Quoth guy keren on Tue, Apr 18, 2000:
> btw - does this architecture work for all programs on the system
> transparently? i.e. any program that tried to fetch any NIS map, will be
> refered to taking data via the LDAP server? in other words - are all NIS
> requests routed via ypbind, or they go directly to the (remote) NIS
> server?

All go via ypbind.  So this is less of a problem if you're
talking about accounting only.  It is possible to emulate ypbind
interface with a program which really connects to an LDAP server.

The main problem is proper authentication, such as RADIUS.  YP
authentication is almost like regular passwd/shadow
authentication, except that it distributes encrypted passwords
over the network to everyone who cares to ask for it.  A proper
authentication scheme whould use proper encryption and one-time
cookies sent from the clients to the server.  I don't know how
LDAP handles it, but I'm afraid it's similar to YP.

Vadik.

-- 
Prof:    So the American government went to IBM to come up with a data
         encryption standard and they came up with ...
Student: EBCDIC!

=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to