nis and kerberos
Hello everyone Tell me, do I understand correctly that these two protocols are used mainly for user authentication on the network? Are there any tricks (in particular for nis) that could, for example, help to spread the rules of contacting the repository for updates, or for example, after successful authentication, some file was copied to the user's home folder (for example, a directory with phone numbers of internal employees)?
|