7 More Discussions You Might Find Interesting
1. Red Hat
Hi,
I have done setup for openldap master and slave.
Its working fine and replicating also.
But it is working only with plane text password in syncrepl .
How we can use encrypted password here also like we are using in rootpw ?
Below portion is working.
syncrepl rid=101
... (3 Replies)
Discussion started by: Priy
3 Replies
2. Solaris
Hi,
im new to Solaris (10) and need some help please.
Situation: Actually is there a Linux (SLES11) OpenLDAP-Server and authentification of Linux-Maschines works pretty sweet. Now i want to put the SOL10 (Sparc) boxes in....
Problem: User Authentification via OpenLDAP on Sol10 doesn´t work... (3 Replies)
Discussion started by: Panzerkampfwagn
3 Replies
3. UNIX for Advanced & Expert Users
Hi All,
I have configured OpenLDAP sucessfully and set following results indicating that the user is loaded on the LDAP database
test5:/ $ cat /etc/passwd | grep admin777
test5:/ $ getent passwd admin777
admin777:x:5011:1000::/:/bin/bash
test5:/ $ id admin777
uid=5011(admin777)... (0 Replies)
Discussion started by: esawyja
0 Replies
4. Solaris
I m using Intel solaris 10 version . I m trying to install openldap and used several documents and package versions .
But every time I got CC PATH error and while I solved the CC issue , I got Barkley DB error . :wall:
Is there any perticular site from where I can install and configure... (1 Reply)
Discussion started by: sanjee
1 Replies
5. Solaris
At work I'm been givin the task to move are backend servers from NIS to LDAP. We have mostly Solaris 10 servers, as well as a few Redhat servers. I am going to use openLDAP as the LDAP server. I'm looking for a good how to guide on setting up the openLDAP server. Most of the docs I have found seem... (0 Replies)
Discussion started by: bitlord
0 Replies
6. Red Hat
Hi, all:
I'm studying for the RHCE and have hit the section on configuring an OpenLDAP client. I'd like to practice this, but I can't get an OpenLDAP server set up. I followed the directions in RedHat's Deployment Guide, and it looks like the server is up and running, but I can't get the... (0 Replies)
Discussion started by: rjlohman
0 Replies
7. AIX
hello
I have a P570 with 3 partitions.
These partitions are available, since 1 year. So there are a lot of users, files, etc, on these partition
I must now install an openldap with Debian to manage all these users.
But several pb:
on LDAP, we are 1 iud for user and one home directory, 1 gid... (0 Replies)
Discussion started by: pascalbout
0 Replies
LEARN ABOUT DEBIAN
apache::authznetldap
AuthzNetLDAP(3pm) User Contributed Perl Documentation AuthzNetLDAP(3pm)
NAME
Apache::AuthzNetLDAP - Apache-Perl module that enables you to authorize a user for Website based on LDAP attributes.
SYNOPSIS
PerlSetVar BindDN "cn=Directory Manager"
PerlSetVar BindPWD "password"
PerlSetVar BaseDN "ou=people,o=unt.edu"
PerlSetVar LDAPServer ldap.unt.edu
PerlSetVar LDAPPort 389
PerlSetVar UIDAttr uid
#PerlSetVar UIDAttr mail
PerlAuthenHandler Apache::AuthNetLDAP
PerlAuthzHandler Apache::AuthzNetLDAP
#require valid-user
#require user mewilcox
#require user mewilcox@venus.acs.unt.edu
#require group "cn=Peoplebrowsers1,ou=UNTGroups,ou=People, o=unt.edu"
#require ldap-url ldap://pandora.acs.unt.edu/o=unt.edu??sub?sn=wilcox
#require ldap-url ldap://pandora.acs.unt.edu/o=unt.edu??sub?sn=smith
#require ldap-url ldap://castor.acs.unt.edu/ou=people,o=unt.edu??sub?untcourse=
untcoursenumber=1999CCOMM2040001,ou=courses,ou=acad,o=unt.edu
DESCRIPTION
After you have authenticated a user (perhaps with Apache::AuthNetLDAP ;) you can use this module to determine whether they are authorized
to access the Web resource under this modules control.
You can control authorization via one of four methods. The first two are pretty standard, the second two are unique to LDAP.
"require" options --
user -> Will authorize access if the authenticated user's username.
valid-user -> Will authorize any authenticated user.
group -> Will authorize any authenticated user who is a member of the LDAP group specified by groupdn. This module supports groupOfMember,
groupOfUniquemember and Netscape's dynamic group object classes.
ldap-url -> This will authorize any authenticated user who matches the query specified in the given LDAP URL. This is enables users to get
the flexibility of Netscape's dynamic groups, even if their LDAP server does not support such a capability.
CONFIGURATION NOTES
It is important to note that this module must be used in conjunction with an authentication module. (...?
Is this true? I just thought, that you might want to only authorize a user, instead of authenticate...)
If you are using an authentication module, then the following lines will not need to be duplicated:
PerlSetVar BindDN "cn=Directory Manager"
PerlSetVar BindPWD "password"
PerlSetVar BaseDN "ou=people,o=unt.edu"
PerlSetVar LDAPServer ldap.unt.edu
PerlSetVar LDAPPort 389
PerlSetVar UIDAttr uid
#PerlSetVar UIDAttr mail
PerlAuthenHandler Apache::AuthNetLDAP
The following lines will not need to be duplicated if supported by the authentication module:
#require valid-user
#require user mewilcox
#require user mewilcox@venus.acs.unt.edu
#require group "cn=Peoplebrowsers1,ou=UNTGroups,ou=People, o=unt.edu"
#require ldap-url ldap://pandora.acs.unt.edu/o=unt.edu??sub?sn=wilcox
#require ldap-url ldap://pandora.acs.unt.edu/o=unt.edu??sub?sn=smith
#require ldap-url ldap://castor.acs.unt.edu/ou=people,o=unt.edu??sub?untcourse=
Obviously, the ldap-url attribute is probably only support by this module.
Check out the following link for options to load the module:
http://perl.apache.org/docs/1.0/guide/config.html#The_Startup_File http://perl.apache.org/docs/2.0/user/config/config.html#Startup_File
AUTHOR
Mark Wilcox mewilcox@unt.edu and Shannon Eric Peevey speeves@unt.edu
SEE ALSO
perl(1).
WARRANTY Hey, I didn't destroy mankind when testing the module. You're mileage may vary.
This module is distributed with the same license as Perl's.
perl v5.10.0 2008-06-29 AuthzNetLDAP(3pm)