A configuration file (/etc/nsswitch.conf) that defines the sources from which an naming client can obtain its network information.
A network service that handles machine, user, printer, domain, router, an other network names and addresses.
(1) A namespace stores information that users, workstations, and applications must have to communicate across the network.
(2) The set of all names in a naming system.
A number used by software to separate the local subnet address from the rest of a given Internet protocol address.
See Secure RPC password.
A distributed network information service containing key information about the systems and the users on the network. The NIS database is stored on the master server and all the replica or slave servers.
A file used by NIS that holds information of a particular type, for example, the password entries of all users on a network or the names of all host machines on a network. Programs that are part of the NIS service query these maps. See also NIS.
A distributed network information service containing hierarchical information about the systems and the users on the network. The NIS+ database is stored on the master server and all the replica servers.
A configuration of NIS+ that allows NIS clients to have access to the data stored in NIS+ tables. When in this mode, NIS+ servers can answer requests for information from both NIS and NIS+ clients.
See domain.
A client_info table or a client_info file. Preferred server lists specify the preferred servers for a client or domain.
The private component of a pair of mathematically generated numbers, which, when combined with a private key, generates the DES key. The DES key in turn is used to encode and decode information. The private key of the sender is only available to the owner of the key. Every user or machine has its own public and private key pair.
The public component of a pair of mathematically generated numbers, which, when combined with a private key, generates the DES key. The DES key in turn is used to encode and decode information. The public key is available to all users and machines. Every user or machine has their own public and private key pair.
See entry.
An easy and popular paradigm for implementing the client-server model of distributed computing. A request is sent to a remote system to execute a designated procedure, using arguments supplied, and the result is returned to the caller.
The process of converting workstation IP addresses to workstation names using the DNS software.
See domain.
The simple authentication and security layer. A framework for negotiating authentication and security layer semantics in application-layer protocols.
Password required by Secure RPC protocol. This password is used to encrypt the private key. This password should always be identical to the user's login password.
(1) In NIS+, NIS, DNS, and LDAP a host machine providing naming services to a network.
(2) In the client-server model for file systems, the server is a machine with computing resources (and is sometimes called the compute server), and large memory capacity. Client machines can remotely access and make use of these resources. In the client-server model for window systems, the server is a process that provides windowing services to an application, or "client process." In this model, the client and the server can run on the same machine or on separate machines.
(3) A daemon that actually handles the providing of files.
See preferred server list.
(1) A server system that maintains a copy of the NIS database. It has a disk and a complete copy of the operating environment.
(2) Slave servers are called replica servers in NIS+.