home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!haven.umd.edu!umd5!oberon.umd.edu!matthews
- From: matthews@oberon.umd.edu (Mike Matthews)
- Newsgroups: comp.sys.next.misc
- Subject: NetInfo trusted_networks enhancement
- Message-ID: <14678@umd5.umd.edu>
- Date: 27 Jul 92 19:19:11 GMT
- Sender: news@umd5.umd.edu
- Lines: 23
- Originator: matthews@oberon.umd.edu
-
- Does anyone know if NeXTs plans on refining access restrictions to NetInfo?
- There's trusted_networks but that's pretty coarse. How about a trusted_users
- property, for each NetInfo directory?
-
- And, on a related note, NeXT said they were going POSIX compliant sometime in
- the "near" future... did they say anything about C2 as well? If so (or even
- if not, so I guess it's a boolean certainty, this question coming up) any
- plans for a shadow password type deal, so that the encrypted passwords are
- stored either in a secure NetInfo directory (if such a thing can exist) or
- somewhere else?
-
- Why am I asking all these questions? I dunno...
-
- Thanks for any information.
- ------
- Mike Matthews, matthews@oberon.umd.edu (NeXTmail accepted)
- ------
- In the pitiful, multipage, connection-boxed form to which the flowchart has
- today been elaborated, it has proved to be useless as a design tool --
- programmers draw flowcharts after, not before, writing the programs they
- describe.
- - Fred Brooks, Jr.
-
-