On 11/05/2018 12:24 AM, Mantas Mikulėnas wrote: > There was `ypcat passwd`, wasn't there? I suppose. I don't have any first hand experience with NIS(+). So I'm trying to learn vicariously through others before I dive into any end of pool that is my lab network. > I would say that expecting to just pull password hashes from the directory > service – using it as nothing more than networked /etc/shadow – is > a bad approach to begin with. Let the client handle authentication via > Kerberos (or via whatever else is apropriate for AD). I think I naively thought there was some level of detail(s) sent between the client and the server such that the server would only return the pertinent information of the user being ypcated. Thus (hopefully) preventing seeing other people's shadow information. > Could you elaborate on that? I thought that I'd seen equipment that /only/ used LDAP but had templates for the query to sidle up to AD's LDAP and things just worked. I.e. you filled in enough details so that the template could construct the proper LDAP query. This obviously is not joined to an AD domain and is really just an LDAP client. (No Kerberos.) -- Grant. . . . unix || die