Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

ns-newpwpolicy.pl(8) [centos man page]

NS-NEWPWPOLICY.PL(8)					      System Manager's Manual					      NS-NEWPWPOLICY.PL(8)

NAME
ns-newpwpolicy.pl - Directory Server perl script for preparing new password policies. SYNOPSIS
ns-newpwpolicy.pl [-Z serverID] [-v] [-D rootdn] { -w password | -j filename } [-P protocol] [-p port] [-h host] -U UserDN -S SuffixDN DESCRIPTION
Adds entries required for implementing the user- and subtree-level password policy. OPTIONS
A summary of options is included below: -Z Server Identifier The server ID of the Directory Server instance. If there is only one instance on the system, this option can be skipped. -D Root DN The Directory Manager DN, or root DN. If not specified, the script will search the server instance configuration for the value. -w password The rootdn password. -w - Prompt for the rootdn password. -j password filename The name of the file that contains the root DN password. -P Protocol The connection protocol to connect to the Directory Server. Protocols are STARTTLS, LDAPS, LDAPI, and LDAP. If this option is skipped, the most secure protocol that is available is used. For LDAPI, AUTOBIND is also available for the root user. -h host Host name of the Directory Server. -p port Port number of the Directory Server. -U userDN Specifies the DN of the user entry that needs to be updated with user-level password policy attributes. -S suffixDN Specifies the DN of the suffix entry that needs to be updated with subtree-level password policy attributes. -v Display verbose ouput EXAMPLE
ns-newpwpolicy.pl -Z instance3 -D 'cn=directory manager' -w password -P STARTTLS -U 'uid=user,ou=people,dc=example,dc=com' Note: security must be enabled to use protocol STARTTLS. If STARTTLS is not available it will default to next strongest/available protocol automatically. DIAGNOSTICS
Exit status is zero if no errors occur. Errors result in a non-zero exit status and a diagnostic message being written to standard error. AUTHOR
ns-newpwpolicy.pl was written by the 389 Project. REPORTING BUGS
Report bugs to http://bugzilla.redhat.com. COPYRIGHT
Copyright (C) 2013 Red Hat, Inc. Mar 5, 2013 NS-NEWPWPOLICY.PL(8)

Check Out this Related Man Page

CLEANALLRUV.PL(8)					      System Manager's Manual						 CLEANALLRUV.PL(8)

NAME
cleanallruv.pl - Directory Server perl script for issuing a cleanAllRUV task SYNOPSIS
cleanallruv.pl [-v] [-Z serverID] [-D rootdn] { -w password | -w - | -j filename } -b basedn -r rid [-A] [-P protocol] [-h] DESCRIPTION
Creates and adds a cleanAllRUV task to the Directory Server OPTIONS
A summary of options is included below: -Z Server Identifier The server ID of the Directory Server instance. If there is only one instance on the system, this option can be skipped. -D Root DN The Directory Manager DN, or root DN. If not specified, the script will search the server instance configuration for the value. -w password The rootdn password. -w - Prompt for the rootdn password. -j password filename The name of the file that contains the root DN password. -b basedn The replicated suffix that needs to be cleaned. -r rid The replica ID that needs to be removed. -P Protocol The connection protocol to connect to the Directory Server. Protocols are STARTTLS, LDAPS, LDAPI, and LDAP. If this option is skipped, the most secure protocol that is available is used. For LDAPI, AUTOBIND is also available for the root user. -A Abort a cleanAllRUV task that is currently running. -v Display verbose ouput -h Display usage EXAMPLE
cleanallruv.pl -Z instance1 -D 'cn=directory manager' -j /tmp/pw.txt -b 'dc=example,dc=com' -r 87 -P STARTTLS Note: security must be enabled to use protocol STARTTLS. If STARTTLS is not available it will default to next strongest/available protocol automatically. cleanallruv.pl -j /export/rootdnpw.txt -b 'dc=example,dc=com' -A -r 87 DIAGNOSTICS
Exit status is zero if no errors occur. Errors result in a non-zero exit status and a diagnostic message being written to standard error. AUTHOR
cleanallruv.pl was written by the 389 Project. REPORTING BUGS
Report bugs to http://bugzilla.redhat.com. COPYRIGHT
Copyright (C) 2013 Red Hat, Inc. Mar 5, 2013 CLEANALLRUV.PL(8)
Man Page

Featured Tech Videos