Sponsored Content
Operating Systems AIX Where to download ldap.client lpp Post 302341021 by zaxxon on Wednesday 5th of August 2009 02:03:26 AM
Old 08-05-2009
I doubt the packages are downloadable.

You'll need
Code:
      ldap.client.rte 5.2.0.0
      ldap.client.adt 5.2.0.0

and find them on your OS installation medias.

If you are going to use SSL with it you will need from some Expansion Pack media:
Code:
      gsksa.7.0.3.3.I
      gskta.7.0.3.3.I
      ldap.max_crypto_client.5.2.0.0.I

Here is the link to the Redbook for it:
IBM Redbooks | Integrating AIX into Heterogeneous LDAP Environments
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

AIX v5.3 LDAP CLIENT and AD

Has anyone successfully authenticated unix users via Active Directory using LDAP client on AIX v5.2 or v5.3?? ldapsearch from our unix box retrieves info from AD but having trouble authenticating unix id when I logon - get a msg ': 3004-318 Error obtaining the user's password information'. Not... (0 Replies)
Discussion started by: DANNYC
0 Replies

2. Solaris

LDAP client config.

Hi Gurus I am a novice in LDAP and need to configure an LDAP client(Solaris 10). The client has to bind to an AD for LDAP queries. I have created a user called testbind in AD for binding purpose. I am planning to configure LDAP client manually(as the requirement is as such). This is the... (16 Replies)
Discussion started by: Renjesh
16 Replies

3. Solaris

Empty LDAP client file

Hi All, I am getting one strange problem of empty LDAP_client_ file. There was one /var 100% overload issue few days back. After that we are observing this new issue. I got to know about similar issue SunSolve Bug ID 6495683 - “LDAP client files & cred files are deleted when /var is full”... (1 Reply)
Discussion started by: ailnilanjan
1 Replies

4. Solaris

LDAP client config GSSAPI

Configure ldap client: I have configured my ldapclient with the AuthenticationMethod=simple and with the credentialLevel=proxy. However, as soon as i want to set the AuthenticationMethod=sasl/GSSAPI, and credentiallevel=self, then it fails to configure. Kerberos is already setup successfully. The... (0 Replies)
Discussion started by: Henk Trumpie
0 Replies

5. UNIX for Advanced & Expert Users

LDAP client issue

Hello, I'm new to Centos and to openldap. I am by trade a Solaris Admin. I'm experimenting with openldap and thought Linux would be easier to install and setup openldap on, so far this is true. The problem I'm having is that I can't get the client server to authenticate to the openldap server. I... (1 Reply)
Discussion started by: bitlord
1 Replies

6. UNIX and Linux Applications

User Based LDAP Client Access

Hi everyone, I am not that familiar with LDAP advanced contents. But since it is a popular secure tool for authentication, I preferred to user RedHat LDAP. The organization has 5 organizational units. There are 3 client servers and I want to limit each client to access different users. So, I... (3 Replies)
Discussion started by: royalliege
3 Replies

7. AIX

LDAP authentication client issue

Hi, I am trying to authenticate AIX server against a IDS LDAP instance. The AIX version is 6.1 and TDS client is 6.1. I configured the secldapclntd using ldap.cfg file and changed /etc/security/user to set SYSTEM=LDAP, registry=LDAP for one user. Below are the ldap.cfg configurations - ... (5 Replies)
Discussion started by: vs1
5 Replies

8. AIX

AIX 5.2 ldap client AD

I have been able to configure on an AIX 5.2 ldap.cfg so service starts correctly. but when I try to log on with a windows user after entering the password login hangs and get no response. I have set it up on Aix 5.3 with no problem but in Aix 5.2 I have not been able to log in. ldap.cfg... (1 Reply)
Discussion started by: laxtnog
1 Replies

9. Solaris

Sudo not working on LDAP client machine

Hi, I have configured ldap manually on solaris 10/11 machine with below entries: # ldapclient list |grep sudo NS_LDAP_SERVICE_SEARCH_DESC= sudoers:ou=SUDOers,dc=exm,dc=ple,dc=com # cat /etc/nsswitch.conf |grep -i sudo sudoers: files ldap # But groups available in LDAP server... (8 Replies)
Discussion started by: Sridaran
8 Replies

10. Solaris

LDAP Client not connecting to LDAP server

I have very limited knowledge on LDAP configuration and have been trying fix one issue, but unsuccessful. The server, I am working on, is Solaris-10 zone. sudoers is configured on LDAP (its not on local server). I have access to login directly on server with root, but somehow sudo is not working... (9 Replies)
Discussion started by: solaris_1977
9 Replies
AuthzNetLDAP(3pm)					User Contributed Perl Documentation					 AuthzNetLDAP(3pm)

NAME
Apache::AuthzNetLDAP - Apache-Perl module that enables you to authorize a user for Website based on LDAP attributes. SYNOPSIS
PerlSetVar BindDN "cn=Directory Manager" PerlSetVar BindPWD "password" PerlSetVar BaseDN "ou=people,o=unt.edu" PerlSetVar LDAPServer ldap.unt.edu PerlSetVar LDAPPort 389 PerlSetVar UIDAttr uid #PerlSetVar UIDAttr mail PerlAuthenHandler Apache::AuthNetLDAP PerlAuthzHandler Apache::AuthzNetLDAP #require valid-user #require user mewilcox #require user mewilcox@venus.acs.unt.edu #require group "cn=Peoplebrowsers1,ou=UNTGroups,ou=People, o=unt.edu" #require ldap-url ldap://pandora.acs.unt.edu/o=unt.edu??sub?sn=wilcox #require ldap-url ldap://pandora.acs.unt.edu/o=unt.edu??sub?sn=smith #require ldap-url ldap://castor.acs.unt.edu/ou=people,o=unt.edu??sub?untcourse= untcoursenumber=1999CCOMM2040001,ou=courses,ou=acad,o=unt.edu DESCRIPTION
After you have authenticated a user (perhaps with Apache::AuthNetLDAP ;) you can use this module to determine whether they are authorized to access the Web resource under this modules control. You can control authorization via one of four methods. The first two are pretty standard, the second two are unique to LDAP. "require" options -- user -> Will authorize access if the authenticated user's username. valid-user -> Will authorize any authenticated user. group -> Will authorize any authenticated user who is a member of the LDAP group specified by groupdn. This module supports groupOfMember, groupOfUniquemember and Netscape's dynamic group object classes. ldap-url -> This will authorize any authenticated user who matches the query specified in the given LDAP URL. This is enables users to get the flexibility of Netscape's dynamic groups, even if their LDAP server does not support such a capability. CONFIGURATION NOTES
It is important to note that this module must be used in conjunction with an authentication module. (...? Is this true? I just thought, that you might want to only authorize a user, instead of authenticate...) If you are using an authentication module, then the following lines will not need to be duplicated: PerlSetVar BindDN "cn=Directory Manager" PerlSetVar BindPWD "password" PerlSetVar BaseDN "ou=people,o=unt.edu" PerlSetVar LDAPServer ldap.unt.edu PerlSetVar LDAPPort 389 PerlSetVar UIDAttr uid #PerlSetVar UIDAttr mail PerlAuthenHandler Apache::AuthNetLDAP The following lines will not need to be duplicated if supported by the authentication module: #require valid-user #require user mewilcox #require user mewilcox@venus.acs.unt.edu #require group "cn=Peoplebrowsers1,ou=UNTGroups,ou=People, o=unt.edu" #require ldap-url ldap://pandora.acs.unt.edu/o=unt.edu??sub?sn=wilcox #require ldap-url ldap://pandora.acs.unt.edu/o=unt.edu??sub?sn=smith #require ldap-url ldap://castor.acs.unt.edu/ou=people,o=unt.edu??sub?untcourse= Obviously, the ldap-url attribute is probably only support by this module. Check out the following link for options to load the module: http://perl.apache.org/docs/1.0/guide/config.html#The_Startup_File http://perl.apache.org/docs/2.0/user/config/config.html#Startup_File AUTHOR
Mark Wilcox mewilcox@unt.edu and Shannon Eric Peevey speeves@unt.edu SEE ALSO
perl(1). WARRANTY Hey, I didn't destroy mankind when testing the module. You're mileage may vary. This module is distributed with the same license as Perl's. perl v5.10.0 2008-06-29 AuthzNetLDAP(3pm)
All times are GMT -4. The time now is 12:42 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy