NIS Consistent configuration across the network. Why NIS? Primary reason is to provide same user configuration across the network Users go any machine.

Slides:



Advertisements
Similar presentations
1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
Advertisements

Serverless Network File Systems. Network File Systems Allow sharing among independent file systems in a transparent manner Mounting a remote directory.
The Domain Name System. CeylonLinux DNS concepts using BIND 2 Hostnames IP Addresses are great for computers –IP address includes information used for.
NIS – Network Information System WeeSan Lee
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
DNS Domain Name Service america.pcs.cnu.edu->
Window NT Workstation and Server. Windows NT refers to two products workstation server can act as both a client and server in a network environment.
Linux Networking TCP/IP stack – kernel controls the TCP/IP protocol – Ethernet adapter is hooked to the kernel in with the ipconfig command – ifconfig.
1 DNS,NFS & RPC Rizwan Rehman, CCS, DU. Netprog: DNS and name lookups 2 Hostnames IP Addresses are great for computers –IP address includes information.
Implementing High Availability
1 Network File System. 2 Network Services A Linux system starts some services at boot time and allow other services to be started up when necessary. These.
Remote Disk Access with NFS
Common Services in a network Server : provide services Type of Services (= type of servers) –file servers –print servers –application servers –domain servers.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Distributed Computing COEN 317 DC2: Naming, part 1.
Linux+ Guide to Linux Certification, Third Edition
DHCP. DHCP (Dynamic Host Configuration Protocol) is a network service that enables clients to obtain network settings (IP Address, Subnet Mask, Default.
Overview of Active Directory Domain Services Lesson 1.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
BASIC NETWORK CONCEPTS (PART 6). Network Operating Systems NNow that you have a general idea of the network topologies, cable types, and network architectures,
Module 7: Configuring TCP/IP Addressing and Name Resolution.
1 The Solaris Distributed Computing Solution The operating system is a set of programs that manages all computer operations and provides an interface between.
Lecture – Single Login NIS and Winbind. NIS Network Information Service (NIS) is the traditional directory service on UNIX platforms Still widely used.

Linux Networking #2 Dr. Michael L. Collard 1.
Windows Server 2008 R2 Domain Name System Chapter 5.
Chapter 10 Networking and the Internet ITSC 1458.
Setting up NIS and HTTP. Network Information Service Reading: 1. Linux NIS HOWTO: howto/HOWTOhttp://
ITI-481: Unix Administration Meeting 5. Today’s Agenda Network Information Service (NIS) The Cron Program Syslogd and Logging.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 6: Name Resolution.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 6: Name Resolution.
2002 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
Distributed Computing COEN 317 DC2: Naming, part 1.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier-
Windows routing and resolution. Basic concepts  Host name: machine.sub-domain.domain example: mail.ubalt.edu same machine name in Windows in NetBIOS.
Single Sign-on with Kerberos 1 Chris Eberle Ryan Thomas RC Johnson Kim-Lan Tran CS-591 Fall 2008.
Centralized logins with NIS Eric Stolten Tim Meade Mark Sidnam.
New SA Training Topic 6: Service Management Our organization takes advantage of many service type to provide functionality to users and ease management.
Partner Logo German Cancio – WP4-install LCFG HOW-TO - n° 1 LCFGng configuration examples Updated 10/2002
A Brief Documentation.  Provides basic information about connection, server, and client.
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
CIS 192B – Lesson 3 Network Information Services.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
1/14 Char 18 Sharing System Files Content –NIS(The Network Information Service) –NIS+
Exercise 4 – NFS and NIS Announced Date: 2007/12/11 Due Date: 2007/12/25.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
RFC 4477 DHCP: Dual-Stack Issues Speaker: Ching-Chen Chang Date:
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
1 Network Information System (NIS). 2 Module – Network Information System (NIS) ♦ Overview This module focuses on configuring and managing Network Information.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Linux Operations and Administration
Introduction to Active Directory
Chap 35 Remote Procedure Calls RPC allows one host to make a procedure call that appears to be part of a local process (fig 35.1), but is really executed.
Small Business Server 2003 Linux Small Business Server versus Linux functionality.
OPTION section It is the first section of the named.conf User can use only one option statement and many option-value pair under the section. Syntax is.
1 Security of NIS (YP) Gary Lam
Internet Naming Service: DNS* Chapter 5. The Name Space The name space is the structure of the DNS database –An inverted tree with the root node at the.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1 Example security systems n Kerberos n Secure shell.
Overview of Active Directory Domain Services Lesson 1.
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
-Active Directory is the brain of the Microsoft windows Server Network. -It’s a database that keeps track of huge amount of stuffs and gives us a centralized.
Chapter 17: Sharing System Files Stephen Workman.
ETL Job Scheduler Job Database Server User Interface Scheduler
Chapter 3: Windows7 Part 4.
Communications & Computer Networks Resource Notes - Introduction
Windows Name Resolution
IBM Tivoli Storage Manager
Presentation transcript:

NIS Consistent configuration across the network

Why NIS? Primary reason is to provide same user configuration across the network Users go any machine and log in with the same password NOT a means of mounting files… that is NFS

Problem Workstation User changes Password

Problem Workstation User tries to login w/new password FAILURE!

Solution: Centralized management Workstation User changes Password NIS Server Stored on server

Solution: Centralized management Workstation NIS Server Ask server User tries to login w/new password Login succeeds SUCCESS!

OK, but is that all? NO. It’s just the most important function. More generally it allows centralization of many configuration parameters. Providing a server allows for storing the info in a single place w/ single copy. Must tell server what to share Must tell clients what to ask Understanding NIS requires knowing what it handles and what it doesn’t handle!

Who Can See It? Originally on a network segment Typically local Servers can be hard-coded or broadcast Security issues for –Broadcasting –Passwords for logging in Used by machines in the NIS domain –Not the same as a DNS domain but could have the same name

What else does it handle? Users, passwords,groups Mail aliases Host name/ip mapping like dns Boot parameters Printer definitions And others You can pick and choose which to provide

How are these functions similar? user encrypted password hostname ip address Both are simply mapping functions!

Main Components A server and its configuration –ypserv –yp.conf Client configuration –ypbind –nsswitch.conf Rpc portmapper running A domain defined Database files Option slave servers for redundancy

Setting up the server Make sure “rpc” is running ypserv (likely) – rpcinfo -u localhost ypserv –It will report versions running Generate the database files –/usr/lib/yp/ypinit -m Update as necessary by –Changing files –In /var/yp, run “make” If using network passwords, run rpc.yppasswd

Generating database files Can be tricky Each separate function should be addressed as the nuances are different. E.g. “dns’ function is used for NIS domain but regular DNS must be available for the outside world E.g. “password”s can be served some locally and some centrally

Setting up the client Define the location of server in /etc/yp.conf Use “domainname” to set machine domain –Same as in server Run rpcinfo -p localhost looking for ypbind and portmapper Create /var/yp directory if necessary Modify nsswitch.conf to use the nis service