Documentation Home
> Solaris Naming Administration Guide
Solaris Naming Administration Guide
Book Information
Preface
Part I Introduction to Solaris Naming
Chapter 1 Introduction to Name Services
What Is a Name Service?
Solaris Name Services
DNS
/etc Files
NIS
NIS+
FNS
Chapter 2 The Name Service Switch
About the Name Service Switch
Format of the nsswitch.conf File
Search Criteria
Switch Status Messages
Switch Action Options
Default Search Criteria
What if the Syntax is Wrong?
Auto_home and Auto_master
Timezone and the Switch File
Comments in nsswitch.conf Files
Keyserver and publickey Entry in the Switch File
The nsswitch.conf Template Files
The Default Switch Template Files
Default nsswitch.conf File
DNS and Internet Access
DNS Forwarding for NIS+ Clients
DNS Forwarding for NIS Clients
Adding Compatibility With +/- Syntax
The Switch File and Password Information
FNS and the Name Service Switch
Maintaining Consistency Between FNS and the Switch File
Namespace Updates
Part II NIS+ Introduction and Overview
Chapter 3 Introduction to NIS+
About NIS+
What NIS+ Can Do for You
How NIS+ Differs From NIS
NIS+ Security
NIS+ and the Name Service Switch
Solaris 1.x Releases and NIS-Compatibility Mode
NIS+ Administration Commands
NIS+ API
Chapter 4 The NIS+ Namespace
NIS+ Files and Directories
Structure of the NIS+ Namespace
Directories
Domains
Servers
How Servers Propagate Changes
NIS+ Clients and Principals
Principal
Client
The Cold-Start File and Directory Cache
An NIS+ Server Is Also a Client
Naming Conventions
NIS+ Domain Names
Directory Object Names
Tables and Group Names
Table Entry Names
Host Names
NIS+ Principal Names
Accepted Name Symbols
NIS+ Name Expansion
NIS_PATH Environment Variable
Chapter 5 NIS+ Tables and Information
NIS+ Table Structure
Columns and Entries
Search Paths
Ways to Set Up Tables
How Tables Are Updated
Chapter 6 Security Overview
Solaris Security--Overview
NIS+ Security--Overview
NIS+ Principals
NIS+ Security Levels
Security Levels and Password Commands
NIS+ Authentication and Credentials--Introduction
User and Machine Credentials
DES versus LOCAL Credentials
DES Credentials
LOCAL Credentials
User Types and Credential Types
NIS+ Authorization and Access--Introduction
Authorization Classes
The Owner Class
The Group Class
The World Class
The Nobody Class
Authorization Classes and the NIS+ Object Hierarchy
NIS+ Access Rights
The NIS+ Administrator
NIS+ Password, Credential, and Key Commands
Part III Administering NIS+
Chapter 7 Administering NIS+ Credentials
NIS+ Credentials
How Credentials Work
Credential versus Credential Information
Authentication Components
How Principals are Authenticated
Credentials Preparation Phase
Login Phase--Detailed Description
Request Phase--Detailed Description
The DES Credential in Detail
DES Credential Secure RPC Netname
DES Credential Verification Field
How the DES Credential Is Generated
Secure RPC Password versus Login Password Problem
Cached Public Keys Problems
Where Credential-Related Information Is Stored
The cred Table in Detail
Creating Credential Information
The nisaddcred Command
Related Commands
How nisaddcred Creates Credential Information
LOCAL Credential Information
DES Credential Information
The Secure RPC Netname and NIS+ Principal Name
Creating Credential Information for the Administrator
Creating Credential Information for NIS+ Principals
For User Principals--Example
Using a Dummy Password and chkey--Example
Creating in Another Domain--Example
For Workstations--Example
Administering NIS+ Credential Information
Updating Your Own Credential Information
Removing Credential Information
Chapter 8 Administering NIS+ Keys
NIS+ Keys
Keylogin
Changing Keys for an NIS+ Principal
Changing the Keys
Changing Root Keys From Root
Changing Root Keys From Another Machine
Changing the Keys of a Root Replica from the Replica
Changing the Keys of a Nonroot Server
Updating Public Keys
The nisupdkeys Command
Updating Public Keys Arguments and Examples
Updating IP Addresses
Updating Client Key Information
Globally Updating Client Key Information
Chapter 9 Administering Enhanced Security Credentials
Diffie-Hellman Extended Key
Transitioning to a New Public Key-based Security Mechanism
Configuring NIS+ Security Mechanisms
Creating New Security Mechanism Credentials
New Security Mechanism Credentials -Example
Adding New Keys to NIS+ Directory Objects
Adding New Public Keys to NIS+ Directory objects--Example
Configuring NIS+ Servers to Accept New Security Mechanism Credentials
Configuring NIS+ Servers to Accept New Security Mechanism Credentials--Example
Configuring Workstations to Use New Security Mechanism Credentials
Configuring Workstations to Use New Security Mechanism Credentials--Examples
Manually Refresh Directory Objects--ExampleNETNAMER
Changing the Password Protecting New Credentials
Change Password Protecting New Credentials--Example
Configuring Servers to Accept only New Security Mechanism Credentials
Configuring Servers to Accept only New Security Mechanism Credentials--Example
Removing Old Credentials from the cred Table
Removing old Credentials from the cred Table--Example
Chapter 10 Administering NIS+ Access Rights
NIS+ Access Rights
Introduction to Authorization and Access Rights
Authorization Classes--Review
Access Rights--Review
Concatenation of Access Rights
How Access Rights Are Assigned and Changed
Specifying Different Default Rights
Changing Access Rights to an Existing Object
Table, Column, and Entry Security
Table, Column, Entry Example
Rights at Different Levels
Read Rights
Create Rights
Modify Rights
Destroy Rights
Where Access Rights Are Stored
Viewing an NIS+ Object's Access Rights
Default Access Rights
How a Server Grants Access Rights to Tables
Specifying Access Rights in Commands
Syntax for Access Rights
Class, Operator, and Rights Syntax
Syntax for Owner and Group
Syntax for Objects and Table Entries
Displaying NIS+ Defaults--The nisdefaults Command
Setting Default Security Values
Displaying the Value of NIS_DEFAULTS
Changing Defaults
Resetting the Value of NIS_DEFAULTS
Specifying Nondefault Security Values at Creation Time
Changing Object and Entry Access Rights
Using nischmod to Add Rights
Using nischmod to Remove Rights
Specifying Column Access Rights
Setting Column Rights When Creating a Table
Adding Rights to an Existing Table Column
Removing Rights to a Table Column
Changing Ownership of Objects and Entries
Changing Object Owner With nischown
Changing Table Entry Owner With nischown
Changing an Object or Entry's Group
Changing an Object's Group With nischgrp
Changing a Table Entry's Group With nischgrp
Chapter 11 Administering Passwords
Using Passwords
Logging In
The Login incorrect Message
The password expired Message
The will expire Message
The Permission denied Message
Changing Your Password
Password Change Failures
Choosing a Password
Password Requirements
Bad Choices for Passwords
Good Choices for Passwords
Administering Passwords
nsswitch.conf File Requirements
The nispasswd Command
The yppasswd Command
The passwd Command
passwd and the nsswitch.conf File
The passwd -r Option
The passwd Command and "NIS+ Environment"
The passwd Command and Credentials
The passwd Command and Permissions
The passwd Command and Keys
The passwd Command and Other Domains
The nistbladm Command
nistbladm and Shadow Column Fields
nistbladm And the Number of Days
Related Commands
Displaying Password Information
Changing Passwords
Changing Your Own Password
Changing Someone Else's Password
Changing Root's Password
Locking a Password
Unlocking a Password
Managing Password Aging
Forcing Users to Change Passwords
Setting a Password Age Limit
Setting Minimum Password Life
Establishing a Warning Period
Turning Off Password Aging
Password Privilege Expiration
Password Aging versus Expiration
Setting an Expiration Date
Turning Off Password Privilege Expiration
Specifying Maximum Number of Inactive Days
Specifying Password Criteria and Defaults
The /etc/defaults/passwd File
Maximum weeks
Minimum Weeks
Warning Weeks
Minimum Password Length
Password Failure Limits
Maximum Number of Tries
Maximum Login Time Period
Chapter 12 Administering NIS+ Groups
Solaris Groups
NIS+ Groups
Related Commands
NIS+ Group Member Types
Member Types
Nonmember Types
Group Syntax
Using niscat With NIS+ Groups
Listing the Object Properties of a Group
The nisgrpadm Command
Creating an NIS+ Group
Deleting an NIS+ Group
Adding Members to an NIS+ Group
Listing the Members of an NIS+ Group
Removing Members From an NIS+ Group
Testing for Membership in an NIS+ Group
Chapter 13 Administering NIS+ Directories
NIS+ Directories
Using the niscat Command With Directories
Listing the Object Properties of a Directory
The nisls Commandniscat Command With Directories
Listing the Contents of a Directory--Terse
Listing the Contents of a Directory--Verbose
The nismkdir Command
Creating a Directory
Adding a Replica to an Existing Directory
The nisrmdir Command
Removing a Directory
Disassociating a Replica From a Directory
The nisrm Command
Removing Nondirectory Objects
The rpc.nisd Command
Starting a NIS-Compatible Daemon
Starting a DNS-Forwarding NIS-Compatible Daemon
Stopping the NIS+ Daemon
The nisinit Command
Initializing a Client
Initializing the Root Master Server
The nis_cachemgr Command
Starting and Stopping the Cache Manager
The nisshowcache Command
Displaying the Contents of the NIS+ Cache
Pinging and Checkpointing
The nisping Command
Displaying When Replicas Were Last Updated
Forcing a Ping
Checkpointing a Directory
The nislog Command
Displaying the Contents of the Transaction Log
The nischttl Command
Changing the Time-to-Live of an Object
Changing the Time-to-Live of a Table Entry
Chapter 14 Administering NIS+ Tables
NIS+ Tables
The nistbladm Command
nistbladm Syntax Summary
nistbladm and Column Values
nistbladm, Searchable Columns, and Keysnistbladm and Column Values
nistbladm and Indexed Names
nistbladm and Groups
Creating a New Table
Specifying Table Columns
Creating Additional Automount Table
Deleting a Table
Adding Entries to a Table
Adding a Table Entry With the -a Option
Adding a Table Entry With the -A Option
Modifying Table Entries
Editing a Table Entry With the -e Option
Editing a Table Entry With the -E Option
Removing Table Entries
Removing Single Table Entries
Removing Multiple Entries From a Table
The niscat Command
Syntax
Displaying the Contents of a Table
Displaying the Object Properties of a Table or Entry
The nismatch and nisgrep Commands
About Regular Expressions
Syntax
Searching the First Column
Searching a Particular Column
Searching Multiple Columns
The nisln Command
Syntax
Creating a Link
The nissetup Command
Expanding a Directory Into an NIS+ Domain
Expanding a Directory Into an NIS-Compatible Domain
The nisaddent Command
Syntax
Loading Information From a File
Loading Data From an NIS Map
Dumping the Contents of an NIS+ Table to a File
Chapter 15 Server-Use Customization
NIS+ Servers and Clients
Default Client Search Behavior
Designating Preferred Servers
NIS+ Over Wide Area Networks
Optimizing Server-Use--Overview
nis_cachemgr is Required
Global Table or Local File
Preference Rank Numbers
Default Server Preferences
Efficiency and Server Preference Numbers
Preferred Only Servers Versus All Servers
Viewing Preferences
Server and Client Names
Server Preferences
When Server Preferences Take Effect
Using the nisprefadm Command
Viewing Current Server Preferences
How to View Preferences for a Machine
How to View Global Preferences for Single Machine
How to View Global Preferences for a Subnet
How to Specify Preference Rank Numbers
Specifying Global Server Preferences
How to Set Global Preferences for a Subnet
How to Set Global Preferences for an Individual Machine
How to Set Global Preferences for a Remote Domain
Specifying Local Server Preferences
How to Set Preferences on a Local Machine
Modifying Server Preferences
How to Change a Server's Preference Number
How to Replace One Server With Another in a Preference List
How to Remove Servers From Preference Lists
How to Replace an Entire Preferred Server List
Specifying Preferred-Only Servers
How to Specify Preferred-Only Servers
How to Revert to Using Non-Preferred Servers
Ending Use of Server Preferences
How to Eliminate Global Server Preferences
How to Eliminate Local Server Preferences
How to Switch from Local to Global Subnet Preferences
How to Switch from Local to Machine-Specific Global Preferences
How to Stop a Machine from Using Any Server Preferences
Putting Server Preferences Into Immediate Effect
How to Immediately Implement Preference Changes
Chapter 16 NIS+ Backup and Restore
Backing Up Your Namespace With nisbackup
nisbackup Syntax
What nisbackup Backs Up
The Backup Target Directory
Maintaining a Chronological Sequence of NIS+ Backups
Backing Up Specific NIS Directories
Backing Up an Entire NIS+ Namespace
Backup Directory Structure
Backup Files
Restoring Your NIS+ Namespace With nisrestore
Prerequisites to Running nisrestore
nisrestore Syntax
Using nisrestore
Using Backup/Restore to Set Up Replicas
Replacing Server Machines
Machine Replacement Requirements
How to Replace Server Machines
Chapter 17 Removing NIS+
Removing NIS+ From a Client Machine
Removing NIS+ That Was Installed Using nisclient
Removing NIS+ That Was Installed Using NIS+ Commands
Removing NIS+ From a Server
Removing the NIS+ Namespace
Part IV Administering NIS
Chapter 18 Network Information Service (NIS)
NIS Introduction
NIS Architecture
NIS and NIS+
NIS and FNS
NIS Machine Types
NIS Servers
NIS Clients
NIS Elements
The NIS Domain
NIS Daemons
NIS Utilities
NIS Maps
NIS Maps Overview
Default NIS Maps
Using NIS Maps
NIS Map Nicknames
Summary of NIS-Related Commands
NIS Binding
Server-List Mode
Broadcast Mode
Differences Between This and Earlier NIS Versions
NSKit Discontinued
The ypupdated Daemon
/var/yp/securenets
Multihomed Machine Support
Sun Operating Environment 4.X Compatibility Mode
Using the Name Service Switch
Chapter 19 Administering NIS
Password Files and Namespace Security
Administering NIS Users
Adding a New User to an NIS Domain
User Passwords
Netgroups
Working With NIS Maps
Obtaining Map Information
Changing a Map's Master Server
Modifying Configuration Files
Modifying and Using the Makefile
Adding Makefile Entries
Deleting Makefile Entries
Changing Makefile Macros/Variables
Updating Existing Maps
Modifying Default Maps
Modifying Nondefault Maps
Using makedbm to Modify a Non-Default Map
Creating New Maps
Creating Maps From Text Files
Adding Entries to a File-Based Map
Creating Maps From Standard Input
Modifying Maps Made From Standard Input
Propagating an NIS Map
Using cron For Map Transfers
Using Shell Scripts with cron and ypxfr
Directly Invoking ypxfr
Logging ypxfr Activity
Adding a New Slave Server
Using NIS with C2 Security
Changing a Machine's NIS Domain
Using NIS in Conjunction With DNS
Problems in Mixed NIS Domains
Turning Off NIS Services
NIS Problem Solving and Error Messages
Part V Administering FNS
Chapter 20 FNS Quickstart
Federated Naming Service (FNS)
X/Open Federated Naming (XFN)
Why FNS?
Composite Names and Contexts
Composite Names
Contexts
Attributes
Enterprise Naming Services
NIS+
NIS
NIS Clients Can Update Contexts With FNS if SKI is Running
Files-Based
Global Naming Services
FNS Naming Policies
Organization Names
Site Names
User Names
Host Names
Service Names
File Names
Getting Started
Designating a Non-Default Naming Service
Creating the FNS Namespace
NIS+ Considerations
NIS+ Domains and Subdomains
Space and Performance Considerations
NIS+ Security Requirements
NIS Considerations
Files Considerations
Browsing the FNS Namespace
Listing Context Contents
Displaying the Bindings of a Composite Name
Showing the Attributes of a Composite Name
Searching for FNS Information
Updating the Namespace
FNS Administration Privileges
Binding a Reference to a Composite Name
Removing Bindings
Creating New Contexts
Creating File Contexts
Creating Printer Contexts
Destroying Contexts
Working With Attributes
Federating a Global Namespace
Copying and Converting FNS Contexts
Namespace Browser Programming Examples
Listing Names Bound in a Context
Creating a Binding
Listing and Working Wtih Object Attributes
Listing an Object's Attributes
Adding, Deleting, and Modifying an Object's Attributes
Searching for Objects in a Context
Chapter 21 Federated Naming Overview
XFN and FNS
The XFN Model
XFN Architectural Model
Atomic Names
References
Contexts
Attributes
Compound Names
Composite Names
FNS Namespaces
XFN Links
Initial Context
User's View
File System View
Application View
API Usage Model
Federated Naming Service
FNS and Application Development
FNS and Composite Names
FNS Policy Principles
FNS in the Solaris Environment
Solaris Enterprise-Level Naming Services
FNS and NIS+ Naming
FNS and NIS Naming
NIS Clients Can Update Contexts With FNS if SKI is Running
FNS and Files-Based Naming
Global Naming Services
FNS and DNS
FNS and X.500
FNS and Applications
FNS File Naming
FNS Printer Naming
FNS Application Support
Administering FNS
Troubleshooting and Error Messages
Chapter 22 FNS Policies
Introduction to FNS and XFN Policies
What FNS Policies Specify
What FNS Policies Do Not Specify
Policies for the Enterprise Namespace
Default FNS Enterprise Namespaces
Enterprise Namespace Identifiers
Component Separators
Default FNS Namespaces
Organizational Unit Namespace
NIS+ Environment
NIS Environment
Files-Based Environment
Site Namespace
Host Namespace
User Namespace
File Namespace
Service Namespace
Service Name and Reference Registration
Printer Namespace
Significance of Trailing Slash
FNS Reserved Names
Composite Name Examples
Composing Names Relative to Organizations
Composing Names Relative to Users
Composing Names Relative to Hosts
Composing Names Relative to Sites
Composing Names Relative to Services and Files
Structure of the Enterprise Namespace
Enterprise Root
Using Three Dots to Identify the Enterprise Root
Using org// to Identify the Enterprise Root
Enterprise Root Subordinate Contexts
Enterprise Root and Organizational Subunits
Enterprise Root and Sites
Enterprise Root and Users
Enterprise Root and Hosts
Enterprise Root and Services
Enterprise Root and Files
Enterprise Root and Printers
Initial Context Bindings for Naming Within the Enterprise
User-related Bindings
myself
myorgunit
myens
Host-related Bindings
thishost
thisorgunit
thisens
"Shorthand" Bindings
user
host
org
site
FNS and Enterprise Level Naming
How FNS Policies Relate to NIS+
NIS+ Domains and FNS Organizational Units
Trailing Dot in Organization Names
NIS+ Hosts and FNS Hosts
NIS+ Users and FNS Users
NIS+ Security and FNS
How FNS Policies Relate to NIS
How FNS Policies Relate to Files-Based Naming
Target Client Applications of FNS Policies
Example Applications: Calendar Service
FNS File System Namespace
NFS File Servers
The Automounter
The FNS Printer Namespace
Policies for the Global Namespace
Initial Context Bindings for Global Naming
Federating DNS
Federating X.500/LDAP
Chapter 23 FNS and Enterprise Name Services
FNS and Enterprise-Level Naming Services
Choosing an Enterprise-Level Name Service
FNS and Naming Service Consistency
FNS and Solstice AdminSuite
Checking Naming Inconsistencies
Selecting a Naming Service
Default Naming Service
When NIS+ and NIS Coexist
Advanced FNS and NIS+ Issues
Migrating to NIS+ From NIS or Files-Based Naming
Mapping FNS Contexts to NIS+ Objects
Browsing FNS Structures Using NIS+ Commands
Checking Access Control
Advanced FNS and NIS Issues
NIS and FNS Maps and Makefiles
Large FNS Contexts
Printer Backward Compatibility
Migrating From NIS to NIS+
Advanced FNS and File-Based Naming Issues
FNS Files
Migrating From Files-Based Naming to NIS or NIS+
Printer Backward Compatibility
Chapter 24 Enterprise Level Contexts
Creating Enterprise Level Contexts
Creating an Organization Context
Organization Context NIS+ Example
All Hosts Context
Single Host Context
Host Aliases
All-Users Context
Single User Context
Service Context
Printer Context
Generic Context
Site Context
File Context
Namespace Identifier Context
Administering Enterprise Level Contexts
Displaying the Binding
Listing the Context
Binding a Composite Name to a Reference
Binding an Existing Name to a New Name
Constructing a Reference on the Command Line
Removing a Composite Name
Renaming an Existing Binding
Destroying a Context
Chapter 25 Administering File Contexts
File Contexts Administration
Creating a File Context With fncreate_fs
Creating File Contexts With an Input File
Creating File Contexts With Command-line Input
Advanced Input Formats
Multiple Mount Locations
Variable Substitution
Backward Compatibility Input Format
Chapter 26 FNS and Global Naming Systems
FNS and Global Naming Systems
Obtaining the Root Reference
NIS+ Root Reference
NIS Root Reference
Federating Under DNS
Federating Under X.500/LDAP
Specifying an X.500 Root Reference
Specifying an X.500 Client API
Chapter 27 Administering FNS Attributes
Attributes Overview
Examining Attributes
Searching for Objects Associated With an Attribute
Customizing Attribute Searches
Updating Attributes
Adding an Attribute
Deleting an Attribute
Listing an Attribute
Modifying an Attribute
Other Options
Part VI Administering DNS
Chapter 28 Introduction to DNS
DNS Basics
Name-to-Address Resolution
DNS Administrative Domains
in.named and DNS Name Servers
DNS Clients and the Resolver
Introducing the DNS Namespace
DNS Namespace Hierarchy
DNS Hierarchy in a Local Domain
DNS Hierarchy and the Internet
Joining the Internet
Domain Names
Fully-Qualified Domain Names
Zones
Reverse Mapping
The in-addr.arpa Domain
DNS Servers
Master Servers
Primary Master Server
Secondary Master Server
Caching and Cache-only Servers
Root Domain Name Server
Internet Root Domain Server
Non-Internet Root Domain Server
How DNS Affects Mail Delivery
DNS Configuration and Data Files
Names of DNS Data Files
The named.conf File
named.conf Statements
Migration from BIND 4.9.x to BIND 8.1.x
The named.ca File
The hosts File
The hosts.rev File
The named.local File
$INCLUDE Files
Data File Resource Record Format
Standard Resource Record Format
The name Field
The ttl Field
The class Field
The record-type Field
The record-specific-data Field
Special Resource Record Characters
Control Entries
$INCLUDE
$ORIGIN()
Resource Record Types
SOA-- Start of Authority
name
class
SOA
origin
person-in-charge
serial
refresh
retry
expire
ttl
NS--Name Server
A--Address
HINFO--Host Information
WKS--Well-Known Services
CNAME--Canonical Name
PTR--Pointer Record
MX--Mail Exchanger
Solaris DNS BIND Implementation
Chapter 29 Administering DNS
Trailing Dots in Domain Names
Modifying DNS Data Files
Changing the SOA Serial Number
Forcing in.named to Reload DNS Data
Adding and Deleting Machines
Adding a Machine
Removing a Machine
Adding Additional DNS Servers
Creating DNS Subdomains
Planning Your Subdomains
Setting Up a Subdomain
DNS Error Messages and Problem Solving
Part VII Appendices
Appendix A Problems and Solutions
Troubleshooting NIS+
NIS+ De-Bugging Options
NIS+ Administration Problems
Illegal Object Problems
nisinit Fails
Checkpoint Keeps Failing
Cannot Add User to a Group
Logs Grow too Large
Lack of Disk Space
Cannot Truncate Transaction Log File
Domain Name Confusion
Cannot Delete org_dir or groups_dir
Removal or Disassociation of NIS+ Directory from Replica Fails
NIS+ Database Problems
Multiple rpc.nisd Parent Processes
rpc.nisd Fails
NIS+ and NIS Compatibility Problems
User Cannot Log In After Password Change
nsswitch.conf File Fails to Perform Correctly
NIS+ Object Not Found Problems
Syntax or Spelling Error
Incorrect Path
Domain Levels Not Correctly Specified
Object Does Not Exist
Lagging or Out-of-Sync Replica
Files Missing or Corrupt
Old /var/nis Filenames
Blanks in Name
Cannot Use Automounter
Links To of From Table Entries Do Not Work
NIS+ Ownership and Permission Problems
No Permission
No Credentials
Server Running at Security Level 0
User Login Same as Machine Name
Bad Credentials
NIS+ Security Problems
Security Problem Symptoms
Login Incorrect Message
Password Locked, Expired, or Terminated
Stale and Outdated Credential Information
Storing and Updating Credential Information
Updating Stale Cached Keys
Corrupted Credentials
Keyserv Failure
Machine Previously Was an NIS+ Client
No Entry in the cred Table
Changed Domain Name
When Changing a Machine to a Different Domain
NIS+ and Login Passwords in /etc/passwd File
Secure RPC Password and Login Passwords Are Different
Preexisting /etc/.rootkey File
Root Password Change Causes Problem
NIS+ Performance and System Hang Problems
Performance Problem Symptoms
Checkpointing
Variable NIS_PATH
Table Paths
Too Many Replicas
Recursive Groups
Large NIS+ Database Logs at Start-up
The Master rpc.nisd Daemon Died
No nis_cachemgr
Server Very Slow at Start-up After NIS+ Installation
niscat Returns: Server busy. Try Again
NIS+ Queries Hang After Changing Host Name
NIS+ System Resource Problems
Resource Problem Symptoms
Insufficient Memory
Insufficient Disk Space
Insufficient Processes
NIS+ User Problems
User Problem Symptoms
User Cannot Log In
User Cannot Log In Using New Password
User Cannot Remote Log In to Remote Domain
User Cannot Change Password
Other NIS+ Problems
How to Tell if NIS+ Is Running
Replica Update Failure
NIS Problems and Solutions
Symptoms:
NIS Problems Affecting One Client
ypbind Not Running on Client
Missing or Incorrect Domain Name
Client Not Bound to Server
No Server Available
ypwhich Displays Are Inconsistent
When Server Binding is Not Possible
ypbind Crashes
NIS Problems Affecting Many Clients
Network or Servers are Overloaded
Server Malfunction
NIS Daemons Not Running
Servers Have Different Versions of an NIS Map
Logging ypxfr Output
Check the crontab File and ypxfr Shell Script
Check the ypservers Map
Work Around
ypserv Crashes
DNS Problems and Solutions
Clients Can Find Machine by Name but Server Cannot
Changes Do Not Take Effect or Are Erratic
DNS Client Cannot Lookup "Short" Names
Reverse Domain Data Not Correctly Transferred to Secondary
Server Failed and Zone Expired Problems
rlogin, rsh, and ftp Problems
Other DNS Syntax Errors
FNS Problems and Solutions
Cannot Obtain Initial Context
Nothing in Initial Context
"No Permission" Messages (FNS)
fnlist Does not List Suborganizations
Cannot Create Host- or User-related Contexts
Cannot Remove a Context You Created
Name in Use with fnunbind
Name in Use with fnbind/fncreate -s
fndestroy/fnunbind Does Not Return Operation Failed
Appendix B Error Messages
About Error Messages
Error Message Context
Context-Sensitive Meanings
How Error Messages Are Alphabetized
Numbers in Error Messages
FNS Error Messages
Common Namespace Error Messages
Appendix C Information in NIS+ Tables
NIS+ Tables
NIS+ Tables and Other Name Services
NIS+ Table Input File Format
auto_home Table
auto_master Table
bootparams Table
client_info Table
cred Table
ethers Table
group Table
hosts Table
mail_aliases Table
netgroup Table
netmasks Table
networks Table
passwd Table
protocols Table
rpc Table
services Table
timezone Table
Appendix D FNS Reference Formats and Syntax
DNS Text Record Format for XFN References
X.500 Attribute Syntax for XFN References
Object Classes
Glossary
Index
Numbers and Symbols
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
X
Y
Z
© 2010, Oracle Corporation and/or its affiliates