Solved

NIS vs NIS+

Posted on 1997-05-22
1
468 Views
Last Modified: 2013-12-23
I am concerned with the security between NIS and NIS+ or (NYS).  I would like to know the specifics of what NIS+ was able to accomplish and why was it needed in the first place.  The more specific the better; i.e. why are tables more secure than maps?  
0
Comment
Question by:aaronc
1 Comment
 
LVL 5

Accepted Solution

by:
n0thing earned 200 total points
ID: 1582089
Hi,

Here's a little description. It is however far from complete and
way too long to be well explained here.

A major change between NIS and NIS+ is the extensive security built around NIS+. By default, it uses Secure RPC, with data encryption standards (DES) encryption and Diffie-Hellmann key exchange for authentication. And it does extensive authorization checks before allowing any NIS+ operation. This procedure      ensures that when NIS+ is set up and used as recommended, it is a secure environment.

The use of table instead of maps gives you more control over who
can/can't access specific data. You could grant access per table, per column within the table, which you cannot do with maps and thus more secure. Another reason is the transfer of information
between NIS server/zones. Only needed data are to be sent, new
table, column instead of the whole map.

Hope it clears up some of your concerns. For more information,
please buy the book NIS from O'reilly, one of the best book on
the topic.

Regards,
n0thing

0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question