Services and Daemons", Expand section "12.2. Using Your Assigned A Virtual File System", Expand section "E.2. As far as I can tell, your. Then i want to connect to a database say "D1" You can use ldapsearch to query an AD Server. Using an Existing Key and Certificate, 18.1.12. Configuring the Internal Backup Method, 34.2.1.2. Basic Postfix Configuration", Collapse section "19.3.1.2. Example Usage", Expand section "17.2.3. Directories within /proc/", Expand section "E.3.1. I need to know what are the commands in Solaris to retrieve the below information about the hardware platform. To achieve that, you will need to make a bind request using the administrator account of the LDAP tree. Linux is a registered trademark of Linus Torvalds. Mail Transport Agents", Collapse section "19.3. You can find a description on the following link Sytem Accounting. (/home as default home directory ) However, on Solaris, you may have to determine the user ID, by determining the UID of the user logged-in through the command below. Top-level Files within the proc File System", Collapse section "E.2. Top-level Files within the proc File System", Expand section "E.3. cbssapr01:# pwd This is a small simple example bash script I made for pushing my code to my personal gitlab, it spits out my current username in my commit message. Configuring TLS (Transport Layer Security) Settings, 10.3.9.1.2. How do I get the current user's username in Bash? DHCP for IPv6 (DHCPv6)", Collapse section "16.5. Additional Resources", Expand section "VII. Internet Protocol version 6 (IPv6), 18.1.5.3. Fetchmail Configuration Options, 19.3.3.6. Any link to or advocacy of virus, spyware, malware, or phishing sites. On Solaris, it is a tool for writing to this table rather than a tool for reporting upon its contents. To subscribe to this RSS feed, copy and paste this URL into your RSS reader. Managing Users via the User Manager Application", Collapse section "3.2. Configure the Firewall for HTTP and HTTPS Using the Command Line, 18.1.13.1. WINS (Windows Internet Name Server), 21.1.10. Multiple login names are separated by Network Bridge with Bonded VLAN, 11.4. Configure the Firewall Using the Graphical Tool, 22.14.2. Securing Communication", Collapse section "19.5.1. Here is how you can list users and groups on Linux. Additional Resources", Collapse section "21.2.3. rpm -qpl