Propagation

Monitoring Propagation

This can all be executed with shell scripts and cron jobs if desired.

238

Chapter 7

Page 238
Image 238
HP UX Kerberos Data Security Software manual 238