LDAP Account Manager 2.5.0 (Default branch)


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Software Releases - RSS News LDAP Account Manager 2.5.0 (Default branch)
# 1  
Old 01-21-2009
LDAP Account Manager 2.5.0 (Default branch)

Image LDAP Account Manager makes it possible to manage various account types (Unix, Samba, Kolab, etc.) in an LDAP directory. It also features an external script for managing quotas and home directories. License: GNU General Public License (GPL) Changes:
LAM Pro now allows you to manage groups with the rfc2307bis schema and aliases (object class alias).The Samba module is able to manage more password options, and the DHCP extension was enhanced for better stability. Image

Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. Cybersecurity

Single ldap account, different passwords?

Is it possible, either by software solution or configuration, to provision a single user account that has different passwords depending on what group of servers it is attempting to connect to? We have a dev, sit, uat, and production environment. They want to be able to set passwords in dev for... (2 Replies)
Discussion started by: Blackacid
2 Replies

2. AIX

How do I enable 16MB pages for an account that uses LDAP?

With an account that uses "Login AUTHENTICATION GRAMMAR" = "LDAP", I get this when trying to enable 16 MB page support: -bash-3.00# chuser capabilities=CAP_BYPASS_RAC_VMM,CAP_PROPAGATE trbld Error changing "capabilities" to "CAP_BYPASS_RAC_VMM,CAP_PROPAGATE" : Value is invalid. I also tried... (1 Reply)
Discussion started by: mdyeager
1 Replies
Login or Register to Ask a Question
Net::LDAP::Control::PasswordPolicy(3)			User Contributed Perl Documentation		     Net::LDAP::Control::PasswordPolicy(3)

NAME
Net::LDAP::Control::PasswordPolicy - LDAPv3 Password Policy control object SYNOPSIS
use Net::LDAP; use Net::LDAP::Control::PasswordPolicy; use Net::LDAP::Constant qw( LDAP_CONTROL_PASSWORDPOLICY ); $ldap = Net::LDAP->new( "ldap.example.com" ); $pp = Net::LDAP::Control::PasswordPolicy->new; $mesg = $ldap->bind( "cn=Bob Smith,dc=example,dc=com", password => "secret", control => [ $pp ] ); # Get password policy reponse my($resp) = $mesg->control( LDAP_CONTROL_PASSWORDPOLICY ); if (defined($resp)) { my $v = $resp->pp_error; print "Password policy error $v " if defined $v; $v = $resp->time_before_expiration; print "Password expires in $v second(s) " if defined $v; } DESCRIPTION
"Net::LDAP::Control::PasswordPolicy" provides an interface for the creation and manipulation of objects that represent "PasswordPolicyRequest"s and "PasswordPolicyResponse"s as described by draft-behera-password-policy-09. This control can be passed to most operations, including the bind. CONSTRUCTOR ARGUMENTS
There are no constructor arguments other than those provided by Net::LDAP::Control. METHODS
time_before_expiration If defined, this is an integer value holding the time left in seconds before the account's password will expire. grace_authentications_remaining If defined, this is an integer value holding the number of authentication requests allowed before the account is locked. pp_error If defined, this contains a more detailed error code for the account. See Net::LDAP::Constant for definitions of each. Values can include: LDAP_PP_PASSWORD_EXPIRED LDAP_PP_ACCOUNT_LOCKED LDAP_PP_CHANGE_AFTER_RESET LDAP_PP_PASSWORD_MOD_NOT_ALLOWED LDAP_PP_MUST_SUPPLY_OLD_PASSWORD LDAP_PP_INSUFFICIENT_PASSWORD_QUALITY LDAP_PP_PASSWORD_TOO_SHORT LDAP_PP_PASSWORD_TOO_YOUNG LDAP_PP_PASSWORD_IN_HISTORY SEE ALSO
Net::LDAP, Net::LDAP::Control, Net::LDAP::Constant, draft-behera-ldap-password-policy-09.txt AUTHOR
Chris Ridd <chris.ridd@isode.com> Please report any bugs, or post any suggestions, to the perl-ldap mailing list <perl-ldap@perl.org> COPYRIGHT
Copyright (c) 2008 Chris Ridd. All rights reserved. This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself. perl v5.12.1 2010-03-12 Net::LDAP::Control::PasswordPolicy(3)