O'Reilly logo

Solaris™ 8 Advanced System Administrator's Guide, Third Edition by Janice Winsor

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Example: Secure RPC

To use asymmetric and symmetric encryption with NIS+ and Secure RPC credentials, every individual and system is first given an asymmetric keypair. In NIS+, the keypair is called an NIS+/Secure RPC “credential” (the DES one, not the LOCAL one). The public key and the password-encrypted private key for the credential are put in the NIS+ cred table. In this way, the public key is available to everyone and the private key is protected with a password.

Normally, whenever users log in to a system, they provide their password to do so. The keylogin program is also run as part of the login process. The user's Secure RPC password is the password that protects his private key in the cred table. If the user's login password is the same ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required