Article 4WA2K nis and kerberos

nis and kerberos

by
DenisAndreevich
from LinuxQuestions.org on (#4WA2K)
Hello everyone Tell me, do I understand correctly that these two protocols are used mainly for user authentication on the network? Are there any tricks (in particular for nis) that could, for example, help to spread the rules of contacting the repository for updates, or for example, after successful authentication, some file was copied to the user's home folder (for example, a directory with phone numbers of internal employees)?latest?d=yIl2AUoC8zA latest?i=YZUOKKro9z8:5Der2g8xLwI:F7zBnMy latest?i=YZUOKKro9z8:5Der2g8xLwI:V_sGLiP latest?d=qj6IDK7rITs latest?i=YZUOKKro9z8:5Der2g8xLwI:gIN9vFwYZUOKKro9z8
External Content
Source RSS or Atom Feed
Feed Location https://feeds.feedburner.com/linuxquestions/latest
Feed Title LinuxQuestions.org
Feed Link https://www.linuxquestions.org/questions/
Reply 0 comments