PreviousNext

Privileges Required

To use the NSI commands to access entries in a CDS database, you need access control list (ACL) permissions. Depending on the NSI operation, you need ACL permissions to the parent directory or the CDS object entry (the name service entry) or both. The ACL permissions are as follows:

· To create an entry, you need insert permission to the parent directory.

· To read an entry, you need read permission to the CDS object entry.

· To write to an entry, you need write permission to the CDS object entry.

· To delete an entry, you need delete permission either to the CDS object entry or to the parent directory.

Note that write permission does not imply read permission.

ACL permissions for the NSI commands of the control program are described in the reference pages.

Notes
A server entry equates to an NSI binding attribute and, optionally, an object attribute; a group equates to an NSI group attribute; and a profile equates to an NSI profile attribute. Typically, each server's entries, groups, and profiles reside in distinct name service entries.

Examples
The following command starts the RPC control program:

$ rpccp
rpccp>

The following command at the system prompt removes the entry /.:/LandS/anthro/Cal_host_2:

$ rpccp remove entry \
> /.:/LandS/anthro/Cal_host_2

Related Information
Commands:

dcecp(8dce)

add element(8rpc)

add entry(8rpc)

add mapping(8rpc)

add member(8rpc)

export(8rpc)

import(8rpc)

remove element(8rpc)

remove entry(8rpc)

remove group(8rpc)

remove mapping(8rpc)

remove member(8rpc)

remove profile(8rpc)

show entry(8rpc)

show group(8rpc)

show mapping(8rpc)

show profile(8rpc)

show server(8rpc)

unexport(8rpc)