HP UX LDAP-UX Integration Software manual 134

Page 148

Administering LDAP-UX Client Services

Troubleshooting

If the output shows ldap is not being searched, check /etc/nsswitch.conf to make sure ldap is specified. If username is not found, make sure that user is in the directory and, if using a proxy user, make sure the proxy user is properly configured.

If nsquery(1) displays the user’s information, make sure /etc/pam.conf is configured correctly for ldap. If /etc/pam.conf is configured correctly, check the directory’s policy management status. It could be the directory’s policy management is preventing the bind because, for example the user’s password has expired or the login retry limit has been exceeded. To check this try an ldapsearch command and bind as the user, for example:

cd /opt/ldapux/bin

./ldapsearch -h servername -bbasdDN” uid=username (get user’s DN)

./ldapsearch -h servername -bbaseDN-D "userDN" -w passwd \ uid=username

where userDN is the DN of the user who cannot log in and username is the login of the user. If you cannot bind as the user, check if any directory policies are preventing access.

See below for an example of determining the user’s bind DN.

Display the current configuration profile and check all the values to make sure they are as you expect:

cd /opt/ldapux/config

./display_profile_cache

In particular, check the values for the directory server host and port, the default search base DN, and the credential level. Also, if you have remapped any standard attributes to alternate attributes, or defined any custom search descriptors, make sure these are correct and exist in your database. If any of these are incorrect, correct them as described in “Modifying a Profile” on page 122.

If you are using a proxy user, make sure the configuration is correct as described under “Verifying the Proxy User” on page 120.

Make sure the client system can authenticate to the directory and find a user in the directory by searching for one of your user’s information in the directory. Use the ldapsearch command and information from the current profile.

134

Chapter 4

Image 148
Contents Edition Manufacturing Part Number J4269-90071 E0207Legal Notices Contents Administering LDAP-UX Client Services Command and Tool Reference User Tasks Tables Viii Figures Figures Intended Audience New and Changed Documentation in This EditionPublishing History What’s in This documentXiii Typographical Conventions HP Encourages Your CommentsOverview of LDAP-UX Client Services ChapterOverview of LDAP-UX Client Services Simplified NIS EnvironmentHow LDAP-UX Client Services Works Traffic from replica updatesSimplified LDAP-UX Client Services Environment IntroductionCommands that use Commands that use PAM Examples of Commands and SubsystemsThat use PAM and NSS Login, ftpd Ls, who Overview of LDAP-UX Client Services Local Start-up File and the Configuration Profile Overview of LDAP-UX Client Services Chapter LDAP-UX Client Services Before You BeginSummary of Installing and Configuring Summary of Installing and ConfiguringOptionally modify the /etc/opt/ldapux/pamauthz.policy Plan Your Installation Plan Your InstallationStill log in to the system Share user names and passwords with other applications, Example Directory Structure Plan Your Installation Plan Your Installation Section must be set to yes. If the start option is enabled, Plan Your Installation Install LDAP-UX Client Services on a Client Install LDAP-UX Client Services on a ClientConfigure Your Directory Configure Your DirectoryStep Configure Your Directory Grant read access of all attributes of the posix schema Configure Your Directory Import Name Service Data into Your Directory Import Name Service Data into Your DirectorySteps to Importing Name Service Data into Your DirectoryConfigure the LDAP-UX Client Services Configure the LDAP-UX Client ServicesConfigure the LDAP-UX Client Services Quick Configuration Required to start the services Simple Sasl DIGEST-MD5 Configuration Parameter Default Values Configure the LDAP-UX Client Services Custom Configuration Specify up to three directory hosts, to be searched in order Specify the service you want to map? Specify the attribute you want to map You type 0 to exit this menu for the following question Answer Y instead of the default N For the question You want to create a custom search descriptor for Configure the LDAP-UX Client Serivces with SSL Support Configure the LDAP-UX Client Serivces with SSL SupportConfiguring the LDAP-UX Client to Use SSL Steps to Download the CA Certificate from Mozilla BrowserMail users, and Trust the CA to identify software developers Steps to create database files using the certutil utility Use the rm command to remove the old database filesConfigure the LDAP-UX Client Serivces with SSL Support Configure LDAP-UX Client Services with Publickey Support Configure LDAP-UX Client Services with Publickey SupportJune Enhanced Publickey-LDAP Software for HP-UX 11i v1 orOctober Admin Proxy User Extending the Publickey Schema into Your DirectoryConfiguring an Admin Proxy User Using ldapproxyconfig Setting ACI for Key Management Password for an Admin Proxy UserSetting ACI for an Admin Proxy User An ExampleConfiguring serviceAuthenticationMethod Setting ACI for a UserAuthentication Methods Procedures Used to Configure serviceAuthenticationMethodServiceAuthenticationMethodkeyservsasl/digest-md5 Configuring Name Service Switch Configure LDAP-UX Client Services with Publickey Support Automount Schemas AutoFS SupportAutoFS Patch Requirement AutoFS SupportNew Automount Schema SchemaAn Example NisObject Automount Schema Removing The Obsolete Automount Schema Obsolete Automount SchemaLimitations Attribute Mappings Attribute Mappings New Automount Attribute NisObject AutomountMigration Scripts Description AutoFS Migration ScriptsEnvironment Variables Examples General Syntax For Migration ScriptsMigrateautomount.pl Script SyntaxAutoFS Support Migratenisautomount.pl Script Following shows the /tmp/autoindirect.ldif fileMigratenispautofs.pl Script Following shows the nispautomap.ldif fileVerify the LDAP-UX Client Services Verify the LDAP-UX Client ServicesMaking sure the output is as expected Verify the LDAP-UX Client Services #cat /etc/nsswitch.conf Configure Subsequent Client Systems Configure Subsequent Client SystemsChange the current configuration Download the Profile Periodically Download the Profile PeriodicallyCrontab crontab.profile Use r-command for Pamldap Use r-command for Pamldap#passwordas = Password, and turning on the rcommand option for pamldap Use r-command for Pamldap Chapter Ldap Printer Configurator Definitions OverviewOverview System How the Ldap Printer Configurator works How the Ldap Printer Configurator worksSystem administrator manually adds or removes printers to Printer Configurator Architecture Printer Configuration Parameters Printer Configuration ParametersPrinter Schema Printer SchemaAn Example Printer Schema Managing the LP printer configuration Managing the LP printer configurationExample Managing the LP printer configuration Managing the LP printer configuration Limitations of Printer Configurator Limitations of Printer ConfiguratorLimitations of Printer Configurator Chapter Administering LDAP-UX Client Using The LDAP-UX Client Daemon Using The LDAP-UX Client DaemonOverview Ldapclientd Starting the clientControlling the client Client Daemon performanceCommand options DiagnosticsLdapclientd.conf Missing settingsConfiguration file syntax Opt/ldapux/config/setup Using The LDAP-UX Client Daemon 100 Chapter 101 102 Chapter 103 Configuration File Integrating with Trusted Mode Features and LimitationsIntegrating with Trusted Mode AuditingPassword and Account Policies Others PAM Configuration FileChapter 107 Configuration Parameter Pamauthz Login Authorization Enhancement Policy And Access RulesPamauthz Login Authorization Enhancement Chapter 109How Login Authorization Works Pamauthz EnvironmentPolicy File Chapter 111Constructing an Access Rule in pamauthz.policy Fields in an Access RuleField Syntax in an Access Rule ActiontyperuleChapter 113 No value is required ActionChapter 115 116 Policy Validator Chapter 117Adding a Directory Replica Adding a Directory ReplicaAn Example of /etc/opt/ldapux/pamauthz.policy File Displaying the Proxy User’s DN Displaying the Proxy User’s DNChapter 119 Verifying the Proxy User Creating a New Proxy UserExample Verifying the Proxy UserDisplaying the Current Profile Creating a New ProfileDisplaying the Current Profile Chapter 121Modifying a Profile Changing Which Profile a Client Is UsingModifying a Profile Changing from Anonymous Access to Proxy AccessChanging from Proxy Access to Anonymous Access Changing from Anonymous Access to Proxy AccessChanging from Proxy Access to Anonymous Access Performance Considerations Minimizing Enumeration RequestsPerformance Considerations Chapter 125Ldapclientd Caching Client Daemon PerformanceClient Daemon Performance Map Name Benefits Example Side-Effect Chapter 127128 Chapter 129 Ldapclientd Persistent Connections Troubleshooting TroubleshootingEnabling and Disabling LDAP-UX Logging Chapter 131Enabling and Disabling PAM Logging TIPUser Cannot Log on to Client System Netscape Directory Server Log FilesChapter 133 134 You should get output like the following Chapter 135136 Command and Tool Reference Chapter 137LDAP-UX Client Services Components LDAP-UX Client Services ComponentsLDAP-UX Client Services Components Description Component Description LDAP-UX Client Services ComponentsChapter 139 LDAP-UX Client Services Libraries on the HP-UX 11.0 or 11i PA machine Files DescriptionMachine Files Description LDAP-UX Client Services Libraries on the HP-UX 11i v2 PAChapter 141 LDAP-UX Client Services Libraries on the HP-UX 11i v2 IA Client Management Tools Createprofileentry ToolCreateprofilecache Tool Client Management ToolsCreateprofileschema Tool Displayprofilecache ToolGetprofileentry Tool Chapter 145Ldapproxyconfig Tool Getprofileentry -s NSSFile Chapter 147148 Chapter 149 Syntax Beq Search ToolBeq Search Tool Examples Chapter 151152 Uid2dn Tool Chapter 153Getattrmap.pl Tool Ldap Directory ToolsLdap Directory Tools Ldapentry Chapter 155156 Ldapsearch Chapter 157Ldapmodify Ldapdelete Certutil Adding One or More Users Adding One or More UsersChapter 159 Name Service Migration Scripts Name Service Migration ScriptsDefault Naming Context Naming ContextMigrating Individual Files Migrating All Your FilesChapter 161 Migration Scripts General Syntax for Perl Migration ScriptsMigration Scripts Script Name Description Script Name Description Chapter 163164 Chapter 165 Ldappasswd Command Ldappasswd CommandChapter 167 168 To Change Passwords Chapter 169To Change Passwords Cannot Change Passwords on Replica ServersChapter 171 172 To Change Personal Information To Change Personal InformationChapter 173 174 Mozilla Ldap C SDK Chapter 175176 Mozilla Ldap C SDK File Components Mozilla Ldap C SDK File ComponentsMozilla Ldap C SDK File Components on the PA machine Files DescriptionMozilla Ldap C SDK File Components on the IA machine Chapter 179 Mozilla Ldap C SDK API Header Files Header Files DescriptionChapter 181 182 Table A-1 LDAP-UX Client Services Configuration Worksheet Appendix a 183Appendix a Appendix a 185 186 Classes Appendix B 187Profile Attributes Profile AttributesAppendix B Appendix B 189 190 file Appendix C 191Sample /etc/pam.ldap.trusted file Appendix CAppendix C 193 194 PAM Authorization Service Module GlossaryLdap Data Interchange Format Ldif Glossary 195Slapd GlossarySymbols IndexNIS, 2, 12, 15 Pwget, 4, 69 200
Related manuals
Manual 26 pages 60.39 Kb Manual 65 pages 7.83 Kb