1 .\" Copyright (c) 1995, 1996
2 .\" Bill Paul <wpaul@ctr.columbia.edu>. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by Bill Paul.
15 .\" 4. Neither the name of the University nor the names of its contributors
16 .\" may be used to endorse or promote products derived from this software
17 .\" without specific prior written permission.
19 .\" THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ``AS IS'' AND
20 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 .\" ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul OR CONTRIBUTORS BE LIABLE
23 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 .\" $Id: mknetid.8,v 1.5 1998/03/19 07:37:10 charnier Exp $
38 .Nd "generate netid map data"
42 .Op Fl g Ar group_file
43 .Op Fl p Ar passwd_file
44 .Op Fl h Ar hosts_file
45 .Op Fl n Ar netid_file
49 processes the contents of the
55 files into the format used to generate the
58 map. This map is used to hold credential information for both users
59 and hosts in a operating system independent format.
63 command checks for duplicate occurances of netids and filters
68 command prints its results on the standard output. It is usually called
78 command supports the following options:
79 .Bl -tag -width indent
83 prints a warning message when it encounters a duplicate netid.
84 This flag turns on 'quiet' mode, allowing the warnings to be
85 surpressed. Other error messages may still be generated.
86 .It Fl g Ar group_file
87 Specify the location of the group information
88 file. The compiled-in default is
90 .It Fl p Ar passwd_file
91 Specify the location of the passwd information
92 file. The compiled-in default is
94 .It Fl h Ar hosts_file
95 Specify the location of the hosts database
96 file. The compiled-in default is
98 .It Fl n Ar netid_file
99 Specify the location of the netid information
100 file. The compiled-in default is
102 Note that no error is generated if the netid database can't be
103 found. The netid database is not likely to be present on most systems
111 command uses the system domainname when generating netid records. If
112 the system domainname is not set, the domain must be specified on the
113 command line with the
115 flag. If the domainname is set, the
117 flag may be used to override it.
120 .Bl -tag -width /var/yp/Makefile -compact
121 .It Pa /var/yp/Makefile
122 the Makefile that calls
130 the default group database file
132 the default passwd database file
134 the default hosts database file
136 the default netid database file
142 .An Bill Paul Aq wpaul@ctr.columbia.edu