Cover image for Essential Mac OS X Panther Server Administration

Book description

From the command line to Apple's graphical tools, this book uses a thorough, fundamental approach that leads readers to mastery of every aspect of the server. Full of much-needed insight, clear explanations, troubleshooting tips, and security information in every chapter, the book shows system administrators how to utilize the software's capabilities and features for their individual needs. Some of the topics covered in detail include:

  • Installation

  • Deployment

  • Server management

  • Directory services

  • Web application services

  • System interaction

  • Data gathering

  • Stress planning

This comprehensive guide also takes the time to carefully highlight and analyze the differences between Mac OS X and the other server platforms. Whether you're a seasoned Unix or Windows administrator or a long-time Mac professional, Essential Mac OS X Panther Server Administration provides you with the depth you're seeking to maximize the potential of your Mac OS X Panther Server.

Table of Contents

  1. Essential Mac OS X Panther Server Administration
    1. SPECIAL OFFER: Upgrade this ebook with O’Reilly
    2. Preface
      1. Audience for This Book
      2. How This Book Is Organized
      3. Conventions Used in This Book
      4. Using Code Examples
      5. Safari® Enabled
      6. We'd Like to Hear from You
      7. Acknowledgments
    3. I. Server Installation and Management
      1. 1. Designing Your Server Environment
        1. 1.1. Planning
          1. 1.1.1. Hardware
          2. 1.1.2. Storage
            1. 1.1.2.1. Storage technologies
            2. 1.1.2.2. AT Attachment (ATA) and Integrated Drive Electronics (IDE)
            3. 1.1.2.3. Serial ATA (SATA)
            4. 1.1.2.4. Fibre Channel
            5. 1.1.2.5. SCSI
            6. 1.1.2.6. FireWire and FireWire 800 FireWire 800
            7. 1.1.2.7. Redundant Array of Inexpensive Disks (RAID )
            8. 1.1.2.8. Apple storage productsstorage products
            9. 1.1.2.9. Volume management and partitioning partitioning
          3. 1.1.3. Network Infrastructure
            1. 1.1.3.1. Performance
            2. 1.1.3.2. Infrastructure
            3. 1.1.3.3. Services
      2. 2. Installing and Configuring Mac OS X Server
        1. 2.1. Mac OS X Server Installation Architecture
          1. 2.1.1. Power On
        2. 2.2. Graphical Installation and Configuration
          1. 2.2.1. Local Installation
            1. 2.2.1.1. Configuration
            2. 2.2.1.2. Remote graphical installation and configuration
        3. 2.3. Command-Line Installation and Configuration
          1. 2.3.1. Installation
            1. 2.3.1.1. Command-line configuration
        4. 2.4. Automatic Server Configuration
          1. 2.4.1. Behind the Scenes
        5. 2.5. Other Installation and Configuration Options
          1. 2.5.1. Network Install
          2. 2.5.2. Apple Software Restore
            1. 2.5.2.1. Image creation
            2. 2.5.2.2. Image restoration
          3. 2.5.3. radmind
        6. 2.6. Putting It All Together
      3. 3. Server Management Tools
        1. 3.1. Graphical Tools
          1. 3.1.1. Workgroup ManagerWorkgroup Manager
            1. 3.1.1.1. Account management
          2. 3.1.2. Creating Users
          3. 3.1.3. Creating Groups
          4. 3.1.4. Creating Computer Lists
          5. 3.1.5. Managing Users: Comments and Keywords
            1. 3.1.5.1. Preference management
            2. 3.1.5.2. The back end
          6. 3.1.6. Share Point Management
          7. 3.1.7. Inspector
            1. 3.1.7.1. View Directories
            2. 3.1.7.2. Preferences
          8. 3.1.8. Server Admin
            1. 3.1.8.1. Summary view
            2. 3.1.8.2. Preferences
          9. 3.1.9. Server Monitor
            1. 3.1.9.1. Server Monitor notifications
          10. 3.1.10. Directory Access
        2. 3.2. Command-Line Tools
          1. 3.2.1. serveradmin
          2. 3.2.2. sharing
        3. 3.3. Server Management Daemons
          1. 3.3.1. sshd
          2. 3.3.2. servermgrd
            1. 3.3.2.1. Securing servermgrd with SSL
            2. 3.3.2.2. Turning on servermgrd access logs
          3. 3.3.3. hwmond
          4. 3.3.4. DirectoryService
      4. 4. System Administration
        1. 4.1. Philosophies
          1. 4.1.1. Minimize Intrusion into Existing Infrastructures
          2. 4.1.2. Focus on the Needs and Business of Your Organization
          3. 4.1.3. Default Policy of Denial
          4. 4.1.4. Minimize Change, Maximize Stability
            1. 4.1.4.1. Testing
            2. 4.1.4.2. Pilot
            3. 4.1.4.3. Staging
            4. 4.1.4.4. Deployment and monitoring
        2. 4.2. System Management
          1. 4.2.1. Software Updates
            1. 4.2.1.1. Software update methods
            2. 4.2.1.2. Minor updates
            3. 4.2.1.3. Major updates
            4. 4.2.1.4. Security updates
          2. 4.2.2. Backing Up
            1. 4.2.2.1. Mac OS X Server backup issues
            2. 4.2.2.2. tar alternatives
            3. 4.2.2.3. Commercial backup products
            4. 4.2.2.4. Backup staging
          3. 4.2.3. Account Management
            1. 4.2.3.1. Import file format
            2. 4.2.3.2. Group accounts
            3. 4.2.3.3. Computer accounts and lists
            4. 4.2.3.4. Using LDAP rather than dsimportexport
          4. 4.2.4. Failover
            1. 4.2.4.1. The failover process
          5. 4.2.5. Diskspacemonitor
          6. 4.2.6. watchdogwatchdog
            1. 4.2.6.1. cron cron
      5. 5. Troubleshooting
        1. 5.1. Strategies
          1. 5.1.1. Quick Fixes
          2. 5.1.2. Abstraction
            1. 5.1.2.1. Name resolution: A structured approach
            2. 5.1.2.2. The fundamentals of LDAP and Mac OS X Directory Services
          3. 5.1.3. Troubleshooting and the Scientific Method
            1. 5.1.3.1. The Scientific Method in a nutshell
        2. 5.2. Tools
          1. 5.2.1. Forensic Tools
          2. 5.2.2. Network Tools
          3. 5.2.3. Joiners and Filters
          4. 5.2.4. Other Commands
            1. 5.2.4.1. Verbosity and debugging
            2. 5.2.4.2. Use the source
            3. 5.2.4.3. The magic Shift key
            4. 5.2.4.4. Logs
    4. II. Directory Services
      1. 6. Open Directory Server
        1. 6.1. Managing Open Directory Server
          1. 6.1.1. Roles
          2. 6.1.2. The Open Directory Master: Creating a Shared Open Directory Domain
          3. 6.1.3. Best Practices
          4. 6.1.4. Under the Hood
        2. 6.2. Accessing an Open Directory Domain
      2. 7. Identification and Authorization in Open Directory Server
        1. 7.1. LDAP: A Communication Protocol
        2. 7.2. LDAP Basics
          1. 7.2.1. LDAP Is Hierarchical
          2. 7.2.2. LDAP Uses Standard Naming Conventions
          3. 7.2.3. LDAP Terminology
        3. 7.3. OpenLDAP
          1. 7.3.1. Managing OpenLDAP with Server Admin
          2. 7.3.2. Server Architecture
            1. 7.3.2.1. slapd options
            2. 7.3.2.2. slapd.conf
          3. 7.3.3. OpenLDAP Performance
          4. 7.3.4. OpenLDAP Security
          5. 7.3.5. Troubleshooting
          6. 7.3.6. OpenLDAP: Utilities and Tools
        4. 7.4. LDAP Data and Open Directory Server
          1. 7.4.1. Apple's LDAP Schema
          2. 7.4.2. Examining LDAP Data
      3. 8. Authentication in Open Directory Server
        1. 8.1. PasswordService (SASL )
          1. 8.1.1. Password Server Architecture
          2. 8.1.2. Password Server Policies
            1. 8.1.2.1. Password Server and public-private key-pairs
          3. 8.1.3. Password Server Tools
            1. 8.1.3.1. pwpolicy
            2. 8.1.3.2. mkpassdb
            3. 8.1.3.3. NeST
        2. 8.2. Kerberos: MIT KDC
          1. 8.2.1. Kerberos Basics
            1. 8.2.1.1. Kerberos terms
            2. 8.2.1.2. The Kerberos exchange
            3. 8.2.1.3. Securing Kerberos
          2. 8.2.2. Kerberos and Mac OS X Server
            1. 8.2.2.1. Kerberos Configuration
            2. 8.2.2.2. Integrating Kerberos: Kerberizing Mac OS X Server services
        3. 8.3. Putting It All Together
          1. 8.3.1. Password Server and Synchronization
      4. 9. Replication in Open Directory Server
        1. 9.1. Creating an Open Directory Replica
          1. 9.1.1. Graphical Configuration
          2. 9.1.2. Command-Line Configuration
          3. 9.1.3. Behind the Scenes: Dissecting Replica Creation
        2. 9.2. The Replication Process
          1. 9.2.1. LDAP Replication
          2. 9.2.2. Password Server Replication
          3. 9.2.3. Kerberos Replication
          4. 9.2.4. Graphical Replication Management
        3. 9.3. Client-Side Replica Discovery
          1. 9.3.1. LDAP Replica Discovery
          2. 9.3.2. Password Server Replica Discovery
          3. 9.3.3. Kerberos Replica Discovery
        4. 9.4. Replication Best Practices
          1. 9.4.1. How Many Replicas?
    5. III. IP Services
      1. 10. xinetd
        1. 10.1. Configuration
        2. 10.2. Architecture
          1. 10.2.1. General
          2. 10.2.2. Mac OS X Specific
          3. 10.2.3. Security Related
      2. 11. DNS
        1. 11.1. Graphical Interface
        2. 11.2. Configuration Storage
          1. 11.2.1. Files, Directories, and Daemons
        3. 11.3. Troubleshooting
          1. 11.3.1. Tools
        4. 11.4. Advanced Configuration
          1. 11.4.1. Running As an Underprivileged User
          2. 11.4.2. Forwarders
          3. 11.4.3. Change Root (chroot chroot
          4. 11.4.4. Limiting Zone Transfers
          5. 11.4.5. Views
      3. 12. DHCP
        1. 12.1. Graphical Configuration
          1. 12.1.1. Troubleshooting
        2. 12.2. Advanced Configuration
          1. 12.2.1. DHCP and bootpd Static Bindings
          2. 12.2.2. Supplying Other DHCP Options
        3. 12.3. ISC's dhcpd
          1. 12.3.1. Compilation and Installation
          2. 12.3.2. Configuration and Administration
      4. 13. NAT
        1. 13.1. Managing NAT
        2. 13.2. Architecture
        3. 13.3. Advanced Configuration
    6. IV. File Services
      1. 14. File Services Overview
        1. 14.1. Share Points
        2. 14.2. Managing Share Points
          1. 14.2.1. Defining new shares
        3. 14.3. The sharing Command
        4. 14.4. Automounts
        5. 14.5. Automount Schema
        6. 14.6. Guest Access and Automounts
          1. 14.6.1. Storing automounts in the local domain: stealth infrastructure
        7. 14.7. Troubleshooting Automounts
        8. 14.8. Supporting Home Directories
          1. 14.8.1. Virtual home directory shares
          2. 14.8.2. Home directories in /Volumes
      2. 15. Apple Filing Protocol
        1. 15.1. AFP Management: Server Admin
          1. 15.1.1. Secure Connections
          2. 15.1.2. AFP Server Preferences
        2. 15.2. AFP Management: Workgroup Manager
        3. 15.3. Architecture
        4. 15.4. Permissions Mapping
        5. 15.5. Integration
        6. 15.6. Troubleshooting
      3. 16. Windows File Services
        1. 16.1. Managing Windows Services: Server Admin
        2. 16.2. Managing Windows Services Using Workgroup Manager
        3. 16.3. Architecture
        4. 16.4. Apple's Changes to Samba
          1. 16.4.1. Password Server Integration
        5. 16.5. Useful Utilities
        6. 16.6. Troubleshooting
          1. 16.6.1. SMB Share Point Permissions Restrictions
          2. 16.6.2. Integration
      4. 17. FTP
        1. 17.1. Managing FTP with Server Admin
        2. 17.2. Managing FTP Using Workgroup Manager
        3. 17.3. Architecture
          1. 17.3.1. ftpaccess: Advanced Options
          2. 17.3.2. ftpconversionsftpconversions
          3. 17.3.3. ftphosts , ftpgroups , and ftpusersftpusers
        4. 17.4. Securing FTP
          1. 17.4.1. Using Kerberos
          2. 17.4.2. FTP Tunneled over SSH
          3. 17.4.3. Secure FTP (sftp)
      5. 18. Network File System
        1. 18.1. The NFS (In)security Model
        2. 18.2. Managing NFS with Server Admin
        3. 18.3. Managing NFS with Workgroup Manager
          1. 18.3.1. NFS File Locking
          2. 18.3.2. /etc/exports
          3. 18.3.3. Servers
          4. 18.3.4. Utilities and Troubleshooting
      6. 19. Print Services
        1. 19.1. Managing Print Services
          1. 19.1.1. Adding Printer Queues
          2. 19.1.2. Server Admin and Printing
        2. 19.2. PrintServiceAccess
        3. 19.3. Managing Print Services with Workgroup Manager
        4. 19.4. Making Queues Available in Open Directory
        5. 19.5. Quotas and Authentication
        6. 19.6. Print Services Architecture
          1. 19.6.1. PrintServicesMonitor
          2. 19.6.2. CUPS
            1. 19.6.2.1. CUPS PPDs
            2. 19.6.2.2. CUPS configuration
            3. 19.6.2.3. CUPS web administration
            4. 19.6.2.4. CUPS logs
    7. V. Security Services
      1. 20. The Mac OS X Server Firewall
        1. 20.1. A Firewall's Place in Network Communication
          1. 20.1.1. Packet-Switched Networking
          2. 20.1.2. Filtering Packets
          3. 20.1.3. The Mac OS X Firewall Service
            1. 20.1.3.1. The firewall startup process
          4. 20.1.4. Configuring the Firewall with the General Pane
          5. 20.1.5. Configuring the Firewall with the Advanced Pane
          6. 20.1.6. Configuring the Firewall from the Command Line
          7. 20.1.7. Rule Order
          8. 20.1.8. Configuration Examples
            1. 20.1.8.1. Example 1
            2. 20.1.8.2. Example 2
            3. 20.1.8.3. Example 3
            4. 20.1.8.4. Example 4
            5. 20.1.8.5. Example 5
        2. 20.2. Reporting and Monitoring
        3. 20.3. Managing the Firewall Service
      2. 21. Virtual Private Networks
        1. 21.1. VPN Protocols
          1. 21.1.1. PPTP
          2. 21.1.2. L2TP over IPSec
        2. 21.2. Server Configuration
          1. 21.2.1. Configuring L2TP/IPSec
            1. 21.2.1.1. L2TP/IPSec and com.apple.RemoteAccessServers.plist
        3. 21.3. racoon.confracoon.conf
        4. 21.4. anonymous.conf
        5. 21.5. Configuring PPTP
          1. 21.5.1. MPEE
        6. 21.6. Logging
        7. 21.7. Client Information
        8. 21.8. Internet Connect
        9. 21.9. Other Considerations
    8. VI. Internet Services
      1. 22. Mail Services
        1. 22.1. Mail Protocols
          1. 22.1.1. SMTP
          2. 22.1.2. POP
          3. 22.1.3. IMAP
        2. 22.2. Graphical Management
          1. 22.2.1. Server Admin
          2. 22.2.2. WebMailWebMail
            1. 22.2.2.1. Behind the scenes
          3. 22.2.3. Workgroup Manager
            1. 22.2.3.1. Behind the scenes
        3. 22.3. Mail Architecture
          1. 22.3.1. PostfixPostfix
            1. 22.3.1.1. Files, folders, processes
            2. 22.3.1.2. Troubleshooting
          2. 22.3.2. Cyrus Cyrus
            1. 22.3.2.1. Files, folders, processes
            2. 22.3.2.2. Troubleshooting
        4. 22.4. Migration
          1. 22.4.1. amsmailtool
        5. 22.5. Advanced Configuration
          1. 22.5.1. Backing Up
          2. 22.5.2. Content Filtering
            1. 22.5.2.1. amavisd-new
            2. 22.5.2.2. SpamAssassin
            3. 22.5.2.3. ClamAV
            4. 22.5.2.4. Architecture
            5. 22.5.2.5. Installation
            6. 22.5.2.6. Putting it all together
          3. 22.5.3. Group Distribution
            1. 22.5.3.1. Postfix alias support
            2. 22.5.3.2. Take 2: shared mailboxes
          4. 22.5.4. Virtual Domains
          5. 22.5.5. Securing Web Mail
      2. 23. Web Services
        1. 23.1. Web Services
          1. 23.1.1. The Overview Pane
          2. 23.1.2. The Logs Pane
          3. 23.1.3. The Graphs Pane
        2. 23.2. Web Service Configuration: The Settings Tab
          1. 23.2.1. General Configuration
          2. 23.2.2. Configuring Sites
          3. 23.2.3. Setting MIME Types
          4. 23.2.4. Configuring the Proxy Server
          5. 23.2.5. Adding and Removing Modules
        3. 23.3. Architecture
          1. 23.3.1. The Performance Cache
          2. 23.3.2. Apache 2.0 Apache 2.0
        4. 23.4. Useful Utilities
        5. 23.5. Troubleshooting
      3. 24. Application Servers
        1. 24.1. Running the Server
        2. 24.2. Installing Applications
        3. 24.3. Server Layout
          1. 24.3.1. Logs and Troubleshooting
        4. 24.4. Building Java Web Applications
        5. 24.5. Complex Applications
        6. 24.6. Apple Proprietary Tools
        7. 24.7. Next Steps
    9. VII. Client Management
      1. 25. Managing Preferences for Mac OS X Clients
        1. 25.1. Applying Managed Preferences
          1. 25.1.1. Choosing When and How a Preference Is Managed
          2. 25.1.2. Managing Preferences for Users or Groups
          3. 25.1.3. Creating and Managing Computer Lists
            1. 25.1.3.1. Creating a computer list
            2. 25.1.3.2. Limiting access to computers in a list
            3. 25.1.3.3. Using the Guest Computers list Guest Computers list
            4. 25.1.3.4. The MCX cache
          4. 25.1.4. How Varying Preferences Interact
          5. 25.1.5. Using the Home Directory for Additional Preference Management
        2. 25.2. Configuring Individual Preferences
          1. 25.2.1. Application Preferences
          2. 25.2.2. Classic Preferences
          3. 25.2.3. Dock Preferences
          4. 25.2.4. Energy Saver Preferences
          5. 25.2.5. Finder Preferences
            1. 25.2.5.1. Preferences
            2. 25.2.5.2. Commands
            3. 25.2.5.3. Views
          6. 25.2.6. Internet Preferences
          7. 25.2.7. Login Preferences
            1. 25.2.7.1. Login items
            2. 25.2.7.2. Login options and auto-logout
          8. 25.2.8. Media Access Preferences
          9. 25.2.9. Mobile Accounts Preferences
            1. 25.2.9.1. Configuring mobile accounts
            2. 25.2.9.2. Deleting mobile accounts
            3. 25.2.9.3. When to use mobile accounts
          10. 25.2.10. Printing Preferences
            1. 25.2.10.1. Creating a printer list
            2. 25.2.10.2. Restricting printer access
          11. 25.2.11. System Preferences
          12. 25.2.12. Universal Access Preferences
      2. 26. Managing Classic Mac OS Workstations Using Mac Manager
        1. 26.1. Mac Manager and Open Directory
        2. 26.2. Mac Manager Environment Types
          1. 26.2.1. Finder
          2. 26.2.2. Restricted Finder
          3. 26.2.3. Panels
        3. 26.3. Mac Manager Share Points and Folders
          1. 26.3.1. The Mac Manager Share Point and Multi-User Items Folder
          2. 26.3.2. Group Documents Volumes
            1. 26.3.2.1. Workgroup shared folders
            2. 26.3.2.2. Global shared folders
        4. 26.4. The Mac Manager Client Software
          1. 26.4.1. Installing or Updating the Mac Manager Client
          2. 26.4.2. Enabling Mac Manager
        5. 26.5. Mac Manager Preference Management
          1. 26.5.1. Initial Preferences and Forced Preferences
          2. 26.5.2. Matching Mac OS 9 and Classic User Preferences
          3. 26.5.3. Using Local Preferences
        6. 26.6. Mac Manager Administration
          1. 26.6.1. Enabling Mac Manager
          2. 26.6.2. Creating an Administrative Workstation
          3. 26.6.3. Importing Users
            1. 26.6.3.1. Importing all users
            2. 26.6.3.2. Importing manually from Workgroup Manager
            3. 26.6.3.3. Importing from a user list
            4. 26.6.3.4. Using the All Other Users user
            5. 26.6.3.5. Using the Guest user
          4. 26.6.4. Configuring User Settings
            1. 26.6.4.1. User types
          5. 26.6.5. Creating and Managing Workgroups
            1. 26.6.5.1. Creating workgroups and managing workgroup membership
            2. 26.6.5.2. Assigning workgroup items for Finder workgroups
            3. 26.6.5.3. Assigning workgroup items for Restricted Finder and Panels workgroups
            4. 26.6.5.4. Privileges for Finder workgroups
            5. 26.6.5.5. Privileges for Restricted Finder workgroups
            6. 26.6.5.6. Privileges for Panels workgroups
            7. 26.6.5.7. Workgroup volume settings
            8. 26.6.5.8. Defining Workgroup printers
            9. 26.6.5.9. Additional workgroup options
          6. 26.6.6. Working with Mac Manager Computer Lists
            1. 26.6.6.1. Creating and editing computer lists
            2. 26.6.6.2. Using the All Other Computers list
            3. 26.6.6.3. Disabling login for a computer list
            4. 26.6.6.4. Configuring workgroup access to computer lists
            5. 26.6.6.5. Control options for computer lists
            6. 26.6.6.6. Security options for computer lists
            7. 26.6.6.7. Login options for computer lists
            8. 26.6.6.8. Checking out PowerBooks and iBooks
          7. 26.6.7. Global Settings
            1. 26.6.7.1. Security settings
            2. 26.6.7.2. CD-ROM settings
          8. 26.6.8. Enabling and Configuring Templates
            1. 26.6.8.1. Using templates
            2. 26.6.8.2. Duplicating workgroups and computer lists
          9. 26.6.9. Mac Manager Reports and Logs
          10. 26.6.10. Using Multiple Mac Manager Servers
        7. 26.7. Troubleshooting Mac Manager
      3. 27. Managing Windows Clients Using Mac OS X Server
        1. 27.1. Hosting a Windows Domain
          1. 27.1.1. Domain Requirements and Limitations
          2. 27.1.2. Configuring Mac OS X Server as a Windows Domain Controller
            1. 27.1.2.1. Limiting access to a domain
            2. 27.1.2.2. Configuring Windows service logging
          3. 27.1.3. Configuring Windows Computer Access to a Domain
          4. 27.1.4. Configuring User Access to a Domain
          5. 27.1.5. Home Directory Access from Windows Workstations
            1. 27.1.5.1. Shared Mac/Windows home directories
            2. 27.1.5.2. Separate home directories
            3. 27.1.5.3. The Windows My Documents and Desktop folders
          6. 27.1.6. Setting Up User Profiles for Windows Users
            1. 27.1.6.1. Mandatory and default profiles
          7. 27.1.7. Using Login Scripts
        2. 27.2. Configuring Member and Standalone Servers
          1. 27.2.1. Working with Member Servers in a Domain
        3. 27.3. Integrating Windows Member Servers in a Mac OS X Server-Hosted Domain
          1. 27.3.1. The Rationale Behind a Mixed-Server-Platform Domain
          2. 27.3.2. When Windows Servers Are Warranted
            1. 27.3.2.1. Easy access to existing data and cost benefits in migration planning
            2. 27.3.2.2. Print servers
            3. 27.3.2.3. Master browsers
            4. 27.3.2.4. Microsoft terminal services
            5. 27.3.2.5. Application servers
      4. 28. Workstation Deployment and Maintenance
        1. 28.1. Disk Images
          1. 28.1.1. Types of Disk Images
        2. 28.2. NetBoot
          1. 28.2.1. The NetBoot Process
            1. 28.2.1.1. Boot Service Discovery Protocol
            2. 28.2.1.2. NetBoot share points and image folders
            3. 28.2.1.3. Shadow files
            4. 28.2.1.4. NetBoot requirements
          2. 28.2.2. Network Issues and Concerns with NetBoot
            1. 28.2.2.1. Load balancing with multiple servers
            2. 28.2.2.2. Staggering boot times
            3. 28.2.2.3. NetBoot across subnets
            4. 28.2.2.4. Storing images on file servers other than servers running NetBoot
            5. 28.2.2.5. Designating local or network shadow files
            6. 28.2.2.6. BootPBootP
          3. 28.2.3. Creating Mac OS X NetBoot Images
          4. 28.2.4. Editing Mac OS X NetBoot Images
            1. 28.2.4.1. Editing without synchronizing
            2. 28.2.4.2. Synchronizing with a source image
          5. 28.2.5. Working with Mac OS 9 NetBoot Images
          6. 28.2.6. Configuring the NetBoot Service
          7. 28.2.7. Configuring the NetBoot Service from the Command Line
        3. 28.3. NetInstallNetInstall
          1. 28.3.1. How the NetInstall Process Differs from NetBoot
          2. 28.3.2. Using NetInstall for Software Install Versus Disk Image Install
          3. 28.3.3. Creating NetInstall Images
        4. 28.4. Apple Software Restore
          1. 28.4.1. Creating Classic Mac OS ASR Images
          2. 28.4.2. Applying Classic Mac OS ASR Images
            1. 28.4.2.1. Configuring custom classic Mac OS restore CDs
            2. 28.4.2.2. Using an ASR server for classic Mac OS images
          3. 28.4.3. Creating Mac OS X ASR Images Using Disk Utility
          4. 28.4.4. Applying Mac OS X ASR Images Using Disk Utility
          5. 28.4.5. Applying Mac OS X ASR Images from the Command Line
          6. 28.4.6. Creating and Applying Mac OS X ASR Images Using Other Tools
        5. 28.5. Deploying New Software and Software Updates
          1. 28.5.1. Working with Apple Software Update
          2. 28.5.2. Using Apple Remote Desktop for Software Installs and Updates
          3. 28.5.3. Creating Software-Only NetInstall Images
          4. 28.5.4. Creating Updated Full NetInstall or ASR Images
          5. 28.5.5. Using Applications Automounts or Share Points
          6. 28.5.6. Placing Application Installers on the Network
          7. 28.5.7. Using Third-Party Software Management Tools
      5. 29. Apple Remote Desktop
        1. 29.1. Administrator Computers
          1. 29.1.1. Installing the Administrator Software
          2. 29.1.2. Customizing the Remote Desktop Application
            1. 29.1.2.1. Customizing the toolbar
            2. 29.1.2.2. Other preferences
        2. 29.2. Remote Desktop Users
          1. 29.2.1. Creating ARD-Enabled User Accounts
          2. 29.2.2. Remote Desktop and Directory Domain Users
          3. 29.2.3. Restricting Non-Administrator Access to Remote Desktop Features
        3. 29.3. Installing and Configuring the ARD Client Software
          1. 29.3.1. Manually Configuring the ARD Client
          2. 29.3.2. Custom Client Install Packages
          3. 29.3.3. Deploying Install Packages
            1. 29.3.3.1. Manually installing custom installer packages
            2. 29.3.3.2. Using SSH
            3. 29.3.3.3. Using ARD's Install Package feature
        4. 29.4. Working with Computer Lists
          1. 29.4.1. Adding Computers to Remote Desktop
            1. 29.4.1.1. Multiple Scanners
            2. 29.4.1.2. Removing computers from Remote Desktop
          2. 29.4.2. Creating Computer Lists
        5. 29.5. Remote Management Tasks
          1. 29.5.1. Observe
          2. 29.5.2. Control
          3. 29.5.3. Share Screen
          4. 29.5.4. Send Message
          5. 29.5.5. Chat
          6. 29.5.6. Lock/Unlock Screen
          7. 29.5.7. Copy Items
          8. 29.5.8. Install Packages
          9. 29.5.9. Upgrade Client Software
          10. 29.5.10. Send Unix Command
          11. 29.5.11. Open Application/Open Items
          12. 29.5.12. Empty Trash
          13. 29.5.13. Set Startup Disk
          14. 29.5.14. Rename Computer
          15. 29.5.15. Sleep/Wake/Restart/Shut Down/Log Out Current User
          16. 29.5.16. Change Client Settings
          17. 29.5.17. Get Info
          18. 29.5.18. User Messages
        6. 29.6. Generating Client Reports
          1. 29.6.1. Where Report Data Is Stored
          2. 29.6.2. When Data Is Collected for Reports
          3. 29.6.3. Configuring a Data Reporting Policy
          4. 29.6.4. Running, Viewing, and Exporting Reports
          5. 29.6.5. Types of Reports
            1. 29.6.5.1. System overview
            2. 29.6.5.2. File search
            3. 29.6.5.3. Software version
            4. 29.6.5.4. Software difference
            5. 29.6.5.5. Storage
            6. 29.6.5.6. USB devices
            7. 29.6.5.7. FireWire devices
            8. 29.6.5.8. Memory
            9. 29.6.5.9. PCI cards
            10. 29.6.5.10. Network interfaces
            11. 29.6.5.11. Network test
            12. 29.6.5.12. Administration settings
        7. 29.7. Automating Remote Desktop Using the Saved Tasks List
        8. 29.8. Working with VNC
          1. 29.8.1. Configuring the ARD Client as a VNC Server
          2. 29.8.2. Configure Remote Desktop as a VNC Viewer
    10. A. Introduction to Directory Services
      1. Identification, Authentication, and Authorization
        1. The Airport Example
        2. The Login Process
        3. /etc files: Identification, Authentication, and Authorization
      2. Open Directory: The Ever-Expanding Marketecture
        1. Identification, Authentication, and Authorization in Mac OS X
          1. A little (more) history
          2. DirectoryService: lookupd evolved
        2. The DirectoryService Daemon
          1. DirectoryService configuration: the Authentication path
          2. DirectoryService configuration
          3. DirectoryService monitoring and logging
          4. An introduction to the dscl command
      3. The lookupd Daemon
        1. Configuring lookupd
          1. lookupd monitoring and logging
          2. lookupd clients and authentication
        2. The Open Directory Responder Chain
    11. About the Authors
    12. Colophon
    13. SPECIAL OFFER: Upgrade this ebook with O’Reilly