NIS Clear Filters

Browse free open source NIS software and projects below. Use the toggles on the left to filter open source NIS software by OS, license, language, programming language, and project status.

  • Case Management Software for Social Services Icon
    Case Management Software for Social Services

    For human services organizations looking for case management software

    Collaborate is customizable case management software for non-profits and social services agencies with teams of 5+ staff.
  • Find out just how much your login box can do for your customer | Auth0 Icon
    Find out just how much your login box can do for your customer | Auth0

    With over 53 social login options, you can fast-track the signup and login experience for users.

    From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
  • 1
    gnupasswd

    gnupasswd

    gnupasswd - gnu change user password

    /usr/bin/passwd offers a "safe way" for root to edit /etc/passwd (or shadow). If setuid it allows regular users to change passwd without asking root to do changes for them. gnupasswd - gnu change user password gnugpasswd - gnu change group password gnupasswd(1) has a goal to work with older login.c/linux and some newer too, also "getpwent" (any glibc). or help convert. gnupassd does pass only: leaves all else alone (compat). small, simpler for single admin / small linux bases. For example: it can make plain /etc/passwd plain text password file (still) or use shadow - (login.c may do both). A goal is to be old linux and no "depends problems" (ie, some required pam selinux audit kerb (+nis remove hacks) "to work as intended". These can contact remote computers during login if misconfigured and are complicated to configure (so that one knows what is allowed or not completely). gnupasswd has none of these (gnu has NIS, off by default)
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    QuTTY

    QuTTY

    Successor to PuTTY with advanced features similar to iterm2

    QuTTY is a multi-tabbed, multi-paned SSH/Telnet client with a terminal emulator. The goal is to support advanced features similar to iterm2. Just download and try it. If you see any issues you can install one of the Visual Studio runtimes VC++ 2012 or VC++ 2010. If you still face issues report it to us. Report any issues or feature-requests in issue-tracker. We need help from volunteers to find and fix any blocking issues, so that a stable release can be made soon.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    MACOW is a formal and scalable mandatory access implementation suitable on open worlds such as the provided on Semantic Web, Autonomic Computing and Coaltions and Federations scenarios. It is able to access control on distributed systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Tools for converting a Unix/Linux NIS environment to IPA (http://www.freeipa.org). Currently supports importing passwd, group, group members, hosts and netgroup NIS maps into IPA. IPA already contains support for importing automount maps.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
  • 5
    Perl tools for keeping an LDAP directory service in sync with NIS or any other text based naming service.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A non-compatible alternative for Sun's YP/NIS server/client. My implementation of this is to be simplistic, scalable, and secure. Everything I feel NIS lacked. **Interested developers are welcome to join the project!**
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    The project is to optimize both the Linux Workstation and School Server at for student usage. All the applications that were available would be systematically replaced with linux applications. The Network connections to the existing systems remain inta
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Zivios is a web based control panel which brings together vital open source technologies needed by medium and large enterprises. Zivios provides identity management,user, group and computer provisioning, as well as remote management of services.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This is a really simple BOOTP server, which uses NIS maps to retrieve host information (host name, IP address).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Holistically view your business data within a single solution. Icon
    Holistically view your business data within a single solution.

    For IT service providers and MSPs that need a data platform to manage their processes

    BrightGauge, a ConnectWise solution, was started in 2011 to fill a missing need in the small-to-medium IT Services industry: a better way to manage data and provide the value of work to clients. BrightGauge Software allows you to display all of your important business metrics in one place through the use of gauges, dashboards, and client reports. Used by more than 1,800 companies worldwide, BrightGauge integrates with popular business solutions on the market, like ConnectWise, Continuum, Webroot, QuickBooks, Datto, IT Glue, Zendesk, Harvest, Smileback, and so many more. Dig deeper into your data by adding, subtracting, multiplying, and dividing one metric against another. BrightGauge automatically computes these formulas for you. Want to show your prospects how quick you are to respond to tickets? Show off your data with embeddable gauges on public sites.
  • 10
    ldap nis 2 rfc2307bis

    ldap nis 2 rfc2307bis

    Migrate an ldap with nis schema to rfc2307bis schema

    A short script written in Python to migrate an ldap ldif file with nis schema to rfc2307bis schema. Synthax: ./ldap_nis_2_rfc2307bis.py <source ldif file> <dest ldif file>
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Users synchronization from LDAP server to local passwd file
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    nisldapd is a software daemon written in C for *nix systems that can provide user and group information via NIS/YP which is published in an LDAP datastore. The daemon runs only if there have been changes made in LDAP that are relevant to NIS/YP.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ypAnything is an NIS gateway to non-NIS sources, such as LDAP or a database. See the 'Home Page' tab (above) for HOW TO information
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    An easy to use GUI Control Panel for the YP Server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next

Open Source NIS Software Guide

Open source NIS (Network Information System) software is a widely used technology for providing distributed and secure user authentication, file sharing, and network services on servers. It is the successor of Network Information Service, or NIS+, which was developed in the mid-1980s. NIS is an important part of the client/server computing model in most business networks today.

NIS software provides access control to files stored on remote computers across a network, including passwords, user accounts, and other privileged data. It also allows users to access resources such as printers or applications located on different machines without having to supply their credentials each time they login. Additionally, it provides shared directories that can be accessed by multiple users at once while ensuring proper authorization levels are enforced between them. This simplified access helps reduce overhead associated with managing permissions on individual systems within a network.

In addition to offering authentication and authorization capabilities; NIS software can be used for system monitoring and diagnostics, application deployment management and server configuration tasks such as setting up email accounts or adjusting permissions on files stored across various hosts within the same environment. Open source implementations of this technology have increased its popularity due to their flexibility when configuring services specific to particular hardware configurations as well as architectures such as Linux or FreeBSD environments running over heterogeneous platforms like Windows NT/2000/XP/Vista and other operating systems like Sun Solaris . Generally these open source distributions provide more customization options than commercial ones since they are easily extensible based upon user needs not requirement by any vendor's licensing agreement . Furthermore many open source distributions come with support from developers who might use them for their own projects making maintenance easier compared with proprietary solutions where licensed expert help may need to be acquired depending upon problem complexity.

NIS software revolves around two main components: Client Software – A piece of code installed locally on every device connecting into the corporate network that authenticates it's host machine against a central directory service & Server Software – A computer running specialized programs that stores all authentications credentials centrally in order host lookups when there is a request locally or remotely from another machine connected over an IP address range specified by administrators typically using TCP port 1111 (RPC). The centralized directory service provided by an open source distribution runs continuously allowing changes made at one server instance propagate throughout entire infrastructure quickly while ensuring proper security protocols are always maintained keeping confidential information safe from unauthorized parties trying accessing information illegally even if its local’s IP address has been changed due make connectivity more efficient . Allowing admins manage settings both efficiently via GUI desktop tools available free with commercial version but also flexibly through scripts and programming language supported like PHP Perl etc allows tight control over corporate networks much simpler than manual intervention would require thus saving considerable amount money time spent maintaining large scale deployments environments where highly-critical applications data must remain secure ensure availability mission-critical business operations have never before achieved level ease convenience provided today’s powerful scalable NIS software products available public domain under licenses General Public License.

Open Source NIS Software Features

  • Secure Network Access: Open source NIS software provides secure network access to different users who have privileges on the system. It allows users to securely connect and use services across multiple networks without having to worry about unauthorized access or data loss.
  • Encryption: Open source NIS software provides high levels of encryption, ensuring that all data transmitted over the network is securely encrypted and cannot be seen by other users or hackers. This ensures that only your own systems can access the data, resulting in increased security overall.
  • Authentication: It also provides authentication features so that user accounts can be effectively managed and monitored using elaborate passwords and other such methods. Users are guaranteed secure passwords as well as regular password changes for optimal security.
  • User Management: User management tools are provided which allow for user management operations such as creating new user accounts, deleting existing ones, setting permissions, assigning roles etc., which help in making sure only authorized personnel have access to the system resources.
  • Backup & Restore: The open source NIS software also offers backup and restore functionality so you can protect your important data against malware or accidents. This allows you to create a backup of all important files periodically so you can quickly recover them in case something goes wrong.
  • Monitoring & Auditing: Open source NIS software also comes with monitoring and auditing features which help keep track of suspicious activities on the network by recording activity logs and automatically alerting administrators whenever something unusual occurs or a potential problem is detected.

Different Types of Open Source NIS Software

  • OpenLDAP: Is an open source implementation of the LDAP (Lightweight Directory Access Protocol) and is used to store directory information and provides authentication services.
  • Samba: It is a free, open-source software suite that allows systems running different operating systems to communicate with one another by providing file and printer sharing services.
  • MIT Kerberos: MIT Kerberos is an open source network authentication protocol designed as a secure method for authenticating users over insecure networks like the Internet. It is based on the Kerberos distributed security protocol which was developed at Massachusets Institute of Technology (MIT).
  • FreeIPA: FreeIPA is an open source identity management system that combines Linux, SSSD, MIT Kerberos, NTP and DNS server functionality together into a single integrated solution with additional extensions for managing user accounts, hosts and services.
  • YP/NIS: YP/NIS stands for "Yellow Pages/Network Information System". It consists of two components: the Network Information Service (NIS), which maintains directory information such as username-password associations; and the Yellow Pages service,which stores address or location information.

Advantages of Open Source NIS Software

  1. Low Cost: Open source NIS software is typically distributed without any cost, meaning companies can save on software expenses.
  2. Modularity: Open source NIS software offers greater modularity than proprietary alternatives, meaning users can customize their solutions to best fit the specific needs for their organization.
  3. Reliability: Because open source NIS software is free from vendor lock-in and often receives regular updates, it offers reliable performance and long-term stability.
  4. Security: Open source solutions are regularly audited by a community of developers and security experts who work together to identify and patch vulnerabilities in the code. This increases the overall security of the system when compared to other closed-source solutions.
  5. Scalability: The modular nature of open source NIS software allows users to scale up or down with ease as their organization’s needs change over time.
  6. Interoperability: Most open source projects come with detailed documentation outlining all necessary requirements and configurations so that they will easily interact with other systems and technologies in your environment.

What Types of Users Use Open Source NIS Software?

  • Hobbyists: These users are usually individuals who develop and use open source NIS software as a hobby. They may use the software for personal projects or to explore new technologies.
  • Developers: Developers use open source NIS software to create, modify, and extend existing applications. They have a deep knowledge of the platform and can easily integrate existing technologies with the latest versions of open source software.
  • IT Professionals: IT professionals often have an understanding of network topologies and protocols, making them well-suited for utilizing open source NIS solutions. They often maintain systems with this type of software and can adapt it to fit specific organizational needs.
  • System Integrators: System integrators work with large organizations to combine various systems into unified solutions tailored to meet their clients' needs. Given their familiarity with a range of solutions they are well-suited for utilizing open source NIS technology in order to create customized infrastructures that will best suit the organization’s requirements.
  • Security Experts: Security experts utilize advanced techniques such as encryption and authentication protocols in order to secure private data within an infrastructure using open source NIS solutions. With a detailed knowledge of the system they can deploy reliable security measures while also maintaining compliance standards set by government bodies or industry regulations.

How Much Does Open Source NIS Software Cost?

Open source Network Information Services (NIS) software is completely free of charge. There are no licensing fees or subscription charges associated with using open source NIS software, making it an incredibly cost effective solution for organisations looking to secure their network and maintain user accounts. Open source NIS software provides an array of features to protect networks, including the ability to manage user accounts and passwords, configuration files, printer queues, time zones, mapping services (automounts), and DNS/NTP services in a secure manner. Additionally, many of these applications offer customisable settings that allow each organisation to tailor its security policies according to specific requirements. With its wide range of available options and low price point compared to other commercial solutions, open source NIS software continues to be a popular choice for many businesses seeking reliable network security.

What Software Can Integrate With Open Source NIS Software?

Open source NIS software (Network Information System) is a client/server system for sharing key areas of the computer network domain information, such as users, passwords, and other security related information. There are many types of software that can be integrated with open source NIS software to improve the functionality of a computer network. These include user management solutions, authentication management solutions, identity and access management solutions, user provisioning systems, single sign-on systems and privileged account access systems. User management solutions enable administrators to create and manage individual user accounts in order to control access levels within the network. Authentication management solutions verify the identity of a connecting device before granting access rights to it. Identity and Access Management Solutions provide secure storage, control and monitoring over various objects within network domains (such as users). User provisioning systems allow administrators to define specific roles for individuals within different parts of the computer networks so they have appropriate privileges depending on their position in the system. Single Sign-On Systems provide an all-in-one platform where users just need one set of credentials to log into multiple applications or resources simultaneously without having to enter passwords repeatedly. Finally privileged account access systems help protect against malicious activity by providing secure password resets for privileged accounts that require special encrypted passwords for authorization purposes.

What Are the Trends Relating to Open Source NIS Software?

  1. Increased Adoption: Open source NIS software has become more widely adopted due to its cost-effectiveness, reliability, and flexibility. It is now used by many organizations for their networking needs, from small businesses to large enterprises.
  2. Improved Performance: Open source NIS software has improved in performance over the years. It is now capable of handling large amounts of data and providing greater security and reliability than ever before.
  3. Enhanced Security: Open source NIS software has enhanced security features, such as stronger authentication protocols, encryption algorithms, and firewalls. This makes it a great choice for organizations that need to protect their sensitive data.
  4. Cross-Platform Compatibility: Open source NIS software is increasingly compatible with different operating systems, so it can be used on a variety of devices. This makes it easier to deploy and maintain across different platforms.
  5. Increased Mobility: Open source NIS software can provide remote access to networks, allowing users to access resources from anywhere in the world. This makes it easier for employees to stay connected while they are on the go.
  6. Improved Support: With open source NIS software comes improved support from both vendors and the community at large. This provides better assistance when issues arise and allows for faster resolution times.

How To Get Started With Open Source NIS Software

Getting started with using open source NIS software is straightforward and easy. Begin by downloading the NIS software package of your choice. Most download packages include both server and client components, so be sure to select the right one for your environment. Once downloaded, start the installation process. Depending on the package, this may involve accepting a license agreement or manually configuring certain settings such as domain name or server IP address.

Next, configure your computer's operating system to accept passwords from a NIS server, which generally requires editing of configuration files in /etc/nsswitch.conf and /etc/yp.conf directories. On Windows machines this can be done through registry entries or Active Directory integration tools provided by most vendors of enterprise grade NIS implementations. If you’re setting up a simple network with only two computers (one as NIS server and another as client) then usually all you need do is enable Networking Support in System Preferences on Macs, which turns on basic client-level support for binding to a local host (the NIS server).

At this point authentication via LDAP should work, but user accounts won't yet have access to shared resources like files stored on other servers that have been set up with same user accounts; this will require configuring directory service connections between them (which ordinarily requires running adsetup commands from a root shell for Mac OS X). Now you're ready to go! You can log in with any account specified in the database definition file — no extra steps are required for users already listed there since their information will already exist on both sides of the connection (as long as all systems involved share common services such as LDAP).