From a4f77aad7bdaad80c62f4e6d0190c0149b9b080a Mon Sep 17 00:00:00 2001
From: Martin Goik <goik@hdm-stuttgart.de>
Date: Wed, 16 May 2018 17:17:26 +0200
Subject: [PATCH] Chhosing libpam-ldapd in favour of libpam-ldap

---
 Doc/Sdi/ldap.xml | 59 +++++++++++++++++++++++++++++++-----------------
 1 file changed, 38 insertions(+), 21 deletions(-)

diff --git a/Doc/Sdi/ldap.xml b/Doc/Sdi/ldap.xml
index f075351c8..ba5cc2dae 100644
--- a/Doc/Sdi/ldap.xml
+++ b/Doc/Sdi/ldap.xml
@@ -726,31 +726,48 @@ olcModulePath: /usr/lib/ldap</programlisting>
 
       <para>Configure your second VM (the one without <xref
       linkend="glo_LDAP"/> Server) to allow for user login purely based on
-      <xref linkend="glo_LDAP"/>. Activation of OS level <xref
-      linkend="glo_LDAP"/> user and group support is being outlined in <link
-      xlink:href="https://wiki.debian.org/LDAP/PAM">Configuring LDAP
-      Authentication</link>.</para>
+      <xref linkend="glo_LDAP"/>.</para>
 
-      <tip>
-        <para>All user information (<property>uid</property>, common name,
-        numerical id, group information ...) will reside on your <xref
-        linkend="glo_LDAP"/> Server rather than locally in
-        <filename>/etc/passwd</filename>, <filename>/etc/group</filename> and
-        <filename>/etc/shadow</filename>. Create the required user home
-        directory manually.</para>
-
-        <para>On successful configuration corresponding to a <xref
-        linkend="glo_LDAP"/> user <property>ldaptest</property> you should see
-        the following</para>
-
-        <screen>$ id ldaptest
+      <itemizedlist>
+        <listitem>
+          <para>Activation of OS level <xref linkend="glo_LDAP"/> user and
+          group support is being outlined in <link
+          xlink:href="https://wiki.debian.org/LDAP/PAM">Configuring LDAP
+          Authentication</link>.</para>
+        </listitem>
+
+        <listitem>
+          <para>Follow the »newer« <link
+          xlink:href="https://wiki.debian.org/LDAP/PAM#PAM_Setup_with_libpam-ldapd">PAM
+          Setup with libpam-ldapd approach</link> rather than using the older
+          <package>libpam-ldap</package> package.</para>
+        </listitem>
+
+        <listitem>
+          <para>First step will allow for viewing user meta data on the client
+          side:</para>
+
+          <screen>$ id ldaptest
 uid=1001(ldaptest) gid=1001(ldaptest) groups=1001(ldaptest)</screen>
 
-        <para>A <quote>id: ‘ldaptest’: no such user</quote> message indicates
-        your <xref linkend="glo_LDAP"/> setup does not yet work.</para>
+          <para>A <quote>id: ‘ldaptest’: no such user</quote> message
+          indicates your <xref linkend="glo_LDAP"/> setup does not yet
+          work.</para>
+        </listitem>
+
+        <listitem>
+          <para>Create the required user home directory manually and change
+          owner and group accordingly.</para>
+        </listitem>
+      </itemizedlist>
 
-        <para>After this continue to configure password based user login based
-        on <xref linkend="glo_LDAP"/> credentials.</para>
+      <tip>
+        <para><xref linkend="glo_LDAP"/> user information
+        (<property>uid</property>, common name, numerical id, group
+        information ...) will reside on your <xref linkend="glo_LDAP"/> Server
+        rather than locally in <filename>/etc/passwd</filename>,
+        <filename>/etc/group</filename> and <filename>/etc/shadow</filename>.
+        </para>
       </tip>
     </section>
 
-- 
GitLab