Solved

Directory Services (UNIX & NT)

Posted on 1997-06-25
3
345 Views
Last Modified: 2013-12-06
I am doing research about NT and UNIX.  I was wondering how NT and UNIX access directory services?(User lists and password lists)  Is there a way that there could be a master list that the two could share and how does/would that work?  Send me mail at joemd@sequent.com.  Another thing, how do applications access user/password lists?  Please be clear and indepth in your answers.
0
Comment
Question by:cdrex
  • 2
3 Comments
 
LVL 4

Accepted Solution

by:
jlms earned 100 total points
ID: 2006457
Hello:

Most Unixes use NIS, it is a service that provides lists not only off users and passwords but also off hosts, and other related UNIX lists. I am not an NT expert, but for what I have read I conclude that the user and passwrod lists are kept in the server of an NT network.

In UNIX you have a series of libraries that define the API to read these lists, check for books about NIS ans NIS programming.

If you are going to work with Solaris then you need to know also about NIS+, it is similar to NIS but with added security and a jerarquical organization. You don't have to modify applications to use NIS or NIS+ because tha API defines the calls you shoul make to the OS and the OS uses the right service.
0
 

Author Comment

by:cdrex
ID: 2006458
Thanks for your response but the question really wasn't answered.  Part of it was answered, but the most important part wasn't.  I need to know about a master list possibility in a heterogenous environment of UNIX/NT.
0
 
LVL 4

Expert Comment

by:jlms
ID: 2006459
You will have to get a third party product for the Unix system or for the NT system to make a homogenous common directory service, Unix does not support in general the NT standards and MS is infamous for making their own protocols even if they don't work with any other kind of system.

Samba is a UNIX product (free with source code) that lets you connect NT machines to UNIX boxes, it has to handle security issues so it could be an start point.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you do backups in the Solaris Operating System, the file system must be inactive. Otherwise, the output may be inconsistent. A file system is inactive when it's unmounted or it's write-locked by the operating system. Although the fssnap utility…
Let's say you need to move the data of a file system from one partition to another. This generally involves dismounting the file system, backing it up to tapes, and restoring it to a new partition. You may also copy the file system from one place to…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

947 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now