Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
G
GoikLectures
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Requirements
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Locked files
Deploy
Releases
Container Registry
Model registry
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
Repository analytics
Code review analytics
Issue analytics
Insights
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Goik Martin
GoikLectures
Commits
3109bc51
Commit
3109bc51
authored
6 years ago
by
Goik Martin
Browse files
Options
Downloads
Patches
Plain Diff
Changing section sequence, uid=bean consistency
parent
5dc47f79
No related branches found
Branches containing commit
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
Doc/Sdi/ldap.xml
+54
-54
54 additions, 54 deletions
Doc/Sdi/ldap.xml
with
54 additions
and
54 deletions
Doc/Sdi/ldap.xml
+
54
−
54
View file @
3109bc51
...
...
@@ -423,7 +423,7 @@ objectClass: top
objectClass: organizationalUnit
ou: testing
dn: uid=
smith
,ou=devel,ou=software,ou=departments,dc=betrayer,dc=com
dn: uid=
bean
,ou=devel,ou=software,ou=departments,dc=betrayer,dc=com
objectClass: top
objectClass: person
objectClass: organizationalPerson
...
...
@@ -443,7 +443,7 @@ userPassword:: e3NtZDV9YVhKL2JlVkF2TDRENk9pMFRLcDhjM3ovYTZQZzBXeHA=</programlist
xlink:href=
"https://directory.apache.org/studio"
>
Apache Directory
Studio
</productname>
to supply a
<property>
userPassword
</property>
to
e.g.
<code>
uid=bea
m
,ou=devel,ou=software,ou=departments,dc=betrayer;dc=com
</code>
<code>
uid=bea
n
,ou=devel,ou=software,ou=departments,dc=betrayer;dc=com
</code>
(still binding as
<code>
cn=admin,dc=betrayer,dc=com
</code>
).
</para>
<para>
Then configure a second
<productname
...
...
@@ -574,7 +574,7 @@ modifying entry "olcDatabase={0}config,cn=config"</screen>
tab. Then configure "cn=config" in the
<quote>
Base DN:
</quote>
manually.
</para>
<para>
We may now dynamically alter server configuration parameters
<para>
We may now dynamically alter
our
server configuration parameters
remotely using e.g.
<link
xlink:href=
"https://directory.apache.org/studio"
>
Apache directory
studio
</link>
:
</para>
...
...
@@ -629,13 +629,63 @@ modifying entry "olcDatabase={0}config,cn=config"</screen>
<title>
Extending an existing entry
</title>
<para>
The entry
<code>
uid=bea
m
,ou=devel,ou=software,ou=departments,dc=betrayer;dc=com
</code>
<code>
uid=bea
n
,ou=devel,ou=software,ou=departments,dc=betrayer;dc=com
</code>
may be extended by the
<code>
objectclass
</code>
<code>
posixAccount
</code>
. Construct a
<acronym>
LDIF
</acronym>
file to
add the attributes
<code>
uidNumber
</code>
,
<code>
gidNumber
</code>
and
<code>
homeDirectory
</code>
by a modify/add operation.
</para>
</section>
<section
xml:id=
"sdiSectLdapOsSupport"
>
<title><xref
linkend=
"glo_LDAP"
/>
based user login
</title>
<para>
Configure your second VM (the one without
<xref
linkend=
"glo_LDAP"
/>
Server) to allow for user login purely based on
<xref
linkend=
"glo_LDAP"
/>
.
</para>
<itemizedlist>
<listitem>
<para>
Activation of OS level
<xref
linkend=
"glo_LDAP"
/>
user and
group support is being outlined in
<link
xlink:href=
"https://wiki.debian.org/LDAP/PAM"
>
Configuring LDAP
Authentication
</link>
.
</para>
</listitem>
<listitem>
<para>
Follow the »newer«
<link
xlink:href=
"https://wiki.debian.org/LDAP/PAM#PAM_Setup_with_libpam-ldapd"
>
PAM
Setup with libpam-ldapd approach
</link>
rather than using the older
<package>
libpam-ldap
</package>
package.
</para>
</listitem>
<listitem>
<para>
First step will allow for viewing user meta data on the client
side:
</para>
<screen>
$ id ldaptest
uid=1001(ldaptest) gid=1001(ldaptest) groups=1001(ldaptest)
</screen>
<para>
A
<quote>
id: ‘ldaptest’: no such user
</quote>
message
indicates your
<xref
linkend=
"glo_LDAP"
/>
setup does not yet
work.
</para>
</listitem>
<listitem>
<para>
Create the required user home directory manually and change
owner and group accordingly.
</para>
</listitem>
</itemizedlist>
<tip>
<para><xref
linkend=
"glo_LDAP"
/>
user information
(
<property>
uid
</property>
, common name, numerical id, group
information ...) will reside on your
<xref
linkend=
"glo_LDAP"
/>
Server
rather than locally in
<filename>
/etc/passwd
</filename>
,
<filename>
/etc/group
</filename>
and
<filename>
/etc/shadow
</filename>
.
</para>
</tip>
</section>
<section
xml:id=
"diSectLdapBackupRestore"
>
<title>
Backup and recovery / restore
</title>
...
...
@@ -721,56 +771,6 @@ olcModulePath: /usr/lib/ldap</programlisting>
</note>
</section>
<section
xml:id=
"sdiSectLdapOsSupport"
>
<title><xref
linkend=
"glo_LDAP"
/>
based user login
</title>
<para>
Configure your second VM (the one without
<xref
linkend=
"glo_LDAP"
/>
Server) to allow for user login purely based on
<xref
linkend=
"glo_LDAP"
/>
.
</para>
<itemizedlist>
<listitem>
<para>
Activation of OS level
<xref
linkend=
"glo_LDAP"
/>
user and
group support is being outlined in
<link
xlink:href=
"https://wiki.debian.org/LDAP/PAM"
>
Configuring LDAP
Authentication
</link>
.
</para>
</listitem>
<listitem>
<para>
Follow the »newer«
<link
xlink:href=
"https://wiki.debian.org/LDAP/PAM#PAM_Setup_with_libpam-ldapd"
>
PAM
Setup with libpam-ldapd approach
</link>
rather than using the older
<package>
libpam-ldap
</package>
package.
</para>
</listitem>
<listitem>
<para>
First step will allow for viewing user meta data on the client
side:
</para>
<screen>
$ id ldaptest
uid=1001(ldaptest) gid=1001(ldaptest) groups=1001(ldaptest)
</screen>
<para>
A
<quote>
id: ‘ldaptest’: no such user
</quote>
message
indicates your
<xref
linkend=
"glo_LDAP"
/>
setup does not yet
work.
</para>
</listitem>
<listitem>
<para>
Create the required user home directory manually and change
owner and group accordingly.
</para>
</listitem>
</itemizedlist>
<tip>
<para><xref
linkend=
"glo_LDAP"
/>
user information
(
<property>
uid
</property>
, common name, numerical id, group
information ...) will reside on your
<xref
linkend=
"glo_LDAP"
/>
Server
rather than locally in
<filename>
/etc/passwd
</filename>
,
<filename>
/etc/group
</filename>
and
<filename>
/etc/shadow
</filename>
.
</para>
</tip>
</section>
<section
xml:id=
"sdiSectLdapByJava"
>
<title>
Accessing
<xref
linkend=
"glo_LDAP"
/>
by a
<xref
linkend=
"glo_Java"
/>
application.
</title>
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment