Integrating OpenLDAP and Samba Active Directory in Univention
24 août 2017 » Obstacle II: Differing LDAP server implementations metadata etc. Page 7. 7 www.univention.com. OpenLDAP Replication in ...
OpenLDAP Software 2.5 Administrators Guide
19 janv. 2022 It is possible to replicate data from an LDAP directory server to a X.500 DAP ... saslauthd.conf that uses Microsoft Active Directory (AD):.
Read Online Ocfs2 Installation Guide For Windows [PDF] - covid19
il y a 6 jours What You'll Learn Integrate LDAP with PAM and NSS and with Active Directory and Kerberos Manage OpenLDAP replication and server performance ...
Lightweight Directory Access Protocol
22 janv. 2006 Caractéristiques d'Active directory . ... réplication d'un serveur DSA maître vers un autre serveur miroir. 2.2 La naissance de LDAP.
OpenLDAP Software 2.4 Administrators Guide
Replicated Directory Service. Converting old style slapd.conf(5) file to cn=config format. ... saslauthd.conf that uses Microsoft Active Directory (AD):.
An OpenLDAP backend for Samba 4
how to setup a Samba4 DC. ? [MS-ADTS]: Active Directory Technical. Specification. ? [MS-DRSR]: Directory Replication Service (DRS). Remote Protocol.
OpenLDAP Software 2.3 Administrators Guide
It is possible to replicate data from an LDAP directory server to a X.500 DAP it remains active and periodically checks to see if new entries have been ...
OpenLDAP Software 2.6 Administrators Guide
19 janv. 2022 It is possible to replicate data from an LDAP directory server to a X.500 DAP ... saslauthd.conf that uses Microsoft Active Directory (AD):.
Note technique Recommandations de sécurité relatives à Active
19 août 2014 Le KCC utilise les objets de l'annuaire AD tels que les liens de sites et les serveurs tête de pont pour définir cette topologie de réplication.
Which directory
Replication—OpenLDAP uses single master SLAPD supports replication to X.500 directories ... Active Directory (AD) Microsoft's initial foray into.
Provider Configuration - Replication User
Both replication strategies will need a replication user, as well as updates to the ACLs and limits regarding this user. To create the replication user, save the following contents to a file called replicator.ldif: Then add it with ldapadd: Now set a password for it with ldappasswd: The next step is to give this replication user the correct privile...
Provider Configuration - Standard Replication
The remaining configuration for the provider using standard replication is to add the syncprov overlay on top of the dc=example,dc=comdatabase. Create a file called provider_simple_sync.ldifwith this content: Add the new content: The Provider is now configured.
Consumer Configuration - Standard Replication
Install the software by going through the installation steps. Make sure schemas and the database suffix are the same, and enable TLS. Create an LDIF file with the following contents and name it consumer_simple_sync.ldif: Ensure the following attributes have the correct values: 1. provider: Provider server’s hostname – ldap01.example.comin this exam...
Provider Configuration - Delta Replication
The remaining provider configuration for delta replication is: 1. Create a new database called accesslog 2. Add the syncprov overlay on top of the accesslog and dc=example,dc=comdatabases 3. Add the accesslog overlay on top of the dc=example,dc=comdatabase
Consumer Configuration
Install the software by going through the installation steps. Make sure schemas and the database suffix are the same, and enable TLS. Create an LDIF file with the following contents and name it consumer_sync.ldif: Ensure the following attributes have the correct values: 1. provider: Provider server’s hostname – ldap01.example.comin this example – o...
Testing
Once replication starts, you can monitor it by running: On both the provider and the consumer. Once the contextCSNvalue for both match, both trees are in sync. Every time a change is done in the provider, this value will change and so should the one in the consumer(s). If your connection is slow and/or your LDAP database large, it might take a whil...
What is a replicated directory in OpenLDAP?
Replicated directories are a fundamental requirement for delivering a resilient enterprise deployment. OpenLDAPhas various configuration options for creating a replicated directory. In previous releases, replication was discussed in terms of a masterserver and some number of slaveservers.
How does LDAP replication work?
This is done through LDAP replication. Replication is achieved via the Sync replication engine, syncrepl. This allows changes to be synchronised using a Consumer - Provider model. A detailed description of this replication mechanism can be found in the OpenLDAP administrator’s guide and in its defining RFC 4533.
Can OpenLDAP multi-master replication be split-brain?
OpenLDAP Multi-Master Replication is for high availability, not load balancing. If a split-brain is possible, consider the mirror mode architecture described in the OpenLDAP Administrator’s Guide. A split-brain is where two or more nodes of a cluster are operating independently, which can cause the cluster data to become corrupt or out of sync.
What is LDAP syncrepl?
18.1.1. LDAP Sync Replication The LDAP SyncReplication engine, syncreplfor short, is a consumer-side replication engine that enables the consumer LDAPserver to maintain a shadow copy of a DITfragment. A syncrepl engine resides at the consumer and executes as one of the slapd(8) threads.
OpenLDAP Software 2.5 Administrator"s Guide
19 January 2022
Table of Contents
Table of Contents.....................................................................................................................................1
Scope of this Document...........................................................................................................................1
About this document................................................................................................................................3
1. Introduction to OpenLDAP Directory Services...........................................................................................3
1.1. What is a directory service?..............................................................................................................3
1.2. What is LDAP?.................................................................................................................................6
1.3. When should I use LDAP?...............................................................................................................6
1.4. When should I not use LDAP?.........................................................................................................6
1.5. How does LDAP work?....................................................................................................................7
1.6. What about X.500?...........................................................................................................................7
1.7. What is the difference between LDAPv2 and LDAPv3?.................................................................7
1.8. LDAP vs RDBMS............................................................................................................................9
1.9. What is slapd and what can it do?...................................................................................................10
1.10. What is lloadd and what can it do?...............................................................................................11
2. A Quick-Start Guide.....................................................................................................................................15
3. The Big Picture - Configuration Choices....................................................................................................15
3.1. Local Directory Service..................................................................................................................15
3.2. Local Directory Service with Referrals..........................................................................................15
3.3. Replicated Directory Service..........................................................................................................16
3.4. Distributed Local Directory Service...............................................................................................17
4. Building and Installing OpenLDAP Software............................................................................................17
4.1. Obtaining and Extracting the Software...........................................................................................17
4.2. Prerequisite software.......................................................................................................................17
4.2.4. Database Software.................................................................................................................18
4.2.5. Threads..................................................................................................................................18
4.2.6. TCP Wrappers.......................................................................................................................19
4.3. Running configure..........................................................................................................................19
4.4. Building the Software.....................................................................................................................20
4.5. Testing the Software.......................................................................................................................20
4.6. Installing the Software....................................................................................................................21
5. Configuring slapd..........................................................................................................................................21
5.1. Configuration Layout......................................................................................................................23
5.2. Configuration Directives.................................................................................................................24
5.2.1. cn=config...............................................................................................................................25
5.2.2. cn=module.............................................................................................................................26OpenLDAP Software 2.5 Administrator"s Guide
iTable of Contents
5. Configuring slapd
5.2.3. cn=schema.............................................................................................................................27
5.2.4. Backend-specific Directives..................................................................................................27
5.2.5. Database-specific Directives.................................................................................................32
5.2.6. MDB Backend Directives.....................................................................................................33
5.2.7. MDB Database Directives.....................................................................................................36
5.3. Configuration Example...................................................................................................................38
5.4. Converting old style slapd.conf(5) file to cn=config format..........................................................39
5.5. Recovering from a broken configuration........................................................................................39
5.5.1. Generate an ldif version of the configuration database and reload from that.......................39
5.5.2. Modify config in-place..........................................................................................................40
5.5.3. Recover with plain back-ldif.................................................................................................41
6. The slapd Configuration File.......................................................................................................................41
6.1. Configuration File Format..............................................................................................................42
6.2. Configuration File Directives.........................................................................................................42
6.2.1. Global Directives...................................................................................................................44
6.2.2. General Backend Directives..................................................................................................45
6.2.3. General Database Directives.................................................................................................49
6.2.4. MDB Backend Directives.....................................................................................................50
6.2.5. MDB Database Directives.....................................................................................................53
6.3. Configuration File Example............................................................................................................55
7. Running slapd................................................................................................................................................55
7.1. Command-Line Options.................................................................................................................57
7.2. Starting slapd..................................................................................................................................57
7.3. Stopping slapd.................................................................................................................................59
8. Access Control...............................................................................................................................................59
8.1. Introduction.....................................................................................................................................59
8.2. Access Control via Static Configuration.........................................................................................60
8.2.1. What to control access to.......................................................................................................61
8.2.2. Who to grant access to...........................................................................................................62
8.2.3. The access to grant................................................................................................................62
8.2.4. Access Control Evaluation....................................................................................................63
8.2.5. Access Control Examples......................................................................................................64
8.3. Access Control via Dynamic Configuration...................................................................................65
8.3.1. What to control access to.......................................................................................................66
8.3.2. Who to grant access to...........................................................................................................67
8.3.3. The access to grant................................................................................................................67
8.3.4. Access Control Evaluation....................................................................................................68
8.3.5. Access Control Examples......................................................................................................69
8.3.6. Access Control Ordering.......................................................................................................70
8.4. Access Control Common Examples...............................................................................................70
8.4.1. Basic ACLs............................................................................................................................71
8.4.2. Matching Anonymous and Authenticated users....................................................................71
8.4.3. Controlling rootdn access......................................................................................................72
8.4.4. Managing access with Groups...............................................................................................73OpenLDAP Software 2.5 Administrator"s Guide
iiTable of Contents
8. Access Control
8.4.5. Granting access to a subset of attributes...............................................................................73
8.4.6. Allowing a user write to all entries below theirs...................................................................73
8.4.7. Allowing entry creation.........................................................................................................75
8.4.8. Tips for using regular expressions in Access Control...........................................................76
8.4.9. Granting and Denying access based on security strength factors (ssf).................................76
8.4.10. When things aren"t working as expected.............................................................................77
8.5. Sets - Granting rights based on relationships..................................................................................77
8.5.1. Groups of Groups..................................................................................................................78
8.5.2. Group ACLs without DN syntax...........................................................................................79
8.5.3. Following references.............................................................................................................81
9. Limits.............................................................................................................................................................81
9.1. Introduction.....................................................................................................................................81
9.2. Soft and Hard limits........................................................................................................................81
9.3. Global Limits..................................................................................................................................82
9.3.1. Special Size Limits................................................................................................................82
9.4. Per-Database Limits........................................................................................................................83
9.4.1. Specify who the limits apply to.............................................................................................83
9.4.2. Specify time limits.................................................................................................................83
9.4.3. Specifying size limits............................................................................................................84
9.5. Example Limit Configurations.......................................................................................................84
9.5.1. Simple Global Limits............................................................................................................84
9.5.2. Global Hard and Soft Limits.................................................................................................84
9.5.3. Giving specific users larger limits.........................................................................................84
9.5.4. Limiting who can do paged searches....................................................................................85
9.6. Glued/Subordinate database configurations...................................................................................85
9.7. Further Information.........................................................................................................................87
10. Database Creation and Maintenance Tools..............................................................................................87
10.1. Creating a database over LDAP....................................................................................................88
10.2. Creating a database off-line..........................................................................................................89
10.2.1. Theslapadd program...........................................................................................................90
10.2.2. Theslapindex program........................................................................................................90
10.2.3. Theslapcat program............................................................................................................90
10.3. The LDIF text entry format...........................................................................................................93
11. Backends......................................................................................................................................................93
11.1. LDAP............................................................................................................................................93
11.1.1. Overview.............................................................................................................................93
11.1.2. back-ldap Configuration......................................................................................................94
11.1.3. Further Information.............................................................................................................94
11.2. LDIF..............................................................................................................................................94
11.2.1. Overview.............................................................................................................................94
11.2.2. back-ldif Configuration.......................................................................................................95
11.2.3. Further Information.............................................................................................................95
11.3. LMDB...........................................................................................................................................95
11.3.1. Overview.............................................................................................................................95OpenLDAP Software 2.5 Administrator"s Guide
iiiTable of Contents
11. Backends
11.3.2. back-mdb Configuration......................................................................................................96
11.3.3. Further Information.............................................................................................................96
11.4. Metadirectory................................................................................................................................96
11.4.1. Overview.............................................................................................................................96
11.4.2. back-meta Configuration.....................................................................................................96
11.4.3. Further Information.............................................................................................................96
11.5. Monitor.........................................................................................................................................96
11.5.1. Overview.............................................................................................................................97
11.5.2. back-monitor Configuration................................................................................................98
11.5.3. Further Information.............................................................................................................98
11.6. Null...............................................................................................................................................98
11.6.1. Overview.............................................................................................................................98
11.6.2. back-null Configuration......................................................................................................98
11.6.3. Further Information.............................................................................................................99
11.7. Passwd..........................................................................................................................................99
11.7.1. Overview.............................................................................................................................99
11.7.2. back-passwd Configuration.................................................................................................99
11.7.3. Further Information.............................................................................................................99
11.8. Perl................................................................................................................................................99
11.8.1. Overview...........................................................................................................................100
11.8.2. back-perl Configuration....................................................................................................100
11.8.3. Further Information...........................................................................................................100
11.9. Relay...........................................................................................................................................100
11.9.1. Overview...........................................................................................................................100
11.9.2. back-relay Configuration...................................................................................................100
11.9.3. Further Information...........................................................................................................100
11.10. SQL...........................................................................................................................................100
11.10.1. Overview.........................................................................................................................101
11.10.2. back-sql Configuration....................................................................................................102
11.10.3. Further Information.........................................................................................................103
12. Overlays.....................................................................................................................................................104
12.1. Access Logging...........................................................................................................................104
12.1.1. Overview...........................................................................................................................104
12.1.2. Access Logging Configuration..........................................................................................105
12.1.3. Further Information...........................................................................................................105
12.2. Audit Logging.............................................................................................................................105
12.2.1. Overview...........................................................................................................................106
12.2.2. Audit Logging Configuration............................................................................................106
12.2.3. Further Information...........................................................................................................106
12.3. Chaining......................................................................................................................................107
12.3.1. Overview...........................................................................................................................107
12.3.2. Chaining Configuration.....................................................................................................108
12.3.3. Handling Chaining Errors.................................................................................................108
12.3.4. Read-Back of Chained Modifications...............................................................................108
12.3.5. Further Information...........................................................................................................108
12.4. Constraints..................................................................................................................................108OpenLDAP Software 2.5 Administrator"s Guide
ivTable of Contents
12. Overlays
12.4.1. Overview...........................................................................................................................109
12.4.2. Constraint Configuration...................................................................................................109
12.4.3. Further Information...........................................................................................................109
12.5. Dynamic Directory Services.......................................................................................................109
12.5.1. Overview...........................................................................................................................109
12.5.2. Dynamic Directory Service Configuration........................................................................111
12.5.3. Further Information...........................................................................................................111
12.6. Dynamic Groups.........................................................................................................................111
12.6.1. Overview...........................................................................................................................111
12.6.2. Dynamic Group Configuration..........................................................................................111
12.7. Dynamic Lists.............................................................................................................................111
12.7.1. Overview...........................................................................................................................111
12.7.2. Dynamic List Configuration..............................................................................................113
12.7.3. Further Information...........................................................................................................113
12.8. Reverse Group Membership Maintenance..................................................................................113
12.8.1. Overview...........................................................................................................................113
12.8.2. Member Of Configuration.................................................................................................114
12.8.3. Further Information...........................................................................................................114
12.9. The Proxy Cache Engine............................................................................................................114
12.9.1. Overview...........................................................................................................................115
12.9.2. Proxy Cache Configuration...............................................................................................117
12.9.3. Further Information...........................................................................................................117
12.10. Password Policies.....................................................................................................................117
12.10.1. Overview.........................................................................................................................118
12.10.2. Password Policy Configuration.......................................................................................120
12.10.3. Further Information.........................................................................................................120
12.11. Referential Integrity..................................................................................................................120
12.11.1. Overview.........................................................................................................................120
12.11.2. Referential Integrity Configuration.................................................................................122
12.11.3. Further Information.........................................................................................................122
12.12. Return Code..............................................................................................................................122
12.12.1. Overview.........................................................................................................................122
12.12.2. Return Code Configuration.............................................................................................123
12.12.3. Further Information.........................................................................................................123
12.13. Rewrite/Remap.........................................................................................................................123
12.13.1. Overview.........................................................................................................................123
12.13.2. Rewrite/Remap Configuration........................................................................................123
12.13.3. Further Information.........................................................................................................123
12.14. Sync Provider............................................................................................................................123
12.14.1. Overview.........................................................................................................................123
12.14.2. Sync Provider Configuration...........................................................................................124
12.14.3. Further Information.........................................................................................................124
12.15. Translucent Proxy.....................................................................................................................124
12.15.1. Overview.........................................................................................................................124
12.15.2. Translucent Proxy Configuration....................................................................................126
12.15.3. Further Information.........................................................................................................126
12.16. Attribute Uniqueness................................................................................................................126OpenLDAP Software 2.5 Administrator"s Guide
vTable of Contents
12. Overlays
12.16.1. Overview.........................................................................................................................126
12.16.2. Attribute Uniqueness Configuration...............................................................................127
12.16.3. Further Information.........................................................................................................127
12.17. Value Sorting............................................................................................................................127
12.17.1. Overview.........................................................................................................................127
12.17.2. Value Sorting Configuration...........................................................................................128
12.17.3. Further Information.........................................................................................................128
12.18. Overlay Stacking.......................................................................................................................129
12.18.1. Overview.........................................................................................................................129
12.18.2. Example Scenarios..........................................................................................................131
13. Schema Specification................................................................................................................................131
13.1. Distributed Schema Files............................................................................................................131
13.2. Extending Schema......................................................................................................................132
13.2.1. Object Identifiers...............................................................................................................133
13.2.2. Naming Elements..............................................................................................................133
13.2.3. Local schema file...............................................................................................................133
13.2.4. Attribute Type Specification.............................................................................................136
13.2.5. Object Class Specification.................................................................................................137
13.2.6. OID Macros.......................................................................................................................139
14. Security Considerations............................................................................................................................139
14.1. Network Security........................................................................................................................139
14.1.1. Selective Listening............................................................................................................139
14.1.2. IP Firewall.........................................................................................................................139
14.1.3. TCP Wrappers...................................................................................................................140
14.2. Data Integrity and Confidentiality Protection.............................................................................140
14.2.1. Security Strength Factors..................................................................................................140
14.3. Authentication Methods..............................................................................................................140
14.3.1. "simple" method................................................................................................................141
14.3.2. SASL method....................................................................................................................141
14.4. Password Storage........................................................................................................................142
14.4.1. SSHA password storage scheme.......................................................................................142
14.4.2. CRYPT password storage scheme....................................................................................142
14.4.3. MD5 password storage scheme.........................................................................................142
14.4.4. SMD5 password storage scheme.......................................................................................143
14.4.5. SHA password storage scheme.........................................................................................143
14.4.6. SASL password storage scheme........................................................................................143
14.5. Pass-Through authentication.......................................................................................................143
14.5.1. Configuring slapd to use an authentication provider.........................................................144
14.5.2. Configuring saslauthd........................................................................................................144
14.5.3. Testing pass-through authentication..................................................................................147
15. Using SASL................................................................................................................................................147
15.1. SASL Security Considerations...................................................................................................148
15.2. SASL Authentication..................................................................................................................148
15.2.1. GSSAPI.............................................................................................................................149OpenLDAP Software 2.5 Administrator"s Guide
viTable of Contents
15. Using SASL
15.2.2. KERBEROS_V4...............................................................................................................150
15.2.3. DIGEST-MD5...................................................................................................................151
15.2.4. EXTERNAL......................................................................................................................152
15.2.5. Mapping Authentication Identities....................................................................................153
15.2.6. Direct Mapping..................................................................................................................153
15.2.7. Search-based mappings.....................................................................................................155
15.3. SASL Proxy Authorization.........................................................................................................155
15.3.1. Uses of Proxy Authorization.............................................................................................156
15.3.2. SASL Authorization Identities..........................................................................................156
15.3.3. Proxy Authorization Rules................................................................................................159
16. Using TLS..................................................................................................................................................159
16.1. TLS Certificates..........................................................................................................................159
16.1.1. Server Certificates.............................................................................................................159
16.1.2. Client Certificates..............................................................................................................159
16.2. TLS Configuration......................................................................................................................159
16.2.1. Server Configuration.........................................................................................................161
16.2.2. Client Configuration..........................................................................................................163
17. Constructing a Distributed Directory Service........................................................................................163
17.1. Subordinate Knowledge Information..........................................................................................163
17.2. Superior Knowledge Information...............................................................................................164
17.3. The ManageDsaIT Control.........................................................................................................165
18. Replication.................................................................................................................................................165
18.1. Replication Technology..............................................................................................................165
18.1.1. LDAP Sync Replication....................................................................................................168
18.2. Deployment Alternatives............................................................................................................169
18.2.1. Delta-syncrepl replication.................................................................................................169
18.2.2. N-Way Multi-Provider Replication...................................................................................170
18.2.3. Mirror mode replication....................................................................................................171
18.2.4. Syncrepl Proxy Mode........................................................................................................171
18.3. Configuring the different replication types.................................................................................171
18.3.1. Syncrepl.............................................................................................................................173
18.3.2. Delta-syncrepl...................................................................................................................175
18.3.3. N-Way Multi-Provider......................................................................................................177
18.3.4. Mirror mode......................................................................................................................179
18.3.5. Syncrepl Proxy..................................................................................................................185
19. Maintenance..............................................................................................................................................185
19.1. Directory Backups......................................................................................................................185
19.2. Checkpointing.............................................................................................................................185
19.3. Migration....................................................................................................................................187
20. Monitoring.................................................................................................................................................187
20.1. Monitor configuration via cn=config(5).....................................................................................187
20.2. Monitor configuration via slapd.conf(5).....................................................................................188OpenLDAP Software 2.5 Administrator"s Guide
viiTable of Contents
20. Monitoring
20.3. Accessing Monitoring Information.............................................................................................189
20.4. Monitor Information...................................................................................................................190
20.4.1. Backends...........................................................................................................................191
20.4.2. Connections.......................................................................................................................191
20.4.3. Databases...........................................................................................................................191
20.4.4. Listener..............................................................................................................................192
20.4.5. Log.....................................................................................................................................192
20.4.6. Operations.........................................................................................................................192
20.4.7. Overlays.............................................................................................................................193
20.4.8. SASL.................................................................................................................................193
20.4.9. Statistics.............................................................................................................................193
20.4.10. Threads............................................................................................................................193
20.4.11. Time.................................................................................................................................194
20.4.12. TLS..................................................................................................................................194
20.4.13. Waiters.............................................................................................................................195
21. Load Balancing with lloadd.....................................................................................................................195
21.1. Overview.....................................................................................................................................195
21.2. When to use the OpenLDAP load balancer................................................................................195
21.3. Runtime configurations...............................................................................................................196
21.4. Build Notes.................................................................................................................................196
21.5. Sample Runtime..........................................................................................................................196
21.6. Configuring load balancer...........................................................................................................196
21.6.1. Common configuration options.........................................................................................197
21.6.2. Sample backend config.....................................................................................................199
22. Tuning........................................................................................................................................................199
22.1. Performance Factors...................................................................................................................199
22.1.1. Memory.............................................................................................................................199
22.1.2. Disks..................................................................................................................................199
22.1.3. Network Topology............................................................................................................199
22.1.4. Directory Layout Design...................................................................................................199
22.1.5. Expected Usage.................................................................................................................199
22.2. Indexes........................................................................................................................................199
22.2.1. Understanding how a search works...................................................................................200
22.2.2. What to index....................................................................................................................200
22.2.3. Presence indexing..............................................................................................................200
22.2.4. Equality indexing..............................................................................................................201
22.2.5. Substring indexing.............................................................................................................201
22.3. Logging.......................................................................................................................................201
22.3.1. What log level to use.........................................................................................................201
22.3.2. What to watch out for........................................................................................................201
22.3.3. Improving throughput........................................................................................................202
22.4. slapd(8) Threads..........................................................................................................................203OpenLDAP Software 2.5 Administrator"s Guide
viiiTable of Contents
23. Troubleshooting........................................................................................................................................203
23.1. User or Software errors?.............................................................................................................203
23.2. Checklist.....................................................................................................................................203
23.3. OpenLDAP Bugs........................................................................................................................204
23.4. 3rd party software error..............................................................................................................204
23.5. How to contact the OpenLDAP Project......................................................................................204
23.6. How to present your problem.....................................................................................................204
23.7. Debugging slapd(8).....................................................................................................................204
23.8. Commercial Support...................................................................................................................205
A. Changes Since Previous Release...............................................................................................................205
A.1. New Guide Sections.....................................................................................................................205
A.2. New Features and Enhancements in 2.5......................................................................................205
A.2.1. Better cn=config functionality............................................................................................205
A.2.2. Better cn=schema functionality..........................................................................................205
A.2.3. More sophisticated Syncrepl configurations......................................................................205
A.2.4. Replicating slapd Configuration (syncrepl and cn=config)...............................................205
A.2.5. More extensive TLS configuration control........................................................................206
A.2.6. Performance enhancements................................................................................................206
A.2.7. New overlays......................................................................................................................206
A.2.8. New features in existing Overlays......................................................................................206
A.2.9. New features in slapd.........................................................................................................206
A.2.10. New features in libldap.....................................................................................................206
A.2.11. New clients, tools and tool enhancements........................................................................206
A.2.12. New build options.............................................................................................................206
A.3. Obsolete Features Removed From 2.5.........................................................................................206
A.3.1. back-bdb and back-hdb.......................................................................................................207
B. Upgrading from 2.4.x.................................................................................................................................207
B.1. cn=config olc* attributes..............................................................................................................207
B.2. ppolicy overlay.............................................................................................................................207
B.3. unique overlay..............................................................................................................................207
B.4. ldap and meta backends................................................................................................................208
B.5. shell backend................................................................................................................................208
B.6. perl and sql backends...................................................................................................................208
B.7. hdb and bdb backends..................................................................................................................208
B.8. mdb backend................................................................................................................................208
B.9. Client utility changes....................................................................................................................209
C. Common errors encountered when using OpenLDAP Software..........................................................209
C.1. Common causes of LDAP errors.................................................................................................209
C.1.1. ldap_*: Can"t contact LDAP server....................................................................................209
C.1.2. ldap_*: No such object.......................................................................................................210
C.1.3. ldap_*: Can"t chase referral................................................................................................210
C.1.4. ldap_*: server is unwilling to perform................................................................................210
C.1.5. ldap_*: Insufficient access..................................................................................................211
C.1.6. ldap_*: Invalid DN syntax..................................................................................................211
C.1.7. ldap_*: Referral hop limit exceeded...................................................................................211OpenLDAP Software 2.5 Administrator"s Guide
ixTable of Contents
C. Common errors encountered when using OpenLDAP SoftwareC.1.8. ldap_*: operations error......................................................................................................211
C.1.9. ldap_*: other error..............................................................................................................211
C.1.10. ldap_add/modify: Invalid syntax......................................................................................211
C.1.11. ldap_add/modify: Object class violation..........................................................................213
C.1.12. ldap_add: No such object..................................................................................................213
C.1.13. ldap add: invalid structural object class chain..................................................................214
C.1.14. ldap_add: no structuralObjectClass operational attribute.................................................214
C.1.15. ldap_add/modify/rename: Naming violation....................................................................215
C.1.16. ldap_add/delete/modify/rename: no global superior knowledge......................................215
C.1.17. ldap_bind: Insufficient access...........................................................................................215
C.1.18. ldap_bind: Invalid credentials...........................................................................................216
C.1.19. ldap_bind: Protocol error..................................................................................................216
C.1.20. ldap_modify: cannot modify object class.........................................................................216
C.1.21. ldap_sasl_interactive_bind_s: ..........................................................................................216
C.1.22. ldap_sasl_interactive_bind_s: No such Object.................................................................216
C.1.23. ldap_sasl_interactive_bind_s: No such attribute..............................................................217
C.1.24. ldap_sasl_interactive_bind_s: Unknown authentication method.....................................217
C.1.25. ldap_sasl_interactive_bind_s: Local error (82)................................................................217
C.1.26. ldap_search: Partial results and referral received.............................................................217
C.1.27. ldap_start_tls: Operations error........................................................................................217
C.2. Other Errors..................................................................................................................................217
C.2.1. ber_get_next on fd X failed errno=34 (Numerical result out of range)..............................217
C.2.2. ber_get_next on fd X failed errno=11 (Resource temporarily unavailable).......................218
C.2.3. daemon: socket() failed errno=97 (Address family not supported)....................................218
C.2.4. GSSAPI: gss_acquire_cred: Miscellaneous failure; Permission denied;...........................218
C.2.5. access from unknown denied..............................................................................................219
C.2.6. ldap_read: want=# error=Resource temporarily unavailable.............................................219
C.2.7. `make test" fails...................................................................................................................220
C.2.8. ldap_*: Internal (implementation specific) error (80) - additional info: entry indexdelete failed............................................................................................................................220
C.2.9. ldap_sasl_interactive_bind_s: Can"t contact LDAP server (-1)..........................................221
D. Recommended OpenLDAP Software Dependency Versions.................................................................221
D.1. Dependency Versions..................................................................................................................223
E. Real World OpenLDAP Deployments and Examples............................................................................225
F. OpenLDAP Software Contributions.........................................................................................................225
F.1. Client APIs...................................................................................................................................225
F.1.1. ldapc++................................................................................................................................225
F.1.2. ldaptcl..................................................................................................................................225
F.2. Overlays........................................................................................................................................225
F.2.1. acl........................................................................................................................................225
F.2.2. addpartial.............................................................................................................................225
F.2.3. allop.....................................................................................................................................225
F.2.4. autogroup.............................................................................................................................225
F.2.5. comp_match........................................................................................................................225OpenLDAP Software 2.5 Administrator"s Guide
quotesdbs_dbs22.pdfusesText_28[PDF] différence entre ldap et active directory
[PDF] openldap active directory sync
[PDF] synchronisation d'annuaire active directory et de base ldap
[PDF] ldap synchronization connector
[PDF] cours active directory pdf gratuit
[PDF] active directory pdf windows server 2008
[PDF] cours active directory windows server 2008 pdf
[PDF] active directory francais
[PDF] cours active directory ppt
[PDF] installation et configuration windows server 2012 pdf
[PDF] guide de ladministrateur windows server 2012 pdf
[PDF] toutes les formules excel 2007
[PDF] astuces excel 2007 pdf
[PDF] excel astuces formules