O'Reilly logo

Solaris™ Operating Environment Boot Camp by Dominic Butler, David Rhodes

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Customizing NIS

At times it may be useful to use the features of NIS ourselves. Doing this means we don't have to be concerned about ensuring that the same files are up-to-date on every machine or about distributing them. The problem is that we have to customize the makefile to add this support, which can be quite tricky.

To show how this can be done, we will add a hypothetical map to our setup. The one we'll use will be responsible for controlling which users have access to applications on which machines.

The “userAccessList” File

This is the input file that will be used to build the map. It contains a list of UIDs, the machine each UID can use, and a list of the applications the UIDs are allowed access to:

 tin# cat /etc/userAccess # # UID ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required