Linux Mail Conifg Virtural

Posted on 2007-09-28
Last Modified: 2013-12-16
I have set up a virtual mail server and need to know what else i can do to make sure that it is functioning the proper way.  I use Redhat Linux 4.0ES.   I currently have 2 business customers on the box.  I do the following to set up mail.

1.  Set up the DNS on my name servers  (I know that is correct) Pointed the domian to my name servers.

On the mail server itself

1.  I edit /etc/hosts  (add and associate that with the IP I have assigned.)
2.  apply the ip address to the /etc/sysconfig/network-scripts directory (ifcfg-eth0:4) and bring the interface up.
3.  Edit /etc/mail/  ( I add the line) and compile;  make -C /etc/mail
4.  add to /etc/mail/local-host-names
5.  add the usernames and passwords /usr/sbin/useradd -c "Name" name
6.  modify the users /use/sbin/usermod -s /bin/false

My issue is this.  How can i group the customers by company such that if two or more of the companies want to use, for example, (use the username HR), they will be exclusive of one another?

Question by:marchopkins
    LVL 14

    Accepted Solution

    You'll never be able to have multiple accounts with the same name, but what you can do is create an account called hr-company1 and hr-company2 and have hr@company1 go to hr-company1, etc.  So the logins will be hr-company1 and hr-company2.

    You do this by enabling FEATURE(`virtusertable')dnl in yoru
    makemap hash /etc/mail/virtusertable < sourcefile

    If I could make a suggestion - if you are going to have more than 2 companies this is going to get out of hand, and confusing, really quickly.  I'd suggesting using qmail with vpopmail which has a really nice interface and is a lot easier to manage and scale - there are great step-by-step instructions at

    Author Comment

    i'll check it out.
    LVL 1

    Expert Comment

    Forced accept.

    EE Admin

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    If you use Debian 6 Squeeze and you are tired of looking at the childish graphical GDM login screen that is used by default, here's an easy way to change it. If you've already tried to change it you've probably discovered that none of the old met…
    The purpose of this article is to fix the unknown display problem in Linux Mint operating system. After installing the OS if you see Display monitor is not recognized then we can install "MESA" utilities to fix this problem or we can install additio…
    Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
    Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    7 Experts available now in Live!

    Get 1:1 Help Now