HP Workstation x4000 hp workstation x4000 - Linux getting started guide and wa - Page 36

Setting Up Network Authorization Parameters

Page 36 highlights

Linux System Setup and Recovery Configuring Your Linux Workstation Setting Up Network Authorization Parameters After typing your workstation's IP Address, Hostname, network Gateway, Netmask addresses and the Domain Name in the appropriate spaces, click on the tab "Authorization Parameters." Here is where you enable NIS, set up its parameters and other authentication parameters. If you choose to enable NIS, you will need to enter its domain name (see your network admin for more help), and optionally enter its server IP address or request it via broadcast. Check the "Use Shadow Passwords" and "Enable MD5 Passwords" boxes if appropriate. Click "Save" when satisfied, or "Cancel" if you want to skip this step. The files /etc/yp.conf, /etc/shadow and /etc/pam.d/passwd are modified with this step. 36 Chapter 2

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70

36
Chapter 2
Linux System Setup and Recovery
Configuring Your Linux Workstation
Setting Up Network Authorization Parameters
After typing your workstation’s IP Address, Hostname, network
Gateway, Netmask addresses and the Domain Name in the appropriate
spaces, click on the tab “Authorization Parameters.”
Here is where you enable NIS, set up its parameters and other
authentication parameters. If you choose to enable NIS, you will need to
enter its domain name (see your network admin for more help), and
optionally enter its server IP address or request it via broadcast.
Check the “Use Shadow Passwords” and “Enable MD5 Passwords” boxes
if appropriate.
Click “Save” when satisfied, or “Cancel” if you want to skip this step.
The files
/etc/yp.conf,
/etc/shadow
and
/etc/pam.d/passwd
are modified with this step.