LDAP: Difference between revisions
m (→FAQ) |
|||
Line 58: | Line 58: | ||
service slapd stop | service slapd stop | ||
rm /var/lib/ldap/* | rm /var/lib/ldap/* | ||
slapadd -l dump.ldif | |||
chown -R openldap.openldap /var/lib/ldap | chown -R openldap.openldap /var/lib/ldap | ||
service slapd start | |||
==Change OLC config== | ==Change OLC config== |
Revision as of 19:18, 12 July 2015
Lightweight Directory Access Protocol
In computer networking, the Lightweight Directory Access Protocol, or LDAP ("ell-dap"), is a networking protocol for querying and modifying directory services running over TCP/IP. An LDAP directory usually follows the X.500 model: it is a tree of entries, each of which consists of a set of named attributes with values. While some services use a more complicated "forest" model, the vast majority use a simple starting point for their database organization.
An LDAP directory often reflects various political, geographic, and/or organizational boundaries, depending on the model chosen. LDAP deployments today tend to use Domain Name System (DNS) names for structuring the most simple levels of the hierarchy. Further into the directory might appear entries representing people, organizational units, printers, documents, groups of people or anything else which represents a given tree entry, or multiple entries.
Its current version is LDAPv3. LDAPv3 is specified in a series of IETF Standard Track RFCs as detailed in RFC 4510.
Interfaces
Tutorials and docs
- Pam-ldap
- http://www.zytrax.com/books/ldap/
- http://tuxick.net/ldap.html
- http://ldapadministrator.com
- Apache Authentication with Active Directory
- LDAP authentication on Gentoo (slightly outdated)
- LDAP Replication
- Common causes of LDAP errors
- Objectclasses
- LDAP for Rocket Scientists
- http://moduli.net/sysadmin/sarge-ldap-auth-howto.html
- OpenLDAP using OLC (cn=config)
Access control
ldapmodify
Links
FAQ
add indexes
http://forum.zentyal.org/index.php?topic=3006.0
additional info: structuralObjectClass: no user modification allowed
use slapadd instead of ldapadd, while slapd is NOT running:
slapadd -v < ldap.ldif
AttributeType inappropriate matching rule: "integerMatch"
duh
Replace LDAP database
service slapd stop rm /var/lib/ldap/* slapadd -l dump.ldif chown -R openldap.openldap /var/lib/ldap service slapd start
Change OLC config
ldapmodify -Y EXTERNAL -H ldapi:/// dn: cn=config replace: olcLogLevel olcLogLevel: None CTRL + D
create a new database from ldif file
slapadd -f dump.ldif
Remember to set rights to the db storage!
add a record
ldapadd
modify a record
ldapmodify -x -D "cn=admin, dc=bar, dc=com" -W << EOF dn: cn=foo, dc=bar, dc=com changetype: modify replace: sn sn: new name EOF
Or
ldapmodify -D "cn=admin,dc=bar,dc=com" -Y EXTERNAL -H ldapi:/// << EOF .. EOF
Or even, also for reconfiguration of OLC
ldapmodify -Y EXTERNAL -H ldapi:/// < foo.ldif
change olcAccess, olcSuffix etc
I managed this changing things in following order:
olcAccess{2} olcAccess{0} olcRootDN olcSuffix
EOF
add an attribute
changetype: modify add: objectClass objectClass: qmailUser
search for a record
http://docs.sun.com/source/816-6400-10/lsearch.html
ldapsearch -x -b -s base '(objectclass=*)' namingContexts ldapsearch -x -b "dc=foo, dc=com" "uid=harry"
- scope?
ber_get_next on fd 12 failed errno=0 (Success)
You're probably trying to use ldapadd without -x
??
rootdn is always granted unlimited privileges
Error number: 0x50 (LDAP_OTHER)
Internal (implementation specific) error
You probably ran slapindex as wrong user. Set rights on the directory you find under 'directory' in slapd.conf for the user slapd runs as ( openldap on debian )
search filters
view configuration in OLC
slapcat -H "ldap:///cn=config??sub?(olcDatabase=*)"
ldapsearch -Y EXTERNAL -H ldapi:/// -b cn=config
main: TLS init def ctx failed: -1
Probably no access to one of the certificate files
ldif_read_file: checksum error on "/etc/ldap/slapd.d/cn=config/olcDatabase={1}bdb.ldif"
You edited config file instead of using ldapmodify. This error will go away once you used ldapmodify on it.
Keywords
rootdn
The user/account with full access
Tools
- phpldapadmin
- ldapbrowser
- lam
- shelldap
- ldapvi