7 More Discussions You Might Find Interesting
1. Red Hat
I have done setup for openldap master and slave.
Its working fine and replicating also.
But it is working only with plane text password in syncrepl .
How we can use encrypted password here also like we are using in rootpw ?
Below portion is working.
... (3 Replies)
Discussion started by: Priy
2. UNIX for Advanced & Expert Users
I have configured OpenLDAP sucessfully and set following results indicating that the user is loaded on the LDAP database
test5:/ $ cat /etc/passwd | grep admin777
test5:/ $ getent passwd admin777
test5:/ $ id admin777
uid=5011(admin777)... (0 Replies)
Discussion started by: esawyja
I m using Intel solaris 10 version . I m trying to install openldap and used several documents and package versions .
But every time I got CC PATH error and while I solved the CC issue , I got Barkley DB error . :wall:
Is there any perticular site from where I can install and configure... (1 Reply)
Discussion started by: sanjee
4. Red Hat
I'm studying for the RHCE and have hit the section on configuring an OpenLDAP client. I'd like to practice this, but I can't get an OpenLDAP server set up. I followed the directions in RedHat's Deployment Guide, and it looks like the server is up and running, but I can't get the... (0 Replies)
Discussion started by: rjlohman
I know that IBM's official stance is that NIM does not work on etherchannel environment, but has anyone able to get around it?
I'm working on a p5-590 LPAR system, and the NIM master and clients are all on the same frame.
Any help is appreciated. (1 Reply)
Discussion started by: pdtak
I have a P570 with 3 partitions.
These partitions are available, since 1 year. So there are a lot of users, files, etc, on these partition
I must now install an openldap with Debian to manage all these users.
But several pb:
on LDAP, we are 1 iud for user and one home directory, 1 gid... (0 Replies)
Discussion started by: pascalbout
7. UNIX for Advanced & Expert Users
I'm starting to panic here!
I'm trying to authorize Subversion (via apache) users at my company here via LDAP.
Sure everything works when just authorizing users with require valid-user
But! That is not what I'm looking for, I wish to Authorize by membership in specifik groups...
This... (0 Replies)
Discussion started by: Esaia
UD(1) General Commands Manual UD(1)
ud - interactive LDAP Directory Server query program
ud [-Dv] [-s server] [-d debug-mask] [-l ldap-debug-mask] [-f file]
ud is used to interogate a directory server via the Lightweight Directory Access Protocol (LDAP).
-s server Used to specify the name of an LDAP server to which ud should connect. If this flag is omitted, the value specified in the ud
configuration file is used. If no value is specified in the configuration file, or the configuration file does not exist, the
name ldap is used. Of course, it is up to the system administrator to make sure that the name ldap can be resolved (presumably
through the use of a CNAME or A record in the DNS and the appropriate search path specified in the resolver config file).
Sets the ud debug mask to the value specified. Values for the mask can be dumped by using the -D flag.
-f file Sets the configuration file to the name specified.
Sets the LDAP debug mask to the value specified.
-v Turns on verbose output. Also toggable via the ud verbose command.
-D Prints out a list of valid ud debug masks.
/etc/openldap/ud.conf The ud configuration file.
ud.conf(5), ldap.conf(5), ldap(3)
ud will try to be nice about error conditions, and in most cases prints a warm and fuzzy error message when it encounters a problem. Some-
times the error will be unexpected, and in these cases, ud uses the ldap_perror() routine to print an informative diagnostic.
Too numerous to mention.
Bryan Beecher, University of Michigan
OpenLDAP is developed and maintained by The OpenLDAP Project (http://www.openldap.org/). OpenLDAP is derived from University of Michigan
LDAP 3.3 Release.
4.3 Berkeley Distribution 20 August 2000 UD(1)