Privileges Required
To use the NSI commands to access entries in a CDS database, you need access control list (ACL) permissions. Depending on the NSI operation, you need ACL permissions
to the parent directory or the CDS object entry (the name service entry) or both. The ACL permissions are as follows:
· To create an entry, you need insert permission to the parent directory.
· To read an entry, you need read permission to the CDS object entry.
· To write to an entry, you need write permission to the CDS object entry.
· To delete an entry, you need delete permission either to the CDS object entry or to the parent directory.
Note that write permission does not imply read permission.
ACL permissions for the NSI commands of the control program are described in the reference pages.
Notes A server entry equates to an NSI binding attribute and, optionally, an object attribute; a group equates to an NSI group attribute; and a
profile equates to an NSI profile attribute. Typically, each server's entries, groups, and profiles reside in distinct name service entries.
Examples The following command starts the RPC control program:
$ rpccp rpccp>
The following command at the system prompt removes the entry /.:/LandS/anthro/Cal_host_2:
$ rpccp remove entry \ > /.:/LandS/anthro/Cal_host_2
Related Information Commands:
dcecp(8dce)
add element(8rpc)
add entry(8rpc)
add mapping(8rpc)
add member(8rpc)
export(8rpc)
import(8rpc)
remove element(8rpc)
remove entry(8rpc)
remove group(8rpc)
remove mapping(8rpc)
remove member(8rpc)
remove profile(8rpc)
show entry(8rpc)
show group(8rpc)
show mapping(8rpc)
show profile(8rpc)
show server(8rpc)
unexport(8rpc)
|