Apple Computer Tablet x User Manual Page 41

  • Download
  • Add to my manuals
  • Print
  • Page
    / 62
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 40
NetInfo Planning 41
Now suppose that a file, MyDoc, resides on a computer accessible to both Tony and Tom.
The file is owned by a user with the UID 127. It has read-only access privileges for
AllStudents. Tom is not a member of AllStudents, but the short name in his user record,
“tsmith,” is the same as Tony’s, who is in AllStudents.
When Tom attempts to access MyDoc, NetInfo searches the login hierarchy for user records
with short names that match those associated with AllStudents. Tom’s user record is found
because it resides in the login hierarchy, and the UID in the record is compared with Tom’s
login UID. They match, so Tom is allowed to read MyDoc, even though he’s not actually a
member of AllStudents.
The Next Step
After you have decided what the logical and physical topology of your NetInfo hierarchy
should look like and which administrative information to store in shared domains, you are
ready to set up your hierarchy. The next chapter tells you how.
Page view 40
1 2 ... 36 37 38 39 40 41 42 43 44 45 46 ... 61 62

Comments to this Manuals

No comments