3.26. ǧ¾Ú¤ÎÀßÄê

¥Ñ¡¼¥½¥Ê¥ë¥Ç¥£¥¹¥¯¥È¥Ã¥×¡¢¥ï¡¼¥¯¥¹¥Æ¡¼¥·¥ç¥ó¡¢¤Þ¤¿¤Ï¥µ¡¼¥Ð¡¼¤Î ¥¤¥ó¥¹¥È¡¼¥ë¤ò¼Â¹Ô¤·¤Æ¤¤¤ë¾ì¹ç¤Ï¡¢Ä¾ÀÜ ¹à3.27¤Ø¿Ê¤ó¤Ç¤¯¤À¤µ¤¤¡£

¥Í¥Ã¥È¥ï¡¼¥¯¥Ñ¥¹¥ï¡¼¥É¤òÀßÄꤷ¤Ê¤¤¾ì¹ç¡¢¤³¤Î¥»¥¯¥·¥ç¥ó ¤ÏÈô¤Ð¤¹¤³¤È¤¬¤Ç¤­¤Þ¤¹¡£ ÀßÄê¤ò¼Â¹Ô¤¹¤Ù¤­¤«Ê¬¤«¤é¤Ê¤¤¾ì¹ç ¤Ï¡¢¥·¥¹¥Æ¥à´ÉÍý¼Ô¤Ë¤ªÌ䤤¹ç¤ï¤»¤¯¤À¤µ¤¤¡£

NIS ¤Îǧ¾ÚÀßÄê¤ò¤·¤Æ¤¤¤ë¾ì¹ç¤ò½ü¤¤¤Æ¡¢ MD5¤È ¥·¥ã¥É¥¦ ¥Ñ¥¹¥ï¡¼¥É¤À¤±¤¬ÁªÂò¤µ¤ì¤Þ¤¹¡£ (¿Þ3-24¤ò»²¾È)¤´»ÈÍѤΥޥ·¥ó¤Î ¥»¥­¥å¥ê¥Æ¥£¤ò¤Ç¤­¤ë¤À¤±³ÎÊݤ¹¤ë¤¿¤á¤Ë¡¢Î¾Êý¤Î¥Ñ¥¹¥ï¡¼¥É ¤ò»ÈÍѤ¹¤ë¤³¤È¤ò¿äÁ¦¤·¤Þ¤¹¡£

NIS¥ª¥×¥·¥ç¥ó¤òÀßÄꤹ¤ë¤Ë¤Ï, NIS ¥Í¥Ã¥È¥ï¡¼¥¯¤ËÀܳ¤¹¤ë ɬÍפ¬¤¢¤ê¤Þ¤¹¡£NIS ¥Í¥Ã¥È¥ï¡¼¥¯¤ËÀܳ¤µ¤ì¤Æ¤¤¤ë¤«ÉÔÌÀ¤Ê ¾ì¹ç¤Ï¡¢¥·¥¹¥Æ¥à´ÉÍý¼Ô¤Ë¤ªÌ䤤¹ç¤ï¤»¤¯¤À¤µ¤¤¡£

¿Þ 3-24. ǧ¾Ú¤ÎÀßÄê

¥Æ¥£¥Ã¥×¥Ò¥ó¥È
 

¥¤¥ó¥¹¥È¡¼¥ë¤¬½ªÎ»¤·¤¿¸å¤Çǧ¾ÚÀßÄê¤ò Êѹ¹¤¹¤ë¤Ë¤Ï¡¢authconfig¥³¥Þ¥ó¥É¤ò»ÈÍѤ·¤Þ¤¹¡£

¥·¥§¥ë¥×¥í¥ó¥×¥È¤Ç authconfig¥³¥Þ¥ó¥É¤ò ÆþÎϤ·¤Þ¤¹¡£root¤Ç¤Ê¤¤¾ì¹ç¡¢Â³¹Ô¤¹¤ë¤Ë¤Ïroot¥Ñ¥¹¥ï¡¼¥É¤òÍ׵ᤵ¤ì¤Þ¤¹¡£