HP UX LDAP-UX Integration Software Specify up to three directory hosts, to be searched in order

Page 49

 

 

Installing And Configuring LDAP-UX Client Services

 

 

Configure the LDAP-UX Client Services

Step

3.

Specify the host name and optional port number where your directory is

 

 

running. If you choose to not use SSL, the default directory port number

 

 

is 389. If you choose to use SSL, the default directory port number is 636.

 

 

For high availability, each LDAP-UX client can look for user and group

 

 

information in up to three different directory servers. You are able to

 

 

specify up to three directory hosts, to be searched in order.

Step

4.

Reply “no” when asked if you want to accept the remaining default

 

 

configuration parameters.

Step

5.

Select the client binding you want from Appendix A, “Configuration

 

 

Worksheet,” on page 183. This determines the identity that client

 

 

systems use when binding to the directory to search for user and group

 

 

information.

Step

6.

If you configured a proxy user, enter the DN and password of your proxy

 

 

user, from Appendix A, “Configuration Worksheet,” on page 183.

Step

7.

Enter the maximum time in seconds the client should wait for directory

 

 

searches before aborting. Enter 0 for no time limit.

Step

8.

Enter whether or not you want directory searches to follow referrals.

 

 

Referrals are a redirection mechanism supported by the LDAP protocol.

 

 

Please see your directory manuals for more information on referrals.

 

 

 

NOTE

 

If you want your directory searches to follow referrals, you must allow

 

 

anonymous access into your directories.

 

 

 

Step

9.

Enter the Profile TTL (Time To Live) value. This value defines the time

interval between automatic downloads (refreshes) of new configuration profiles from the directory. Automatic refreshing ensures that the client is always configured using the newest configuration profile.

If you want to disable automatic refresh or manually control when the refresh occurs, enter a value of 0. See “Download the Profile Periodically” on page 74.

Step 10. Next, the setup program will prompt you for the following information:

LDAP-UX Client Services supports the following services:

Chapter 2

35

Image 49
Contents Manufacturing Part Number J4269-90071 E0207 EditionLegal Notices Contents Administering LDAP-UX Client Services Command and Tool Reference User Tasks Tables Viii Figures Figures New and Changed Documentation in This Edition Intended AudienceWhat’s in This document Publishing HistoryXiii HP Encourages Your Comments Typographical ConventionsChapter Overview of LDAP-UX Client ServicesSimplified NIS Environment Overview of LDAP-UX Client ServicesTraffic from replica updates How LDAP-UX Client Services WorksSimplified LDAP-UX Client Services Environment IntroductionCommands that use Commands that use PAM Examples of Commands and SubsystemsThat use PAM and NSS Login, ftpd Ls, who Overview of LDAP-UX Client Services Local Start-up File and the Configuration Profile Overview of LDAP-UX Client Services Chapter Before You Begin LDAP-UX Client ServicesSummary of Installing and Configuring Summary of Installing and ConfiguringOptionally modify the /etc/opt/ldapux/pamauthz.policy Plan Your Installation Plan Your InstallationStill log in to the system Share user names and passwords with other applications, Example Directory Structure Plan Your Installation Plan Your Installation Section must be set to yes. If the start option is enabled, Plan Your Installation Install LDAP-UX Client Services on a Client Install LDAP-UX Client Services on a ClientConfigure Your Directory Configure Your DirectoryStep Configure Your Directory Grant read access of all attributes of the posix schema Configure Your Directory Import Name Service Data into Your Directory Import Name Service Data into Your DirectoryDirectory Steps to Importing Name Service Data into YourConfigure the LDAP-UX Client Services Configure the LDAP-UX Client ServicesConfigure the LDAP-UX Client Services Quick Configuration Required to start the services Simple Sasl DIGEST-MD5 Configuration Parameter Default Values Configure the LDAP-UX Client Services Custom Configuration Specify up to three directory hosts, to be searched in order Specify the service you want to map? Specify the attribute you want to map You type 0 to exit this menu for the following question Answer Y instead of the default N For the question You want to create a custom search descriptor for Configure the LDAP-UX Client Serivces with SSL Support Configure the LDAP-UX Client Serivces with SSL SupportSteps to Download the CA Certificate from Mozilla Browser Configuring the LDAP-UX Client to Use SSLMail users, and Trust the CA to identify software developers Use the rm command to remove the old database files Steps to create database files using the certutil utilityConfigure the LDAP-UX Client Serivces with SSL Support Configure LDAP-UX Client Services with Publickey Support Configure LDAP-UX Client Services with Publickey SupportJune Enhanced Publickey-LDAP Software for HP-UX 11i v1 orOctober Admin Proxy User Extending the Publickey Schema into Your DirectoryConfiguring an Admin Proxy User Using ldapproxyconfig Password for an Admin Proxy User Setting ACI for Key ManagementSetting ACI for an Admin Proxy User An ExampleSetting ACI for a User Configuring serviceAuthenticationMethodProcedures Used to Configure serviceAuthenticationMethod Authentication MethodsServiceAuthenticationMethodkeyservsasl/digest-md5 Configuring Name Service Switch Configure LDAP-UX Client Services with Publickey Support AutoFS Support Automount SchemasAutoFS Patch Requirement AutoFS SupportSchema New Automount SchemaAn Example NisObject Automount Schema Removing The Obsolete Automount Schema Obsolete Automount SchemaLimitations Attribute Mappings New Automount Attribute NisObject Automount Attribute MappingsMigration Scripts Description AutoFS Migration ScriptsEnvironment Variables General Syntax For Migration Scripts ExamplesSyntax Migrateautomount.pl ScriptAutoFS Support Following shows the /tmp/autoindirect.ldif file Migratenisautomount.pl ScriptFollowing shows the nispautomap.ldif file Migratenispautofs.pl ScriptVerify the LDAP-UX Client Services Verify the LDAP-UX Client ServicesMaking sure the output is as expected Verify the LDAP-UX Client Services #cat /etc/nsswitch.conf Configure Subsequent Client Systems Configure Subsequent Client SystemsChange the current configuration Download the Profile Periodically Download the Profile PeriodicallyCrontab crontab.profile Use r-command for Pamldap Use r-command for Pamldap#passwordas = Password, and turning on the rcommand option for pamldap Use r-command for Pamldap Chapter Ldap Printer Configurator Definitions OverviewOverview System How the Ldap Printer Configurator works How the Ldap Printer Configurator worksSystem administrator manually adds or removes printers to Printer Configurator Architecture Printer Configuration Parameters Printer Configuration ParametersPrinter Schema Printer SchemaAn Example Printer Schema Managing the LP printer configuration Managing the LP printer configurationExample Managing the LP printer configuration Managing the LP printer configuration Limitations of Printer Configurator Limitations of Printer ConfiguratorLimitations of Printer Configurator Chapter Administering LDAP-UX Client Using The LDAP-UX Client Daemon Using The LDAP-UX Client DaemonOverview Starting the client LdapclientdControlling the client Client Daemon performanceDiagnostics Command optionsLdapclientd.conf Missing settingsConfiguration file syntax Opt/ldapux/config/setup Using The LDAP-UX Client Daemon 100 Chapter 101 102 Chapter 103 Configuration File Features and Limitations Integrating with Trusted ModeIntegrating with Trusted Mode AuditingPassword and Account Policies Others PAM Configuration FileChapter 107 Configuration Parameter Policy And Access Rules Pamauthz Login Authorization EnhancementPamauthz Login Authorization Enhancement Chapter 109Pamauthz Environment How Login Authorization WorksChapter 111 Policy FileFields in an Access Rule Constructing an Access Rule in pamauthz.policyField Syntax in an Access Rule ActiontyperuleChapter 113 Action No value is requiredChapter 115 116 Chapter 117 Policy ValidatorAdding a Directory Replica Adding a Directory ReplicaAn Example of /etc/opt/ldapux/pamauthz.policy File Displaying the Proxy User’s DN Displaying the Proxy User’s DNChapter 119 Creating a New Proxy User Verifying the Proxy UserExample Verifying the Proxy UserCreating a New Profile Displaying the Current ProfileDisplaying the Current Profile Chapter 121Modifying a Profile Changing Which Profile a Client Is UsingModifying a Profile Access Changing from Anonymous Access to ProxyChanging from Proxy Access to Anonymous Access Changing from Anonymous Access to Proxy AccessChanging from Proxy Access to Anonymous Access Minimizing Enumeration Requests Performance ConsiderationsPerformance Considerations Chapter 125Ldapclientd Caching Client Daemon PerformanceClient Daemon Performance Chapter 127 Map Name Benefits Example Side-Effect128 Chapter 129 Ldapclientd Persistent Connections Troubleshooting TroubleshootingEnabling and Disabling LDAP-UX Logging Chapter 131TIP Enabling and Disabling PAM LoggingUser Cannot Log on to Client System Netscape Directory Server Log FilesChapter 133 134 Chapter 135 You should get output like the following136 Chapter 137 Command and Tool ReferenceLDAP-UX Client Services Components LDAP-UX Client Services ComponentsLDAP-UX Client Services Components Description Component Description LDAP-UX Client Services ComponentsChapter 139 PA machine Files Description LDAP-UX Client Services Libraries on the HP-UX 11.0 or 11iMachine Files Description LDAP-UX Client Services Libraries on the HP-UX 11i v2 PAChapter 141 LDAP-UX Client Services Libraries on the HP-UX 11i v2 IA Createprofileentry Tool Client Management ToolsCreateprofilecache Tool Client Management ToolsDisplayprofilecache Tool Createprofileschema ToolChapter 145 Getprofileentry ToolGetprofileentry -s NSS Ldapproxyconfig ToolChapter 147 File148 Chapter 149 Syntax Beq Search ToolBeq Search Tool Chapter 151 Examples152 Chapter 153 Uid2dn ToolGetattrmap.pl Tool Ldap Directory ToolsLdap Directory Tools Chapter 155 Ldapentry156 Chapter 157 LdapsearchLdapmodify Ldapdelete Certutil Adding One or More Users Adding One or More UsersChapter 159 Name Service Migration Scripts Name Service Migration ScriptsDefault Naming Context Naming ContextMigrating Individual Files Migrating All Your FilesChapter 161 Migration Scripts General Syntax for Perl Migration ScriptsMigration Scripts Script Name Description Chapter 163 Script Name Description164 Chapter 165 Ldappasswd Command Ldappasswd CommandChapter 167 168 Chapter 169 To Change PasswordsCannot Change Passwords on Replica Servers To Change PasswordsChapter 171 172 To Change Personal Information To Change Personal InformationChapter 173 174 Chapter 175 Mozilla Ldap C SDK176 Mozilla Ldap C SDK File Components Mozilla Ldap C SDK File ComponentsMozilla Ldap C SDK File Components on the PA machine Files DescriptionMozilla Ldap C SDK File Components on the IA machine Chapter 179 Header Files Description Mozilla Ldap C SDK API Header FilesChapter 181 182 Appendix a 183 Table A-1 LDAP-UX Client Services Configuration WorksheetAppendix a Appendix a 185 186 Appendix B 187 ClassesProfile Attributes Profile AttributesAppendix B Appendix B 189 190 Appendix C 191 fileAppendix C Sample /etc/pam.ldap.trusted fileAppendix C 193 194 Glossary PAM Authorization Service ModuleLdap Data Interchange Format Ldif Glossary 195Glossary SlapdIndex SymbolsNIS, 2, 12, 15 Pwget, 4, 69 200
Related manuals
Manual 26 pages 60.39 Kb Manual 65 pages 7.83 Kb