36 Chapter 2
For example, user records for Tony Smith and Tom Smith contain the short name “tsmith”
and the password “smitty.”
When Tony logs in to his computer with a user name “tsmith” and the password “smitty,” he
is authenticated using the record in the Students domain. Similarly, Tom can use the same
login entries at his computer and be authenticated using his record in the root domain. If
Tony and Tom ever logged into each other’s computers using tsmith and smitty, they would
both be authenticated, but not with the desired results. Tony could access Tom’s files, and
vice versa.
Now let’s say that Tony and Tom have the same short name, but different passwords.
If Tom attempts to log in to Tony’s computer using the short name “tsmith” and his password
(smitty), his user record is masked by Tony’s user record in the Students domain. NetInfo
finds “tsmith” in Students, but its password does not match the one Tom used to log in. Tom
is denied access to Tony’s computer, and his record in the root domain is never found.
/
Students Faculty
Tony’s computer
Tony Smith (tsmith,smitty)
Tom Smith (tsmith,smitty)
Tom’s computer
/
Students Faculty
Tonys computer
Tony Smith (tsmith, tony)
Tom Smith (tsmith, smitty)
Toms computer