Solved

NIS vs NIS+

Posted on 1997-05-22
1
471 Views
Last Modified: 2013-12-23
I am concerned with the security between NIS and NIS+ or (NYS).  I would like to know the specifics of what NIS+ was able to accomplish and why was it needed in the first place.  The more specific the better; i.e. why are tables more secure than maps?  
0
Comment
Question by:aaronc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 5

Accepted Solution

by:
n0thing earned 200 total points
ID: 1582089
Hi,

Here's a little description. It is however far from complete and
way too long to be well explained here.

A major change between NIS and NIS+ is the extensive security built around NIS+. By default, it uses Secure RPC, with data encryption standards (DES) encryption and Diffie-Hellmann key exchange for authentication. And it does extensive authorization checks before allowing any NIS+ operation. This procedure      ensures that when NIS+ is set up and used as recommended, it is a secure environment.

The use of table instead of maps gives you more control over who
can/can't access specific data. You could grant access per table, per column within the table, which you cannot do with maps and thus more secure. Another reason is the transfer of information
between NIS server/zones. Only needed data are to be sent, new
table, column instead of the whole map.

Hope it clears up some of your concerns. For more information,
please buy the book NIS from O'reilly, one of the best book on
the topic.

Regards,
n0thing

0

Featured Post

Creating Instructional Tutorials  

For Any Use & On Any Platform

Contextual Guidance at the moment of need helps your employees/users adopt software o& achieve even the most complex tasks instantly. Boost knowledge retention, software adoption & employee engagement with easy solution.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Make the most of your online learning experience.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Suggested Courses
Course of the Month11 days, 2 hours left to enroll

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question