[PDF] OpenLDAP Software 2.5 Administrators Guide





Previous PDF Next PDF



Integrating OpenLDAP and Samba Active Directory in Univention

24 août 2017 » Obstacle II: Differing LDAP server implementations metadata etc. Page 7. 7 www.univention.com. OpenLDAP Replication in ...



OpenLDAP Software 2.5 Administrators Guide

19 janv. 2022 It is possible to replicate data from an LDAP directory server to a X.500 DAP ... saslauthd.conf that uses Microsoft Active Directory (AD):.



Read Online Ocfs2 Installation Guide For Windows [PDF] - covid19

il y a 6 jours What You'll Learn Integrate LDAP with PAM and NSS and with Active Directory and Kerberos Manage OpenLDAP replication and server performance ...



Lightweight Directory Access Protocol

22 janv. 2006 Caractéristiques d'Active directory . ... réplication d'un serveur DSA maître vers un autre serveur miroir. 2.2 La naissance de LDAP.



OpenLDAP Software 2.4 Administrators Guide

Replicated Directory Service. Converting old style slapd.conf(5) file to cn=config format. ... saslauthd.conf that uses Microsoft Active Directory (AD):.



An OpenLDAP backend for Samba 4

how to setup a Samba4 DC. ? [MS-ADTS]: Active Directory Technical. Specification. ? [MS-DRSR]: Directory Replication Service (DRS). Remote Protocol.



OpenLDAP Software 2.3 Administrators Guide

It is possible to replicate data from an LDAP directory server to a X.500 DAP it remains active and periodically checks to see if new entries have been ...



OpenLDAP Software 2.6 Administrators Guide

19 janv. 2022 It is possible to replicate data from an LDAP directory server to a X.500 DAP ... saslauthd.conf that uses Microsoft Active Directory (AD):.



Note technique Recommandations de sécurité relatives à Active

19 août 2014 Le KCC utilise les objets de l'annuaire AD tels que les liens de sites et les serveurs tête de pont pour définir cette topologie de réplication.



Which directory

Replication—OpenLDAP uses single master SLAPD supports replication to X.500 directories ... Active Directory (AD) Microsoft's initial foray into.



  • Provider Configuration - Replication User

    Both replication strategies will need a replication user, as well as updates to the ACLs and limits regarding this user. To create the replication user, save the following contents to a file called replicator.ldif: Then add it with ldapadd: Now set a password for it with ldappasswd: The next step is to give this replication user the correct privile...

  • Provider Configuration - Standard Replication

    The remaining configuration for the provider using standard replication is to add the syncprov overlay on top of the dc=example,dc=comdatabase. Create a file called provider_simple_sync.ldifwith this content: Add the new content: The Provider is now configured.

  • Consumer Configuration - Standard Replication

    Install the software by going through the installation steps. Make sure schemas and the database suffix are the same, and enable TLS. Create an LDIF file with the following contents and name it consumer_simple_sync.ldif: Ensure the following attributes have the correct values: 1. provider: Provider server’s hostname – ldap01.example.comin this exam...

  • Provider Configuration - Delta Replication

    The remaining provider configuration for delta replication is: 1. Create a new database called accesslog 2. Add the syncprov overlay on top of the accesslog and dc=example,dc=comdatabases 3. Add the accesslog overlay on top of the dc=example,dc=comdatabase

  • Consumer Configuration

    Install the software by going through the installation steps. Make sure schemas and the database suffix are the same, and enable TLS. Create an LDIF file with the following contents and name it consumer_sync.ldif: Ensure the following attributes have the correct values: 1. provider: Provider server’s hostname – ldap01.example.comin this example – o...

  • Testing

    Once replication starts, you can monitor it by running: On both the provider and the consumer. Once the contextCSNvalue for both match, both trees are in sync. Every time a change is done in the provider, this value will change and so should the one in the consumer(s). If your connection is slow and/or your LDAP database large, it might take a whil...

What is a replicated directory in OpenLDAP?

Replicated directories are a fundamental requirement for delivering a resilient enterprise deployment. OpenLDAPhas various configuration options for creating a replicated directory. In previous releases, replication was discussed in terms of a masterserver and some number of slaveservers.

How does LDAP replication work?

This is done through LDAP replication. Replication is achieved via the Sync replication engine, syncrepl. This allows changes to be synchronised using a Consumer - Provider model. A detailed description of this replication mechanism can be found in the OpenLDAP administrator’s guide and in its defining RFC 4533.

Can OpenLDAP multi-master replication be split-brain?

OpenLDAP Multi-Master Replication is for high availability, not load balancing. If a split-brain is possible, consider the mirror mode architecture described in the OpenLDAP Administrator’s Guide. A split-brain is where two or more nodes of a cluster are operating independently, which can cause the cluster data to become corrupt or out of sync.

What is LDAP syncrepl?

18.1.1. LDAP Sync Replication The LDAP SyncReplication engine, syncreplfor short, is a consumer-side replication engine that enables the consumer LDAPserver to maintain a shadow copy of a DITfragment. A syncrepl engine resides at the consumer and executes as one of the slapd(8) threads.

OpenLDAP Software 2.5 Administrator"s Guide

19 January 2022

Table of Contents

Table of Contents.....................................................................................................................................1

Scope of this Document...........................................................................................................................1

About this document................................................................................................................................3

1. Introduction to OpenLDAP Directory Services...........................................................................................3

1.1. What is a directory service?..............................................................................................................3

1.2. What is LDAP?.................................................................................................................................6

1.3. When should I use LDAP?...............................................................................................................6

1.4. When should I not use LDAP?.........................................................................................................6

1.5. How does LDAP work?....................................................................................................................7

1.6. What about X.500?...........................................................................................................................7

1.7. What is the difference between LDAPv2 and LDAPv3?.................................................................7

1.8. LDAP vs RDBMS............................................................................................................................9

1.9. What is slapd and what can it do?...................................................................................................10

1.10. What is lloadd and what can it do?...............................................................................................11

2. A Quick-Start Guide.....................................................................................................................................15

3. The Big Picture - Configuration Choices....................................................................................................15

3.1. Local Directory Service..................................................................................................................15

3.2. Local Directory Service with Referrals..........................................................................................15

3.3. Replicated Directory Service..........................................................................................................16

3.4. Distributed Local Directory Service...............................................................................................17

4. Building and Installing OpenLDAP Software............................................................................................17

4.1. Obtaining and Extracting the Software...........................................................................................17

4.2. Prerequisite software.......................................................................................................................17

4.2.4. Database Software.................................................................................................................18

4.2.5. Threads..................................................................................................................................18

4.2.6. TCP Wrappers.......................................................................................................................19

4.3. Running configure..........................................................................................................................19

4.4. Building the Software.....................................................................................................................20

4.5. Testing the Software.......................................................................................................................20

4.6. Installing the Software....................................................................................................................21

5. Configuring slapd..........................................................................................................................................21

5.1. Configuration Layout......................................................................................................................23

5.2. Configuration Directives.................................................................................................................24

5.2.1. cn=config...............................................................................................................................25

5.2.2. cn=module.............................................................................................................................26OpenLDAP Software 2.5 Administrator"s Guide

i

Table of Contents

5. Configuring slapd

5.2.3. cn=schema.............................................................................................................................27

5.2.4. Backend-specific Directives..................................................................................................27

5.2.5. Database-specific Directives.................................................................................................32

5.2.6. MDB Backend Directives.....................................................................................................33

5.2.7. MDB Database Directives.....................................................................................................36

5.3. Configuration Example...................................................................................................................38

5.4. Converting old style slapd.conf(5) file to cn=config format..........................................................39

5.5. Recovering from a broken configuration........................................................................................39

5.5.1. Generate an ldif version of the configuration database and reload from that.......................39

5.5.2. Modify config in-place..........................................................................................................40

5.5.3. Recover with plain back-ldif.................................................................................................41

6. The slapd Configuration File.......................................................................................................................41

6.1. Configuration File Format..............................................................................................................42

6.2. Configuration File Directives.........................................................................................................42

6.2.1. Global Directives...................................................................................................................44

6.2.2. General Backend Directives..................................................................................................45

6.2.3. General Database Directives.................................................................................................49

6.2.4. MDB Backend Directives.....................................................................................................50

6.2.5. MDB Database Directives.....................................................................................................53

6.3. Configuration File Example............................................................................................................55

7. Running slapd................................................................................................................................................55

7.1. Command-Line Options.................................................................................................................57

7.2. Starting slapd..................................................................................................................................57

7.3. Stopping slapd.................................................................................................................................59

8. Access Control...............................................................................................................................................59

8.1. Introduction.....................................................................................................................................59

8.2. Access Control via Static Configuration.........................................................................................60

8.2.1. What to control access to.......................................................................................................61

8.2.2. Who to grant access to...........................................................................................................62

8.2.3. The access to grant................................................................................................................62

8.2.4. Access Control Evaluation....................................................................................................63

8.2.5. Access Control Examples......................................................................................................64

8.3. Access Control via Dynamic Configuration...................................................................................65

8.3.1. What to control access to.......................................................................................................66

8.3.2. Who to grant access to...........................................................................................................67

8.3.3. The access to grant................................................................................................................67

8.3.4. Access Control Evaluation....................................................................................................68

8.3.5. Access Control Examples......................................................................................................69

8.3.6. Access Control Ordering.......................................................................................................70

8.4. Access Control Common Examples...............................................................................................70

8.4.1. Basic ACLs............................................................................................................................71

8.4.2. Matching Anonymous and Authenticated users....................................................................71

8.4.3. Controlling rootdn access......................................................................................................72

8.4.4. Managing access with Groups...............................................................................................73OpenLDAP Software 2.5 Administrator"s Guide

ii

Table of Contents

8. Access Control

8.4.5. Granting access to a subset of attributes...............................................................................73

8.4.6. Allowing a user write to all entries below theirs...................................................................73

8.4.7. Allowing entry creation.........................................................................................................75

8.4.8. Tips for using regular expressions in Access Control...........................................................76

8.4.9. Granting and Denying access based on security strength factors (ssf).................................76

8.4.10. When things aren"t working as expected.............................................................................77

8.5. Sets - Granting rights based on relationships..................................................................................77

8.5.1. Groups of Groups..................................................................................................................78

8.5.2. Group ACLs without DN syntax...........................................................................................79

8.5.3. Following references.............................................................................................................81

9. Limits.............................................................................................................................................................81

9.1. Introduction.....................................................................................................................................81

9.2. Soft and Hard limits........................................................................................................................81

9.3. Global Limits..................................................................................................................................82

9.3.1. Special Size Limits................................................................................................................82

9.4. Per-Database Limits........................................................................................................................83

9.4.1. Specify who the limits apply to.............................................................................................83

9.4.2. Specify time limits.................................................................................................................83

9.4.3. Specifying size limits............................................................................................................84

9.5. Example Limit Configurations.......................................................................................................84

9.5.1. Simple Global Limits............................................................................................................84

9.5.2. Global Hard and Soft Limits.................................................................................................84

9.5.3. Giving specific users larger limits.........................................................................................84

9.5.4. Limiting who can do paged searches....................................................................................85

9.6. Glued/Subordinate database configurations...................................................................................85

9.7. Further Information.........................................................................................................................87

10. Database Creation and Maintenance Tools..............................................................................................87

10.1. Creating a database over LDAP....................................................................................................88

10.2. Creating a database off-line..........................................................................................................89

10.2.1. Theslapadd program...........................................................................................................90

10.2.2. Theslapindex program........................................................................................................90

10.2.3. Theslapcat program............................................................................................................90

10.3. The LDIF text entry format...........................................................................................................93

11. Backends......................................................................................................................................................93

11.1. LDAP............................................................................................................................................93

11.1.1. Overview.............................................................................................................................93

11.1.2. back-ldap Configuration......................................................................................................94

11.1.3. Further Information.............................................................................................................94

11.2. LDIF..............................................................................................................................................94

11.2.1. Overview.............................................................................................................................94

11.2.2. back-ldif Configuration.......................................................................................................95

11.2.3. Further Information.............................................................................................................95

11.3. LMDB...........................................................................................................................................95

11.3.1. Overview.............................................................................................................................95OpenLDAP Software 2.5 Administrator"s Guide

iii

Table of Contents

11. Backends

11.3.2. back-mdb Configuration......................................................................................................96

11.3.3. Further Information.............................................................................................................96

11.4. Metadirectory................................................................................................................................96

11.4.1. Overview.............................................................................................................................96

11.4.2. back-meta Configuration.....................................................................................................96

11.4.3. Further Information.............................................................................................................96

11.5. Monitor.........................................................................................................................................96

11.5.1. Overview.............................................................................................................................97

11.5.2. back-monitor Configuration................................................................................................98

11.5.3. Further Information.............................................................................................................98

11.6. Null...............................................................................................................................................98

11.6.1. Overview.............................................................................................................................98

11.6.2. back-null Configuration......................................................................................................98

11.6.3. Further Information.............................................................................................................99

11.7. Passwd..........................................................................................................................................99

11.7.1. Overview.............................................................................................................................99

11.7.2. back-passwd Configuration.................................................................................................99

11.7.3. Further Information.............................................................................................................99

11.8. Perl................................................................................................................................................99

11.8.1. Overview...........................................................................................................................100

11.8.2. back-perl Configuration....................................................................................................100

11.8.3. Further Information...........................................................................................................100

11.9. Relay...........................................................................................................................................100

11.9.1. Overview...........................................................................................................................100

11.9.2. back-relay Configuration...................................................................................................100

11.9.3. Further Information...........................................................................................................100

11.10. SQL...........................................................................................................................................100

11.10.1. Overview.........................................................................................................................101

11.10.2. back-sql Configuration....................................................................................................102

11.10.3. Further Information.........................................................................................................103

12. Overlays.....................................................................................................................................................104

12.1. Access Logging...........................................................................................................................104

12.1.1. Overview...........................................................................................................................104

12.1.2. Access Logging Configuration..........................................................................................105

12.1.3. Further Information...........................................................................................................105

12.2. Audit Logging.............................................................................................................................105

12.2.1. Overview...........................................................................................................................106

12.2.2. Audit Logging Configuration............................................................................................106

12.2.3. Further Information...........................................................................................................106

12.3. Chaining......................................................................................................................................107

12.3.1. Overview...........................................................................................................................107

12.3.2. Chaining Configuration.....................................................................................................108

12.3.3. Handling Chaining Errors.................................................................................................108

12.3.4. Read-Back of Chained Modifications...............................................................................108

12.3.5. Further Information...........................................................................................................108

12.4. Constraints..................................................................................................................................108OpenLDAP Software 2.5 Administrator"s Guide

iv

Table of Contents

12. Overlays

12.4.1. Overview...........................................................................................................................109

12.4.2. Constraint Configuration...................................................................................................109

12.4.3. Further Information...........................................................................................................109

12.5. Dynamic Directory Services.......................................................................................................109

12.5.1. Overview...........................................................................................................................109

12.5.2. Dynamic Directory Service Configuration........................................................................111

12.5.3. Further Information...........................................................................................................111

12.6. Dynamic Groups.........................................................................................................................111

12.6.1. Overview...........................................................................................................................111

12.6.2. Dynamic Group Configuration..........................................................................................111

12.7. Dynamic Lists.............................................................................................................................111

12.7.1. Overview...........................................................................................................................111

12.7.2. Dynamic List Configuration..............................................................................................113

12.7.3. Further Information...........................................................................................................113

12.8. Reverse Group Membership Maintenance..................................................................................113

12.8.1. Overview...........................................................................................................................113

12.8.2. Member Of Configuration.................................................................................................114

12.8.3. Further Information...........................................................................................................114

12.9. The Proxy Cache Engine............................................................................................................114

12.9.1. Overview...........................................................................................................................115

12.9.2. Proxy Cache Configuration...............................................................................................117

12.9.3. Further Information...........................................................................................................117

12.10. Password Policies.....................................................................................................................117

12.10.1. Overview.........................................................................................................................118

12.10.2. Password Policy Configuration.......................................................................................120

12.10.3. Further Information.........................................................................................................120

12.11. Referential Integrity..................................................................................................................120

12.11.1. Overview.........................................................................................................................120

12.11.2. Referential Integrity Configuration.................................................................................122

12.11.3. Further Information.........................................................................................................122

12.12. Return Code..............................................................................................................................122

12.12.1. Overview.........................................................................................................................122

12.12.2. Return Code Configuration.............................................................................................123

12.12.3. Further Information.........................................................................................................123

12.13. Rewrite/Remap.........................................................................................................................123

12.13.1. Overview.........................................................................................................................123

12.13.2. Rewrite/Remap Configuration........................................................................................123

12.13.3. Further Information.........................................................................................................123

12.14. Sync Provider............................................................................................................................123

12.14.1. Overview.........................................................................................................................123

12.14.2. Sync Provider Configuration...........................................................................................124

12.14.3. Further Information.........................................................................................................124

12.15. Translucent Proxy.....................................................................................................................124

12.15.1. Overview.........................................................................................................................124

12.15.2. Translucent Proxy Configuration....................................................................................126

12.15.3. Further Information.........................................................................................................126

12.16. Attribute Uniqueness................................................................................................................126OpenLDAP Software 2.5 Administrator"s Guide

v

Table of Contents

12. Overlays

12.16.1. Overview.........................................................................................................................126

12.16.2. Attribute Uniqueness Configuration...............................................................................127

12.16.3. Further Information.........................................................................................................127

12.17. Value Sorting............................................................................................................................127

12.17.1. Overview.........................................................................................................................127

12.17.2. Value Sorting Configuration...........................................................................................128

12.17.3. Further Information.........................................................................................................128

12.18. Overlay Stacking.......................................................................................................................129

12.18.1. Overview.........................................................................................................................129

12.18.2. Example Scenarios..........................................................................................................131

13. Schema Specification................................................................................................................................131

13.1. Distributed Schema Files............................................................................................................131

13.2. Extending Schema......................................................................................................................132

13.2.1. Object Identifiers...............................................................................................................133

13.2.2. Naming Elements..............................................................................................................133

13.2.3. Local schema file...............................................................................................................133

13.2.4. Attribute Type Specification.............................................................................................136

13.2.5. Object Class Specification.................................................................................................137

13.2.6. OID Macros.......................................................................................................................139

14. Security Considerations............................................................................................................................139

14.1. Network Security........................................................................................................................139

14.1.1. Selective Listening............................................................................................................139

14.1.2. IP Firewall.........................................................................................................................139

14.1.3. TCP Wrappers...................................................................................................................140

14.2. Data Integrity and Confidentiality Protection.............................................................................140

14.2.1. Security Strength Factors..................................................................................................140

14.3. Authentication Methods..............................................................................................................140

14.3.1. "simple" method................................................................................................................141

14.3.2. SASL method....................................................................................................................141

14.4. Password Storage........................................................................................................................142

14.4.1. SSHA password storage scheme.......................................................................................142

14.4.2. CRYPT password storage scheme....................................................................................142

14.4.3. MD5 password storage scheme.........................................................................................142

14.4.4. SMD5 password storage scheme.......................................................................................143

14.4.5. SHA password storage scheme.........................................................................................143

14.4.6. SASL password storage scheme........................................................................................143

14.5. Pass-Through authentication.......................................................................................................143

14.5.1. Configuring slapd to use an authentication provider.........................................................144

14.5.2. Configuring saslauthd........................................................................................................144

14.5.3. Testing pass-through authentication..................................................................................147

15. Using SASL................................................................................................................................................147

15.1. SASL Security Considerations...................................................................................................148

15.2. SASL Authentication..................................................................................................................148

15.2.1. GSSAPI.............................................................................................................................149OpenLDAP Software 2.5 Administrator"s Guide

vi

Table of Contents

15. Using SASL

15.2.2. KERBEROS_V4...............................................................................................................150

15.2.3. DIGEST-MD5...................................................................................................................151

15.2.4. EXTERNAL......................................................................................................................152

15.2.5. Mapping Authentication Identities....................................................................................153

15.2.6. Direct Mapping..................................................................................................................153

15.2.7. Search-based mappings.....................................................................................................155

15.3. SASL Proxy Authorization.........................................................................................................155

15.3.1. Uses of Proxy Authorization.............................................................................................156

15.3.2. SASL Authorization Identities..........................................................................................156

15.3.3. Proxy Authorization Rules................................................................................................159

16. Using TLS..................................................................................................................................................159

16.1. TLS Certificates..........................................................................................................................159

16.1.1. Server Certificates.............................................................................................................159

16.1.2. Client Certificates..............................................................................................................159

16.2. TLS Configuration......................................................................................................................159

16.2.1. Server Configuration.........................................................................................................161

16.2.2. Client Configuration..........................................................................................................163

17. Constructing a Distributed Directory Service........................................................................................163

17.1. Subordinate Knowledge Information..........................................................................................163

17.2. Superior Knowledge Information...............................................................................................164

17.3. The ManageDsaIT Control.........................................................................................................165

18. Replication.................................................................................................................................................165

18.1. Replication Technology..............................................................................................................165

18.1.1. LDAP Sync Replication....................................................................................................168

18.2. Deployment Alternatives............................................................................................................169

18.2.1. Delta-syncrepl replication.................................................................................................169

18.2.2. N-Way Multi-Provider Replication...................................................................................170

18.2.3. Mirror mode replication....................................................................................................171

18.2.4. Syncrepl Proxy Mode........................................................................................................171

18.3. Configuring the different replication types.................................................................................171

18.3.1. Syncrepl.............................................................................................................................173

18.3.2. Delta-syncrepl...................................................................................................................175

18.3.3. N-Way Multi-Provider......................................................................................................177

18.3.4. Mirror mode......................................................................................................................179

18.3.5. Syncrepl Proxy..................................................................................................................185

19. Maintenance..............................................................................................................................................185

19.1. Directory Backups......................................................................................................................185

19.2. Checkpointing.............................................................................................................................185

19.3. Migration....................................................................................................................................187

20. Monitoring.................................................................................................................................................187

20.1. Monitor configuration via cn=config(5).....................................................................................187

20.2. Monitor configuration via slapd.conf(5).....................................................................................188OpenLDAP Software 2.5 Administrator"s Guide

vii

Table of Contents

20. Monitoring

20.3. Accessing Monitoring Information.............................................................................................189

20.4. Monitor Information...................................................................................................................190

20.4.1. Backends...........................................................................................................................191

20.4.2. Connections.......................................................................................................................191

20.4.3. Databases...........................................................................................................................191

20.4.4. Listener..............................................................................................................................192

20.4.5. Log.....................................................................................................................................192

20.4.6. Operations.........................................................................................................................192

20.4.7. Overlays.............................................................................................................................193

20.4.8. SASL.................................................................................................................................193

20.4.9. Statistics.............................................................................................................................193

20.4.10. Threads............................................................................................................................193

20.4.11. Time.................................................................................................................................194

20.4.12. TLS..................................................................................................................................194

20.4.13. Waiters.............................................................................................................................195

21. Load Balancing with lloadd.....................................................................................................................195

21.1. Overview.....................................................................................................................................195

21.2. When to use the OpenLDAP load balancer................................................................................195

21.3. Runtime configurations...............................................................................................................196

21.4. Build Notes.................................................................................................................................196

21.5. Sample Runtime..........................................................................................................................196

21.6. Configuring load balancer...........................................................................................................196

21.6.1. Common configuration options.........................................................................................197

21.6.2. Sample backend config.....................................................................................................199

22. Tuning........................................................................................................................................................199

22.1. Performance Factors...................................................................................................................199

22.1.1. Memory.............................................................................................................................199

22.1.2. Disks..................................................................................................................................199

22.1.3. Network Topology............................................................................................................199

22.1.4. Directory Layout Design...................................................................................................199

22.1.5. Expected Usage.................................................................................................................199

22.2. Indexes........................................................................................................................................199

22.2.1. Understanding how a search works...................................................................................200

22.2.2. What to index....................................................................................................................200

22.2.3. Presence indexing..............................................................................................................200

22.2.4. Equality indexing..............................................................................................................201

22.2.5. Substring indexing.............................................................................................................201

22.3. Logging.......................................................................................................................................201

22.3.1. What log level to use.........................................................................................................201

22.3.2. What to watch out for........................................................................................................201

22.3.3. Improving throughput........................................................................................................202

22.4. slapd(8) Threads..........................................................................................................................203OpenLDAP Software 2.5 Administrator"s Guide

viii

Table of Contents

23. Troubleshooting........................................................................................................................................203

23.1. User or Software errors?.............................................................................................................203

23.2. Checklist.....................................................................................................................................203

23.3. OpenLDAP Bugs........................................................................................................................204

23.4. 3rd party software error..............................................................................................................204

23.5. How to contact the OpenLDAP Project......................................................................................204

23.6. How to present your problem.....................................................................................................204

23.7. Debugging slapd(8).....................................................................................................................204

23.8. Commercial Support...................................................................................................................205

A. Changes Since Previous Release...............................................................................................................205

A.1. New Guide Sections.....................................................................................................................205

A.2. New Features and Enhancements in 2.5......................................................................................205

A.2.1. Better cn=config functionality............................................................................................205

A.2.2. Better cn=schema functionality..........................................................................................205

A.2.3. More sophisticated Syncrepl configurations......................................................................205

A.2.4. Replicating slapd Configuration (syncrepl and cn=config)...............................................205

A.2.5. More extensive TLS configuration control........................................................................206

A.2.6. Performance enhancements................................................................................................206

A.2.7. New overlays......................................................................................................................206

A.2.8. New features in existing Overlays......................................................................................206

A.2.9. New features in slapd.........................................................................................................206

A.2.10. New features in libldap.....................................................................................................206

A.2.11. New clients, tools and tool enhancements........................................................................206

A.2.12. New build options.............................................................................................................206

A.3. Obsolete Features Removed From 2.5.........................................................................................206

A.3.1. back-bdb and back-hdb.......................................................................................................207

B. Upgrading from 2.4.x.................................................................................................................................207

B.1. cn=config olc* attributes..............................................................................................................207

B.2. ppolicy overlay.............................................................................................................................207

B.3. unique overlay..............................................................................................................................207

B.4. ldap and meta backends................................................................................................................208

B.5. shell backend................................................................................................................................208

B.6. perl and sql backends...................................................................................................................208

B.7. hdb and bdb backends..................................................................................................................208

B.8. mdb backend................................................................................................................................208

B.9. Client utility changes....................................................................................................................209

C. Common errors encountered when using OpenLDAP Software..........................................................209

C.1. Common causes of LDAP errors.................................................................................................209

C.1.1. ldap_*: Can"t contact LDAP server....................................................................................209

C.1.2. ldap_*: No such object.......................................................................................................210

C.1.3. ldap_*: Can"t chase referral................................................................................................210

C.1.4. ldap_*: server is unwilling to perform................................................................................210

C.1.5. ldap_*: Insufficient access..................................................................................................211

C.1.6. ldap_*: Invalid DN syntax..................................................................................................211

C.1.7. ldap_*: Referral hop limit exceeded...................................................................................211OpenLDAP Software 2.5 Administrator"s Guide

ix

Table of Contents

C. Common errors encountered when using OpenLDAP Software

C.1.8. ldap_*: operations error......................................................................................................211

C.1.9. ldap_*: other error..............................................................................................................211

C.1.10. ldap_add/modify: Invalid syntax......................................................................................211

C.1.11. ldap_add/modify: Object class violation..........................................................................213

C.1.12. ldap_add: No such object..................................................................................................213

C.1.13. ldap add: invalid structural object class chain..................................................................214

C.1.14. ldap_add: no structuralObjectClass operational attribute.................................................214

C.1.15. ldap_add/modify/rename: Naming violation....................................................................215

C.1.16. ldap_add/delete/modify/rename: no global superior knowledge......................................215

C.1.17. ldap_bind: Insufficient access...........................................................................................215

C.1.18. ldap_bind: Invalid credentials...........................................................................................216

C.1.19. ldap_bind: Protocol error..................................................................................................216

C.1.20. ldap_modify: cannot modify object class.........................................................................216

C.1.21. ldap_sasl_interactive_bind_s: ..........................................................................................216

C.1.22. ldap_sasl_interactive_bind_s: No such Object.................................................................216

C.1.23. ldap_sasl_interactive_bind_s: No such attribute..............................................................217

C.1.24. ldap_sasl_interactive_bind_s: Unknown authentication method.....................................217

C.1.25. ldap_sasl_interactive_bind_s: Local error (82)................................................................217

C.1.26. ldap_search: Partial results and referral received.............................................................217

C.1.27. ldap_start_tls: Operations error........................................................................................217

C.2. Other Errors..................................................................................................................................217

C.2.1. ber_get_next on fd X failed errno=34 (Numerical result out of range)..............................217

C.2.2. ber_get_next on fd X failed errno=11 (Resource temporarily unavailable).......................218

C.2.3. daemon: socket() failed errno=97 (Address family not supported)....................................218

C.2.4. GSSAPI: gss_acquire_cred: Miscellaneous failure; Permission denied;...........................218

C.2.5. access from unknown denied..............................................................................................219

C.2.6. ldap_read: want=# error=Resource temporarily unavailable.............................................219

C.2.7. `make test" fails...................................................................................................................220

C.2.8. ldap_*: Internal (implementation specific) error (80) - additional info: entry index

delete failed............................................................................................................................220

C.2.9. ldap_sasl_interactive_bind_s: Can"t contact LDAP server (-1)..........................................221

D. Recommended OpenLDAP Software Dependency Versions.................................................................221

D.1. Dependency Versions..................................................................................................................223

E. Real World OpenLDAP Deployments and Examples............................................................................225

F. OpenLDAP Software Contributions.........................................................................................................225

F.1. Client APIs...................................................................................................................................225

F.1.1. ldapc++................................................................................................................................225

F.1.2. ldaptcl..................................................................................................................................225

F.2. Overlays........................................................................................................................................225

F.2.1. acl........................................................................................................................................225

F.2.2. addpartial.............................................................................................................................225

F.2.3. allop.....................................................................................................................................225

F.2.4. autogroup.............................................................................................................................225

F.2.5. comp_match........................................................................................................................225OpenLDAP Software 2.5 Administrator"s Guide

quotesdbs_dbs22.pdfusesText_28
[PDF] comparaison entre openldap et active directory

[PDF] différence entre ldap et active directory

[PDF] openldap active directory sync

[PDF] synchronisation d'annuaire active directory et de base ldap

[PDF] ldap synchronization connector

[PDF] cours active directory pdf gratuit

[PDF] active directory pdf windows server 2008

[PDF] cours active directory windows server 2008 pdf

[PDF] active directory francais

[PDF] cours active directory ppt

[PDF] installation et configuration windows server 2012 pdf

[PDF] guide de ladministrateur windows server 2012 pdf

[PDF] toutes les formules excel 2007

[PDF] astuces excel 2007 pdf

[PDF] excel astuces formules