[PDF] [PDF] OpenLDAP Software 24 Administrators Guide

This document provides a guide for installing OpenLDAP Software 2 4 experienced system administrators with basic understanding of LDAP-based directory 



Previous PDF Next PDF





[PDF] OpenLDAP Software 24 Administrators Guide

based upon University of Michigan document: The SLAPD and SLURPD Administrators Guide Amendments Suggested enhancements and corrections to this 



[PDF] OpenLDAP Software 23 Administrators Guide

LDAP directory service is based on a client−server model One or more LDAP servers contain the data making up the directory information tree (DIT) The client  



[PDF] OpenLDAP Software 24 Administrators Guide

This document provides a guide for installing OpenLDAP Software 2 4 experienced system administrators with basic understanding of LDAP-based directory 



[PDF] OpenLDAP Documentation - Read the Docs

10 mai 2017 · This document is based upon University of Michigan document: The SLAPD and SLURPD Administrators Guide Amendments Suggested 



[PDF] Introduction aux annuaires LDAP avec OpenLDAP - InetDoc

Installation du serveur LDAP Software 2 4 Administrator's Guide Il est cependant 389 qui est ouvert en écoute lors de l'installation du paquet slapd 4 2



[PDF] LDAP Setup and Configuration Guide - Oracle Help Center

10 jan 2001 · Directory Server Administrator's Guide How This Book Is Organized The LDAP Setup and Configuration Guide has the following organization:



[PDF] LDAP Operation Guide - Fanvil

19 déc 2019 · User DN: administrator account used during OpenLDAP installation Here cn= manager is entered Password: new password If the initial 



[PDF] Mastering OpenLDAP - Caribbean Environment Programme - UNEP

Directory Services with OpenLDAP server in a networked guide to building secure Virtual Private Networks their own IT, system administrators considering



[PDF] LDAP Linux HOWTO - The Linux Documentation Project

This paper is mostly based on the University of Michigan LDAP information pages and on the OpenLDAP Administrator's Guide Page 2 Table of Contents



[PDF] OpenLDAP Connector Guide - Micro Focus/software/support

HP Select Identity Software Connector for OpenLDAP Directory Server (One- Way LDAP Based) Connector Version: 1 02 Installation and Configuration Guide

[PDF] openldap create database

[PDF] openldap lib

[PDF] openldap mdb

[PDF] openldap sdk

[PDF] operant conditioning

[PDF] operating modes of 8086 microprocessor

[PDF] operation research question bank with answers pdf

[PDF] operation research questions and answers pdf

[PDF] operational process of state prisons

[PDF] operations manager next step

[PDF] operations on languages in theory of computation

[PDF] operator number australia

[PDF] operator overloading in c++

[PDF] operator overloading in c++ ppt

[PDF] operators and expressions in c language

OpenLDAP Software 2.4 Administrator"s Guide

Table of Contents

Scope of this Document..............................................................................................................1

About this document...................................................................................................................2

1. Introduction to OpenLDAP Directory Services..............................................................................3

1.1. What is a directory service?.................................................................................................3

1.2. What is LDAP?....................................................................................................................4

1.3. When should I use LDAP?..................................................................................................6

1.4. When should I not use LDAP?............................................................................................6

1.5. How does LDAP work?.......................................................................................................6

1.6. What about X.500?..............................................................................................................7

1.7. What is the difference between LDAPv2 and LDAPv3?....................................................7

1.8. LDAP vs RDBMS...............................................................................................................7

1.9. What is slapd and what can it do?........................................................................................9

2. A Quick-Start Guide........................................................................................................................11

3. The Big Picture - Configuration Choices.......................................................................................15

3.1. Local Directory Service.....................................................................................................15

3.2. Local Directory Service with Referrals.............................................................................15

3.3. Replicated Directory Service.............................................................................................15

3.4. Distributed Local Directory Service..................................................................................16

4. Building and Installing OpenLDAP Software...............................................................................17

4.1. Obtaining and Extracting the Software..............................................................................17

4.2. Prerequisite software..........................................................................................................17

4.2.1. Transport Layer Security..........................................................................................17

4.2.2. Simple Authentication and Security Layer..............................................................18

4.2.3. Kerberos Authentication Service.............................................................................18

4.2.4. Database Software....................................................................................................18

4.2.5. Threads.....................................................................................................................19

4.2.6. TCP Wrappers..........................................................................................................19

4.3. Running configure.............................................................................................................19

4.4. Building the Software........................................................................................................20

4.5. Testing the Software..........................................................................................................20

4.6. Installing the Software.......................................................................................................20

5. Configuring slapd............................................................................................................................22

5.1. Configuration Layout.........................................................................................................22

5.2. Configuration Directives....................................................................................................24

5.2.1. cn=config..................................................................................................................24

5.2.2. cn=module................................................................................................................26

5.2.3. cn=schema................................................................................................................27

5.2.4. Backend-specific Directives.....................................................................................27

5.2.5. Database-specific Directives....................................................................................28OpenLDAP Software 2.4 Administrator"s Guide

i

Table of Contents

5. Configuring slapd

5.2.6. BDB and HDB Database Directives........................................................................33

5.3. Configuration Example......................................................................................................37

5.4. Converting old style slapd.conf(5) file to cn=config format.............................................39

6. The slapd Configuration File..........................................................................................................40

6.1. Configuration File Format.................................................................................................40

6.2. Configuration File Directives............................................................................................41

6.2.1. Global Directives......................................................................................................41

6.2.2. General Backend Directives.....................................................................................44

6.2.3. General Database Directives....................................................................................44

6.2.4. BDB and HDB Database Directives........................................................................48

6.3. Configuration File Example...............................................................................................49

7. Running slapd..................................................................................................................................51

7.1. Command-Line Options....................................................................................................51

7.2. Starting slapd.....................................................................................................................52

7.3. Stopping slapd....................................................................................................................53

8. Access Control..................................................................................................................................54

8.1. Introduction........................................................................................................................54

8.2. Access Control via Static Configuration...........................................................................54

8.2.1. What to control access to.........................................................................................55

8.2.2. Who to grant access to.............................................................................................56

8.2.3. The access to grant...................................................................................................57

8.2.4. Access Control Evaluation.......................................................................................57

8.2.5. Access Control Examples.........................................................................................58

8.3. Access Control via Dynamic Configuration......................................................................59

8.3.1. What to control access to.........................................................................................60

8.3.2. Who to grant access to.............................................................................................61

8.3.3. The access to grant...................................................................................................62

8.3.4. Access Control Evaluation.......................................................................................62

8.3.5. Access Control Examples.........................................................................................63

8.3.6. Access Control Ordering..........................................................................................64

8.4. Access Control Common Examples..................................................................................65

8.4.1. Basic ACLs..............................................................................................................65

8.4.2. Matching Anonymous and Authenticated users.......................................................66

8.4.3. Controlling rootdn access.........................................................................................66

8.4.4. Managing access with Groups..................................................................................67

8.4.5. Granting access to a subset of attributes..................................................................68

8.4.6. Allowing a user write to all entries below theirs......................................................68

8.4.7. Allowing entry creation............................................................................................69

8.4.8. Tips for using regular expressions in Access Control..............................................70

8.4.9. Granting and Denying access based on security strength factors (ssf)....................71

8.4.10. When things aren"t working as expected................................................................71

8.5. Sets - Granting rights based on relationships.....................................................................72

8.5.1. Groups of Groups.....................................................................................................72

8.5.2. Group ACLs without DN syntax..............................................................................73OpenLDAP Software 2.4 Administrator"s Guide

ii

Table of Contents

8. Access Control

8.5.3. Following references................................................................................................74

9. Limits................................................................................................................................................76

9.1. Introduction........................................................................................................................76

9.2. Soft and Hard limits...........................................................................................................76

9.3. Global Limits.....................................................................................................................76

9.4. Per-Database Limits...........................................................................................................77

9.4.1. Specify who the limits apply to................................................................................77

9.4.2. Specify time limits...................................................................................................77

9.4.3. Specifying size limits...............................................................................................78

9.4.4. Size limits and Paged Results...................................................................................78

9.5. Example Limit Configurations..........................................................................................78

9.5.1. Simple Global Limits...............................................................................................79

9.5.2. Global Hard and Soft Limits....................................................................................79

9.5.3. Giving specific users larger limits............................................................................79

9.5.4. Limiting who can do paged searches.......................................................................79

9.6. Further Information............................................................................................................79

10. Database Creation and Maintenance Tools.................................................................................80

10.1. Creating a database over LDAP.......................................................................................80

10.2. Creating a database off-line.............................................................................................81

10.2.1. Theslapadd program..............................................................................................82

10.2.2. Theslapindex program...........................................................................................83

10.2.3. Theslapcat program...............................................................................................83

10.3. The LDIF text entry format.............................................................................................83

11. Backends.........................................................................................................................................86

11.1. Berkeley DB Backends....................................................................................................86

11.1.1. Overview................................................................................................................86

11.1.2. back-bdb/back-hdb Configuration..........................................................................86

11.1.3. Further Information................................................................................................86

11.2. LDAP...............................................................................................................................86

11.2.1. Overview................................................................................................................86

11.2.2. back-ldap Configuration.........................................................................................87

11.2.3. Further Information................................................................................................88

11.3. LDIF.................................................................................................................................88

11.3.1. Overview................................................................................................................88

11.3.2. back-ldif Configuration..........................................................................................88

11.3.3. Further Information................................................................................................89

11.4. Metadirectory...................................................................................................................89

11.4.1. Overview................................................................................................................89

11.4.2. back-meta Configuration........................................................................................89

11.4.3. Further Information................................................................................................89

11.5. Monitor............................................................................................................................89

11.5.1. Overview................................................................................................................89

11.5.2. back-monitor Configuration...................................................................................90

11.5.3. Further Information................................................................................................91OpenLDAP Software 2.4 Administrator"s Guide

iii

Table of Contents

11. Backends

11.6. Null..................................................................................................................................91

11.6.1. Overview................................................................................................................91

11.6.2. back-null Configuration.........................................................................................91

11.6.3. Further Information................................................................................................91

11.7. Passwd.............................................................................................................................92

11.7.1. Overview................................................................................................................92

11.7.2. back-passwd Configuration....................................................................................92

11.7.3. Further Information................................................................................................92

11.8. Perl/Shell..........................................................................................................................92

11.8.1. Overview................................................................................................................92

11.8.2. back-perl/back-shell Configuration........................................................................93

11.8.3. Further Information................................................................................................93

11.9. Relay................................................................................................................................93

11.9.1. Overview................................................................................................................93

11.9.2. back-relay Configuration........................................................................................93

11.9.3. Further Information................................................................................................93

11.10. SQL................................................................................................................................93

11.10.1. Overview..............................................................................................................93

11.10.2. back-sql Configuration.........................................................................................94

11.10.3. Further Information..............................................................................................95

12. Overlays..........................................................................................................................................96

12.1. Access Logging................................................................................................................97

12.1.1. Overview................................................................................................................97

12.1.2. Access Logging Configuration...............................................................................97

12.1.3. Further Information................................................................................................98

12.2. Audit Logging..................................................................................................................98

12.2.1. Overview................................................................................................................98

12.2.2. Audit Logging Configuration.................................................................................99

12.2.3. Further Information................................................................................................99

12.3. Chaining...........................................................................................................................99

12.3.1. Overview..............................................................................................................100

12.3.2. Chaining Configuration........................................................................................100

12.3.3. Handling Chaining Errors....................................................................................101

12.3.4. Read-Back of Chained Modifications..................................................................101

12.3.5. Further Information..............................................................................................101

12.4. Constraints.....................................................................................................................101

12.4.1. Overview..............................................................................................................101

12.4.2. Constraint Configuration......................................................................................102

12.4.3. Further Information..............................................................................................102

12.5. Dynamic Directory Services..........................................................................................102

12.5.1. Overview..............................................................................................................102

12.5.2. Dynamic Directory Service Configuration..........................................................102

12.5.3. Further Information..............................................................................................104

12.6. Dynamic Groups............................................................................................................104

12.6.1. Overview..............................................................................................................104

12.6.2. Dynamic Group Configuration.............................................................................104OpenLDAP Software 2.4 Administrator"s Guide

iv

Table of Contents

12. Overlays

12.7. Dynamic Lists................................................................................................................104

12.7.1. Overview..............................................................................................................104

12.7.2. Dynamic List Configuration.................................................................................104

12.7.3. Further Information..............................................................................................106

12.8. Reverse Group Membership Maintenance....................................................................106

12.8.1. Overview..............................................................................................................106

12.8.2. Member Of Configuration....................................................................................106

12.8.3. Further Information..............................................................................................107

12.9. The Proxy Cache Engine...............................................................................................107

12.9.1. Overview..............................................................................................................108

12.9.2. Proxy Cache Configuration..................................................................................108

12.9.3. Further Information..............................................................................................110

12.10. Password Policies........................................................................................................110

12.10.1. Overview............................................................................................................110

12.10.2. Password Policy Configuration..........................................................................111

12.10.3. Further Information............................................................................................113

12.11. Referential Integrity.....................................................................................................113

12.11.1. Overview............................................................................................................113

12.11.2. Referential Integrity Configuration....................................................................113

12.11.3. Further Information............................................................................................114

12.12. Return Code.................................................................................................................114

12.12.1. Overview............................................................................................................114

12.12.2. Return Code Configuration................................................................................115

12.12.3. Further Information............................................................................................115

12.13. Rewrite/Remap............................................................................................................115

12.13.1. Overview............................................................................................................115

12.13.2. Rewrite/Remap Configuration...........................................................................116

12.13.3. Further Information............................................................................................116

12.14. Sync Provider...............................................................................................................116

12.14.1. Overview............................................................................................................116

12.14.2. Sync Provider Configuration..............................................................................116

12.14.3. Further Information............................................................................................116

12.15. Translucent Proxy........................................................................................................116

12.15.1. Overview............................................................................................................116

12.15.2. Translucent Proxy Configuration.......................................................................117

12.15.3. Further Information............................................................................................119

12.16. Attribute Uniqueness...................................................................................................119

12.16.1. Overview............................................................................................................119

12.16.2. Attribute Uniqueness Configuration..................................................................119

12.16.3. Further Information............................................................................................120

12.17. Value Sorting...............................................................................................................120

12.17.1. Overview............................................................................................................120

12.17.2. Value Sorting Configuration..............................................................................120

12.17.3. Further Information............................................................................................121

12.18. Overlay Stacking..........................................................................................................121

12.18.1. Overview............................................................................................................121

12.18.2. Example Scenarios.............................................................................................122OpenLDAP Software 2.4 Administrator"s Guide

v

Table of Contents

13. Schema Specification...................................................................................................................123

13.1. Distributed Schema Files...............................................................................................123

13.2. Extending Schema.........................................................................................................123

13.2.1. Object Identifiers..................................................................................................124

13.2.2. Naming Elements.................................................................................................125

13.2.3. Local schema file.................................................................................................125

13.2.4. Attribute Type Specification................................................................................125

13.2.5. Object Class Specification...................................................................................128

13.2.6. OID Macros..........................................................................................................129

14. Security Considerations..............................................................................................................130

14.1. Network Security...........................................................................................................130

14.1.1. Selective Listening...............................................................................................130

14.1.2. IP Firewall............................................................................................................130

14.1.3. TCP Wrappers......................................................................................................130

14.2. Data Integrity and Confidentiality Protection................................................................131

14.2.1. Security Strength Factors.....................................................................................131

14.3. Authentication Methods.................................................................................................131

14.3.1. "simple" method...................................................................................................131

14.3.2. SASL method.......................................................................................................132

14.4. Password Storage...........................................................................................................132

14.4.1. SSHA password storage scheme..........................................................................133

14.4.2. CRYPT password storage scheme.......................................................................133

14.4.3. MD5 password storage scheme............................................................................133

14.4.4. SMD5 password storage scheme..........................................................................134

14.4.5. SHA password storage scheme............................................................................134

14.4.6. SASL password storage scheme..........................................................................134

14.5. Pass-Through authentication..........................................................................................134

14.5.1. Configuring slapd to use an authentication provider...........................................135

14.5.2. Configuring saslauthd..........................................................................................135

14.5.3. Testing pass-through authentication.....................................................................135

15. Using SASL...................................................................................................................................137

15.1. SASL Security Considerations......................................................................................137

15.2. SASL Authentication.....................................................................................................138

15.2.1. GSSAPI................................................................................................................138

15.2.2. KERBEROS_V4..................................................................................................139

15.2.3. DIGEST-MD5......................................................................................................140

15.2.4. Mapping Authentication Identities.......................................................................141

15.2.5. Direct Mapping....................................................................................................142

15.2.6. Search-based mappings........................................................................................143

15.3. SASL Proxy Authorization............................................................................................144

15.3.1. Uses of Proxy Authorization................................................................................144

15.3.2. SASL Authorization Identities.............................................................................145

15.3.3. Proxy Authorization Rules...................................................................................145OpenLDAP Software 2.4 Administrator"s Guide

vi

Table of Contents

16. Using TLS.....................................................................................................................................148

16.1. TLS Certificates.............................................................................................................148

16.1.1. Server Certificates................................................................................................148

16.1.2. Client Certificates.................................................................................................148

16.2. TLS Configuration.........................................................................................................148

16.2.1. Server Configuration............................................................................................148

16.2.2. Client Configuration.............................................................................................151

17. Constructing a Distributed Directory Service...........................................................................153

17.1. Subordinate Knowledge Information.............................................................................153

17.2. Superior Knowledge Information..................................................................................153

17.3. The ManageDsaIT Control............................................................................................154

18. Replication....................................................................................................................................155

18.1. Replication Technology.................................................................................................155

18.1.1. LDAP Sync Replication.......................................................................................155

18.2. Deployment Alternatives...............................................................................................159

18.2.1. Delta-syncrepl replication....................................................................................159

18.2.2. N-Way Multi-Master replication..........................................................................160

18.2.3. MirrorMode replication........................................................................................160

18.2.4. Syncrepl Proxy Mode...........................................................................................161

18.3. Configuring the different replication types....................................................................162

18.3.1. Syncrepl................................................................................................................162

18.3.2. Delta-syncrepl......................................................................................................164

18.3.3. N-Way Multi-Master............................................................................................166

18.3.4. MirrorMode..........................................................................................................168

18.3.5. Syncrepl Proxy.....................................................................................................170

quotesdbs_dbs10.pdfusesText_16