| | | |
I |
|
| Illegal object type messages (NIS+) ( ) |
|
| impact |
| | gauging for NIS+ ( ) ( ) |
| | minimizing transition impact ( ) ( ) ( ) |
| | NIS+ security ( ) ( ) |
| | | on transition planning ( ) |
| | | on administrators ( ) ( ) ( ) |
| | | on users ( ) |
|
| implementing the transition ( ) |
| | overview ( ) ( ) |
| | phase I — NIS+ namespace setup ( ) ( ) |
| | phase II — connecting NIS+ namespace to other namespaces ( ) ( ) |
| | phase III — making NIS+ namespace operational ( ) ( ) |
| | phase IV — upgrading NIS-compatible domains ( ) ( ) |
|
| implicit naming system pointer ( ) |
|
| improvement programs ( ) |
|
| inactive accounts, locking passwords ( ) |
|
| indexed name ( ) |
|
| indexed names (NIS+ tables) ( ) |
|
| information management |
| | goal identification ( ) |
| | NIS and NIS+ differences ( ) |
|
| initial context ( ) |
|
| initial context function ( ) |
|
| input files ( ) |
|
| Insufficient permission messages (NIS+) ( ) ( ) |
|
| insufficient permission messages (NIS+) ( ) |
|
| Internet ( ) |
|
| Internet |
| | FNS, and ( ) |
| | root domains ( ) |
|
| Internet, NIS-compatibility mode connection ( ) |
|
| Internet address ( ) |
|
| Interoperability ( ) ( ) |
|
| Invalid principal name messages (NIS+) ( ) ( ) |
|
| IP ( ) |
|
| IP address ( ) |
|
| IP addresses |
| | IP addresses, updating ( ) |
| | updating ( ) ( ) |
|
| IPv6 |
| | enabling ( ) |
| | switch files, and ( ) |