1 .\" Copyright (C) 2006 Red Hat, Inc. All rights reserved.
2 .\" Author: Ulrich Drepper <drepper@redhat.com>
4 .\" %%%LICENSE_START(GPLv2_MISC)
5 .\" This copyrighted material is made available to anyone wishing to use,
6 .\" modify, copy, or redistribute it subject to the terms and conditions of the
7 .\" GNU General Public License v.2.
9 .\" This program is distributed in the hope that it will be useful, but WITHOUT
10 .\" ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 .\" FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 .\" You should have received a copy of the GNU General Public
15 .\" License along with this manual; if not, see
16 .\" <http://www.gnu.org/licenses/>.
19 .TH NSS 5 2020-06-09 "Linux" "Linux Programmer's Manual"
21 nss \- Name Service Switch configuration file
23 Each call to a function which retrieves data from a system database
24 like the password or group database is handled by the Name Service
25 Switch implementation in the GNU C library.
27 provided are implemented by independent modules, each of which
28 naturally varies widely from the other.
30 The default implementations coming with the GNU C library are by
31 default conservative and do not use unsafe data.
32 This might be very costly in some situations, especially when the databases
34 Some modules allow the system administrator to request
35 taking shortcuts if these are known to be safe.
36 It is then the system administrator's responsibility to ensure the assumption
39 There are other modules where the implementation changed over time.
40 If an implementation used to sacrifice speed for memory consumption,
41 it might create problems if the preference is switched.
45 file contains a number of variable assignments.
46 Each variable controls the behavior of one or more
48 White spaces are ignored.
49 Lines beginning with \(aq#\(aq
50 are treated as comments.
52 The variables currently recognized are:
54 \fBNETID_AUTHORITATIVE =\fR \fITRUE\fR|\fIFALSE\fR
55 If set to TRUE, the NIS backend for the
57 function will accept the information
60 NIS map as authoritative.
61 This can speed up the function significantly if the
66 map is used \fBas is\fR.
67 The system administrator has to make sure it is correctly generated.
69 \fBSERVICES_AUTHORITATIVE =\fR \fITRUE\fR|\fIFALSE\fR
70 If set to TRUE, the NIS backend for the
73 .BR getservbyname_r (3)
74 functions will assume that the
75 .I services.byservicename
76 NIS map exists and is authoritative, particularly
77 that it contains both keys with /proto and without /proto for both
78 primary service names and service aliases.
79 The system administrator has to make sure it is correctly generated.
81 \fBSETENT_BATCH_READ =\fR \fITRUE\fR|\fIFALSE\fR
82 If set to TRUE, the NIS backend for the
86 functions will read the entire database at once and then
87 hand out the requests one by one from memory with every corresponding
96 call might result in a network communication with the server to get
99 \fI/etc/default/nss\fR
101 The default configuration corresponds to the following configuration file:
105 NETID_AUTHORITATIVE=FALSE
106 SERVICES_AUTHORITATIVE=FALSE
107 SETENT_BATCH_READ=FALSE
111 .\" Ulrich Drepper <drepper@redhat.com>