38 lines
1.7 KiB
Plaintext
38 lines
1.7 KiB
Plaintext
# /etc/default/nss
|
|
# This file can theoretically contain a bunch of customization variables
|
|
# for Name Service Switch in the GNU C library. For now there are only
|
|
# four variables:
|
|
#
|
|
# NETID_AUTHORITATIVE
|
|
# If set to TRUE, the initgroups() function will accept the information
|
|
# from the netid.byname NIS map as authoritative. This can speed up the
|
|
# function significantly if the group.byname map is large. The content
|
|
# of the netid.byname map is used AS IS. The system administrator has
|
|
# to make sure it is correctly generated.
|
|
#NETID_AUTHORITATIVE=TRUE
|
|
#
|
|
# SERVICES_AUTHORITATIVE
|
|
# If set to TRUE, the getservbyname{,_r}() function will assume
|
|
# services.byservicename NIS map exists and is authoritative, particularly
|
|
# that it contains both keys with /proto and without /proto for both
|
|
# primary service names and service aliases. The system administrator
|
|
# has to make sure it is correctly generated.
|
|
#SERVICES_AUTHORITATIVE=TRUE
|
|
#
|
|
# SETENT_BATCH_READ
|
|
# If set to TRUE, various setXXent() functions will read the entire
|
|
# database at once and then hand out the requests one by one from
|
|
# memory with every getXXent() call. Otherwise each getXXent() call
|
|
# might result into a network communication with the server to get
|
|
# the next entry.
|
|
#SETENT_BATCH_READ=TRUE
|
|
#
|
|
# ADJUNCT_AS_SHADOW
|
|
# If set to TRUE, the passwd routines in the NIS NSS module will not
|
|
# use the passwd.adjunct.byname tables to fill in the password data
|
|
# in the passwd structure. This is a security problem if the NIS
|
|
# server cannot be trusted to send the passwd.adjuct table only to
|
|
# privileged clients. Instead the passwd.adjunct.byname table is
|
|
# used to synthesize the shadow.byname table if it does not exist.
|
|
ADJUNCT_AS_SHADOW=TRUE
|