about summary refs log tree commit diff
path: root/REORG.TODO/nis/nss
blob: 0ac6774a1ff29f012efaec9c4be1fcc3b83da7e8 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
# /etc/default/nss
# This file can theoretically contain a bunch of customization variables
# for Name Service Switch in the GNU C library.  For now there are only
# four variables:
#
# NETID_AUTHORITATIVE
#   If set to TRUE, the initgroups() function will accept the information
#   from the netid.byname NIS map as authoritative.  This can speed up the
#   function significantly if the group.byname map is large.  The content
#   of the netid.byname map is used AS IS.  The system administrator has
#   to make sure it is correctly generated.
#NETID_AUTHORITATIVE=TRUE
#
# SERVICES_AUTHORITATIVE
#   If set to TRUE, the getservbyname{,_r}() function will assume
#   services.byservicename NIS map exists and is authoritative, particularly
#   that it contains both keys with /proto and without /proto for both
#   primary service names and service aliases.  The system administrator
#   has to make sure it is correctly generated.
#SERVICES_AUTHORITATIVE=TRUE
#
# SETENT_BATCH_READ
#  If set to TRUE, various setXXent() functions will read the entire
#  database at once and then hand out the requests one by one from
#  memory with every getXXent() call.  Otherwise each getXXent() call
#  might result into a network communication with the server to get
#  the next entry.
#SETENT_BATCH_READ=TRUE
#
# ADJUNCT_AS_SHADOW
#  If set to TRUE, the passwd routines in the NIS NSS module will not
#  use the passwd.adjunct.byname tables to fill in the password data
#  in the passwd structure.  This is a security problem if the NIS
#  server cannot be trusted to send the passwd.adjuct table only to
#  privileged clients.  Instead the passwd.adjunct.byname table is
#  used to synthesize the shadow.byname table if it does not exist.
#ADJUNCT_AS_SHADOW=TRUE