Skip Navigation Links | |
Exit Print View | |
Working With Naming and Directory Services in Oracle Solaris 11.1 Oracle Solaris 11.1 Information Library |
Part I About Naming and Directory Services
1. Naming and Directory Services (Overview)
2. Name Service Switch (Overview)
4. Setting Up Oracle Solaris Active Directory Clients (Tasks)
Part II NIS Setup and Administration
5. Network Information Service (Overview)
6. Setting Up and Configuring NIS (Tasks)
9. Introduction to LDAP Naming Services (Overview)
LDAP Naming Services Compared to Other Naming Services
Advantages of LDAP Naming Services
Restrictions of LDAP Naming Services
LDAP Naming Services Setup (Task Map)
Using Fully Qualified Domain Names With LDAP
Default Directory Information Tree
Service Search Descriptors and Schema Mapping
LDAP Naming Services Security Model
Assigning Client Credential Levels
LDAP anonymous Credential Level
LDAP proxy anonymous Credential Level
Credential Storage for LDAP Clients
Choosing Authentication Methods for the LDAP Naming Service
Specifying Authentication Methods for Specific Services in LDAP
Pluggable Authentication Methods
LDAP Account Management With the pam_unix_* Modules
10. Planning Requirements for LDAP Naming Services (Tasks)
11. Setting Up Oracle Directory Server Enterprise Edition With LDAP Clients (Tasks)
12. Setting Up LDAP Clients (Tasks)
13. LDAP Troubleshooting (Reference)
14. LDAP Naming Service (Reference)
To simplify client setup, and avoid having to reenter the same information for each and every client, create a single client profile on the directory server. This way, a single profile defines the configuration for all clients configured to use it. Any subsequent change to the profile attributes is propagated to the clients at a rate defined by the refresh interval.
Configuration information specified in the LDAP client profiles, is automatically imported into the SMF repository when the svc:/network/ldap/client service is started.
Any client profiles should be stored in a well-known location on the LDAP server. The root DN for the given domain must have an object class of nisDomainObject and a nisDomain attribute containing the client's domain. All profiles are located in the ou=profile container relative to this container. These profiles should be readable anonymously.
The following table shows the LDAP client's profile attributes, which can be set automatically when you run idsconfig. See How to Initialize an LDAP Client Manually and the idsconfig(1M) man page for information on how to set a client profile manually.
Table 9-2 LDAP Client Profile Attributes
|
The following table lists the LDAP client attributes that can be set locally using the ldapclient command. See the ldapclient(1M) man page for more information.
Table 9-3 Local LDAP Client Attributes
|
Note - If the BaseDN in an SSD contains a trailing comma, it is treated as a relative value of the defaultSearchBase. The values of the defaultSearchBase are appended to the BaseDN before a search is performed.