tailieunhanh - Intermediate System Administration for the Solaris 10 Student Guide phần 8

Hệ thống đang chạy trong một hành chính nhà nước duy nhất người sử dụng truy cập vào tất cả các hệ thống tập tin có sẵn. Hệ thống hỗ trợ các hoạt động đa người dùng. Nhiều người dùng có thể truy cập vào hệ thống. | Controlling System Access Figure 11-2 shows the flow of remote access authentication. Figure 11-2 Remote Access Authentication 11-18 Intermediate System Administration forthe Solaris 10 Operating System Copyright 2005 Sun Microsystems Inc. All Rights Reserved. Sun Services Revision Controlling System Access Entries in the etc and HOME .rhosts Files While the etc and HOME .rhosts files have the same format the same entries in each file have different effects. Both files are formatted as a list of one-line entries which can contain the following types of entries hostname hostname username If hostname is used then users with the same UID from that named host are granted access without a password. If hostname username is used then the named user from that named host is granted access without a password. Caution - If the sign is used this is granting any user from any host access without a password. This is particularly dangerous. The host names in the etc and HOME .rhosts files must be the official name of the host not one of its alias names. Note - When logging in to a number of different systems you can run the uname -n command to determine on which system you are currently logged in. The etc File Rules For regular users the etc file identifies remote hosts and remote users who are considered to be trusted. Note - The etc file is not checked at all if the remote user requesting local access is the root user. Performing System Security 11-19 Copyright 2005 Sun Microsystems Inc. All Rights Reserved. Sun Services Revision Controlling System Access If the local host s etc file contains the host name of a remote host then all regular users of that remote host are trusted and do not need to supply a password to log in to the local host. This is provided so that each remote user is known to the local host by having an entry in the local etc passwd file otherwise access is denied. .

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.