By IBM Redbooks, Abhijit Chavan, International Business Machines Corporation
This IBM Redbook discusses interoperability by way of UNIX to UNIX pass platform facts sharing and user/system administration. This redbook additionally demonstrates the similarities and modifications among the AIX and Linux working platforms.
Read Online or Download AIX and Linux Interoperabilty PDF
Best unix books
It truly is little ask yourself that longtime home windows clients are migrating in droves to the recent Mac. they're uninterested with the virus-prone home windows lifestyle, and they are lured by means of Apple's genuinely-earned popularity for generating nice all-around desktops which are trustworthy, ordinary, good designed, and now - with the $500 Mac mini - super reasonable, too.
UNIX tricks & Hacks is designed to immediately gift you thru elevated productiveness and delight with UNIX. every trace and/or hack presents genuine worth - not only a listing of noticeable tactics marked as secrets and techniques. study UNIX management abilities you could observe day-by-day with UNIX workstations and servers.
Maximize all of the functions of sunlight Microsystems' loose, cutting edge, and strong UNIX-based working process with support from this authoritative consultant. Get complete information on set up, approach and equipment administration, entry keep an eye on and protection, networking, prone, directories, and functions. you are going to discover ways to make the most of the hot good points to be had in Solaris 10, together with the rewritten TCP/IP stack, the improved cryptographic framework, cross-platform optimization, Linux interoperability, and masses extra.
You will get this publication at no cost in the event you typed man+"command" in Linux window.
- Sams Teach Yourself Red Hat Linux Fedora in 24 Hours
- Linux Kernel in a Nutshell (In a Nutshell (O'Reilly))
- Sams Teach Yourself Linux Security Basics in 24 Hours
- Advanced Linux Programming
Additional resources for AIX and Linux Interoperabilty
Com), the configuration and setup are similar, and they can even share the LDAP configuration file. We illustrate the Linux security subsystem in Figure 2-6 on page 36. Chapter 2. 3 PAM and NSS LDAP modules on AIX The PAM LDAP module and AIX LDAP loadable authentication module authenticate users in very different ways. On the one hand, the PAM LDAP module authenticates users by trying to perform the LDAP bind operation as the given user. On the other hand, the AIX LDAP module (or, more precisely, the secldapclntd client side daemon) binds to the LDAP server as a privileged user, reads the user password, computes the hash of the user supplied password, and finally compares the two.
Our main objective is to deploy LDAP for this purpose and show how AIX and Linux hosts use LDAP for authentication. © Copyright IBM Corp. 2003. All rights reserved. 500 directories easier. The ISO standard and its Directory Access Protocol (DAP) are extremely complex specifications that define the protocol through all seven OSI layers. 500 directory services. It relied on the operating system networking stack (TCP/IP), supported only the most important DAP operations, and was therefore much easier to implement.
Figure 2-1 Web-based System Manager software install interface Initial configuration may be done using ldapxcfg (graphical interface) or ldapcfg (command line interface). In this step, you choose the administrator’s DN (default is cn=root), the password, a few database create options, and an HTTP server type. In Example 2-4 on page 24, we show one example initial configuration. Having an HTTP server is optional, but we strongly recommend you install one. Note that it is necessary to have the HTTP server in place before starting the initial configuration utility (ldapxcfg or ldapcfg) and that you must restart the server after the configuration.