Administering
Client Daemon Performance
Table | (Continued) |
|
|
|
|
|
|
| Map Name | Benefits | Example |
| |||
|
|
| |
|
|
|
|
| group | Frequent file system | Removing a |
|
| access may request | member of a group |
|
| information about | may not be visible |
|
| groups that own | to the file system, |
|
| particular files. | until after the |
|
| Caching greatly | cache expires. |
|
| reduces this impact. | During this |
|
|
| window, a user |
|
|
| may be able to |
|
|
| access files or |
|
|
| other resources |
|
|
| based on his/her |
|
|
| group |
|
|
| membership, |
|
|
| which had been |
|
|
| revoked. |
|
|
|
|
| netgroup | netgroups can be | Similar to groups, |
|
| heavily used for | since netgroups |
|
| determining network | are used to control |
|
| file system access | access to |
|
| rights or user login | resources, |
|
| rights. Caching this | modification of |
|
| information greatly | these rights may |
|
| reduces this impact | not appear until |
|
|
| after cache |
|
|
| information has |
|
|
| expired. Users |
|
|
| may be allowed or |
|
|
| denied login even |
|
|
| their rights should |
|
|
| allow / deny |
|
|
| access, |
|
|
|
|
128 | Chapter 4 |