AIX and Linux Interoperabilty by IBM Redbooks, Abhijit Chavan, International Business

By IBM Redbooks, Abhijit Chavan, International Business Machines Corporation

This IBM Redbook discusses interoperability by way of UNIX to UNIX pass platform info sharing and user/system administration. This redbook additionally demonstrates the similarities and transformations among the AIX and Linux working structures.

Show description

Read Online or Download AIX and Linux Interoperabilty PDF

Similar unix books

Policy Routing Using Linux

Conventional IPv4 routing is summarized as "All routing is a vacation spot pushed process". whilst a router appears at an IPv4 packet it cares simply in regards to the vacation spot handle within the header of the packet. It makes use of this vacation spot handle to determine on the place to ahead the packet. yet what so that it will course packets in a different way based not just at the vacation spot addresses but in addition on different packet fields corresponding to resource deal with, IP protocol, delivery protocol ports or perhaps packet payload?

Linux and OpenVMS Interoperability. Tricks for Old Dogs, New Dogs and Hot Dogs with Open Systems

"I've came across this booklet to be a pragmatic, hands-on handbook that explains how OpenVMS procedure managers can combine their structures with Linux, permitting the 2 systems to paintings cooperatively and expand the processing potential of a computing atmosphere. John truly describes the positive aspects and merits of either working platforms, so you might overview which one is better for any given job.

Mac OS X Tiger: Missing Manual

You could set your watch to it: once Apple comes out with one other model of Mac OS X, David Pogue hits the streets with one other meticulous lacking handbook to hide it with a wealth of aspect. the hot Mac OS X 10. four, greater referred to as Tiger, is quicker than its predecessors, yet nothing's too quick for Pogue and Mac OS X: The lacking guide.

Extra info for AIX and Linux Interoperabilty

Sample text

To do this we need two terminals. pem -accept 2222 ... pem ... Timeout : 300 (sec) Verify return code: 0 (ok) --- Note that the server key must be readable by the slapd process, but other users should be denied read access. 0 runs as user ldap and group ldap. pem file must be available to all SSL clients and it should be transferred using ftp or a similar utility. In the case of the OpenSSL clients, just copy the PEM file to a convenient location. The AIX GS kit client requires a slightly different procedure.

Connected to r-linux. Escape character is '^]'. 25 [joe@localhost joe]$ Of course, the case is significant for passwords, because they are stored as hashes. 2 NAME 'posixGroup' SUP top STRUCTURAL DESC 'Abstraction of a group of accounts' MUST ( cn $ gidNumber ) MAY ( userPassword $ memberUid $ description ) ) Example 2-2 User LDIF entry dn: uid=joe,ou=People,dc=weeorg,dc=com uid: joe cn: Joe R. User objectClass: posixAccount objectClass: shadowAccount objectClass: top userPassword: {crypt}h/WA58b9dz5nI loginShell: /bin/ksh uidNumber: 1000 gidNumber: 100 homeDirectory: /home/users/joe gecos: Joe R.

That is why we discuss an alternative LDAP authentication method here. 1, “PAM modules and AIX” on page 9, how to compile and install the PAM LDAP module. The PAM LDAP module on AIX is accessible either directly through PAM enabled applications or through the AIX PAM loadable authentication module. conf configuration file. cfg files. We illustrate the differences in authentication between AIX and PAM applications in Figure 2-7 on page 37. conf. We show one possible configuration in Example 2-7.

Download PDF sample

Rated 4.64 of 5 – based on 7 votes