Chapter 12. Managing SASL

This will match any user ID and map to the result of the the subtree search with base ou=People,dc=example,dc=com and filter cn=userId.

The Directory Server has pre-defined SASL mapping rules to handle some of the most common cases:

Kerberos UID Mapping. This mapping matches a Kerberos principal using a two part realm, such as user@example.com. The realm is then used to define the search base, and the authid defines the filter. In this example, the search base would be dc=example,dc=com and the filter of (uid=user).

RFC 2829 DN Syntax. This mapping matches an authid that is a valid DN (defined in RFC 2829) prefixed by dn:. The authid maps directly to the specified DN.

RFC 2829 U Syntax. This mapping matches an authid that is a UID prefixed by u:. The value specified after the prefix defines a filter of (uid=value). The search base is hard-coded to be the suffix of the default userRoot database.

uid Mapping. This mapping matches an authid that is any plain string that does not match the other default mapping rules. It use this value to define a filter of (uid=value). The search base is hard-coded to be the suffix of the default userRoot database.

3. Configuring SASL Identity Mapping from the Console

To create a new SASL identity mapping, do the following:

1.In the Directory Server Console, open the Configuration tab.

2.Select the SASL Mapping tab.

424

Page 444
Image 444
HP UX Red Hat Direry Server Software manual Configuring Sasl Identity Mapping from the Console