Home
>
NIS+ Transition Guide
>
Index
> K
NIS+ Transition Guide
Previous
: I
Next
: L
K
key-value tables
(
)
(
)
keylogin command
need for
(
)
root key creation
(
)
keylogout security compromises
(
)
(
)
keys
public key updates
(
)
root
creating
(
)
deleting
(
)
root key
(
)
secret user keys
(
)
Previous
: I
Next
: L
© 2010, Oracle Corporation and/or its affiliates