Net::LDAP::RootDSE(3) User Contributed Perl Documentation Net::LDAP::RootDSE(3)NAME
Net::LDAP::RootDSE - An LDAP RootDSE object
SYNOPSIS
my $dse = $ldap->root_dse();
# get naming Contexts
my @contexts = $dse->get_value('namingContexts');
# get supported LDAP versions as an array reference
my $versions = $dse->get_value('supportedLDAPVersion', asref => 1);
DESCRIPTION
Methods
get_value
"get_value" is identical to "get_value" in Net::LDAP::Entry
supported_extension ( OID_LIST )
Returns true if the server supports all of the specified extension OIDs
supported_feature ( OID_LIST )
Returns true if the server supports all of the specified feature OIDs
supported_version ( VERSION_LIST )
Returns true if the server supports all of the specified versions
supported_control ( OID_LIST )
Returns true if the server supports all of the specified control OIDs
supported_sasl_mechanism ( SASL_MECH_LIST )
Returns true if the server supports all of the specified SASL mechanism names
SEE ALSO
Net::LDAP, Net::LDAP::Entry
AUTHOR
Chris Ridd <chris.ridd@isode.com>, Graham Barr <gbarr@pobox.com>.
COPYRIGHT
Copyright (c) 2003-2004, Chris Ridd and Graham Barr. All rights reserved. This library is free software; you can redistribute it and/or
modify it under the same terms as Perl itself.
perl v5.16.2 2012-09-20 Net::LDAP::RootDSE(3)
Check Out this Related Man Page
Net::LDAPS(3) User Contributed Perl Documentation Net::LDAPS(3)NAME
Net::LDAPS - use LDAP over an SSL connection
SYNOPSIS
use Net::LDAPS;
$ldaps = Net::LDAPS->new('myhost.example.com',
port => '10000',
verify => 'require',
capath => '/usr/local/cacerts/');
# alternate way
use Net::LDAP;
$ldaps = Net::LDAP->new('ldaps://myhost.example.com:10000',
verify => 'require',
capath => '/usr/local/cacerts/');
DESCRIPTION
Communicate using the LDAP protocol to a directory server using an encrypted (SSL) network connection. This mechanism is non-standard but
widely supported; consider using LDAPv3 with the standard TLS extension if possible (many servers do not support it yet.) See "start_tls"
in Net::LDAP.
All the normal "Net::LDAP" methods can be used with a "Net::LDAPS" object; see Net::LDAP for details.
CONSTRUCTOR
new ( HOST [, OPTIONS ] )
Create a new connection. HOST is the hostname to contact. OPTIONS is a number of key/value pairs. See "new" in Net::LDAP for details.
SEE ALSO
Net::LDAP, IO::Socket::SSL
BUGS
You cannot have more than one LDAPS connection at any one time, due to restrictions in the underlying Net::SSLeay code.
AUTHOR
Chris Ridd <chris.ridd@isode.com>
COPYRIGHT
Copyright (c) 2000-2004, Chris Ridd and Graham Barr. All rights reserved. This library is free software; you can redistribute it and/or
modify it under the same terms as Perl itself.
perl v5.16.2 2012-09-20 Net::LDAPS(3)
Hello, I hope all is well.
Two issues that I am grappling with.
One: Is this a true statement: (AIX, LDAP configured), even if authentication is configured with LDAP, the system would still need to be authenticated against local (/etc/passwd); incase of network failure?
Two: I can log... (0 Replies)
Hello,
I have a solaris10 sparc running on a server and it is a Sun DS (LDAP) server as well as LDAP client. I have changed ssh server port to something other than 22 but is there any way to configure that only users abc, def, ghi from LDAP can login via ssh?
SSH software on solaris10 is... (0 Replies)
Hello there everyone.
I have a question. How can you make querys to LDAP server to get the users that hav access on a names server.I'll explain:
I have a lot of servers, and I use LDAP for user authentication. What I want is to make a script that will give me on the server that I want the... (3 Replies)
I have very limited knowledge on LDAP configuration and have been trying fix one issue, but unsuccessful.
The server, I am working on, is Solaris-10 zone. sudoers is configured on LDAP (its not on local server). I have access to login directly on server with root, but somehow sudo is not working... (9 Replies)