没有合适的资源?快使用搜索试试~ 我知道了~
openldap admin guide
需积分: 0 1 下载量 88 浏览量
2013-12-04
13:44:04
上传
评论
收藏 1.45MB PDF 举报
温馨提示
试读
264页
openldap admin guide
资源推荐
资源详情
资源评论
OpenLDAP Software 2.4 Administrator's Guide
Table of Contents
Table of Contents.....................................................................................................................................1
Preface..................................................................................................................................................................1
Copyright.................................................................................................................................................1
Scope of this Document...........................................................................................................................1
Acknowledgments....................................................................................................................................2
Amendments............................................................................................................................................2
About this document................................................................................................................................3
1. Introduction to OpenLDAP Directory Services...........................................................................................3
1.1. What is a directory service?..............................................................................................................3
1.2. What is LDAP?.................................................................................................................................6
1.3. When should I use LDAP?...............................................................................................................6
1.4. When should I not use LDAP?.........................................................................................................6
1.5. How does LDAP work?....................................................................................................................7
1.6. What about X.500?...........................................................................................................................7
1.7. What is the difference between LDAPv2 and LDAPv3?.................................................................7
1.8. LDAP vs RDBMS............................................................................................................................9
1.9. What is slapd and what can it do?...................................................................................................11
2. A Quick-Start Guide.....................................................................................................................................15
3. The Big Picture - Configuration Choices....................................................................................................15
3.1. Local Directory Service..................................................................................................................15
3.2. Local Directory Service with Referrals..........................................................................................15
3.3. Replicated Directory Service..........................................................................................................16
3.4. Distributed Local Directory Service...............................................................................................17
4. Building and Installing OpenLDAP Software............................................................................................17
4.1. Obtaining and Extracting the Software...........................................................................................17
4.2. Prerequisite software.......................................................................................................................17
4.2.1. Transport Layer Security.......................................................................................................18
4.2.2. Simple Authentication and Security Layer...........................................................................18
4.2.3. Kerberos Authentication Service...........................................................................................18
4.2.4. Database Software.................................................................................................................18
4.2.5. Threads..................................................................................................................................19
4.2.6. TCP Wrappers.......................................................................................................................19
4.3. Running configure..........................................................................................................................20
4.4. Building the Software.....................................................................................................................20
4.5. Testing the Software.......................................................................................................................20
4.6. Installing the Software....................................................................................................................21
5. Configuring slapd..........................................................................................................................................21
5.1. Configuration Layout......................................................................................................................23
5.2. Configuration Directives.................................................................................................................24
5.2.1. cn=config...............................................................................................................................25
5.2.2. cn=module.............................................................................................................................26
5.2.3. cn=schema.............................................................................................................................27
OpenLDAP Software 2.4 Administrator's Guide
i
Table of Contents
5. Configuring slapd
5.2.4. Backend-specific Directives..................................................................................................27
5.2.5. Database-specific Directives.................................................................................................32
5.2.6. BDB and HDB Database Directives.....................................................................................36
5.3. Configuration Example...................................................................................................................38
5.4. Converting old style slapd.conf(5) file to cn=config format..........................................................41
6. The slapd Configuration File.......................................................................................................................41
6.1. Configuration File Format..............................................................................................................42
6.2. Configuration File Directives.........................................................................................................42
6.2.1. Global Directives...................................................................................................................44
6.2.2. General Backend Directives..................................................................................................45
6.2.3. General Database Directives.................................................................................................49
6.2.4. BDB and HDB Database Directives.....................................................................................49
6.3. Configuration File Example............................................................................................................51
7. Running slapd................................................................................................................................................51
7.1. Command-Line Options.................................................................................................................53
7.2. Starting slapd..................................................................................................................................53
7.3. Stopping slapd.................................................................................................................................55
8. Access Control...............................................................................................................................................55
8.1. Introduction.....................................................................................................................................55
8.2. Access Control via Static Configuration.........................................................................................56
8.2.1. What to control access to.......................................................................................................57
8.2.2. Who to grant access to...........................................................................................................58
8.2.3. The access to grant................................................................................................................58
8.2.4. Access Control Evaluation....................................................................................................59
8.2.5. Access Control Examples......................................................................................................60
8.3. Access Control via Dynamic Configuration...................................................................................61
8.3.1. What to control access to.......................................................................................................62
8.3.2. Who to grant access to...........................................................................................................63
8.3.3. The access to grant................................................................................................................63
8.3.4. Access Control Evaluation....................................................................................................64
8.3.5. Access Control Examples......................................................................................................65
8.3.6. Access Control Ordering.......................................................................................................66
8.4. Access Control Common Examples...............................................................................................66
8.4.1. Basic ACLs............................................................................................................................67
8.4.2. Matching Anonymous and Authenticated users....................................................................67
8.4.3. Controlling rootdn access......................................................................................................68
8.4.4. Managing access with Groups...............................................................................................69
8.4.5. Granting access to a subset of attributes...............................................................................69
8.4.6. Allowing a user write to all entries below theirs...................................................................70
8.4.7. Allowing entry creation.........................................................................................................71
8.4.8. Tips for using regular expressions in Access Control...........................................................72
8.4.9. Granting and Denying access based on security strength factors (ssf).................................72
8.4.10. When things aren't working as expected.............................................................................73
8.5. Sets - Granting rights based on relationships..................................................................................73
OpenLDAP Software 2.4 Administrator's Guide
ii
Table of Contents
8. Access Control
8.5.1. Groups of Groups..................................................................................................................74
8.5.2. Group ACLs without DN syntax...........................................................................................75
8.5.3. Following references.............................................................................................................77
9. Limits.............................................................................................................................................................77
9.1. Introduction.....................................................................................................................................77
9.2. Soft and Hard limits........................................................................................................................77
9.3. Global Limits..................................................................................................................................78
9.4. Per-Database Limits........................................................................................................................78
9.4.1. Specify who the limits apply to.............................................................................................78
9.4.2. Specify time limits.................................................................................................................79
9.4.3. Specifying size limits............................................................................................................79
9.4.4. Size limits and Paged Results................................................................................................79
9.5. Example Limit Configurations.......................................................................................................79
9.5.1. Simple Global Limits............................................................................................................80
9.5.2. Global Hard and Soft Limits.................................................................................................80
9.5.3. Giving specific users larger limits.........................................................................................80
9.5.4. Limiting who can do paged searches....................................................................................80
9.6. Further Information.........................................................................................................................81
10. Database Creation and Maintenance Tools..............................................................................................81
10.1. Creating a database over LDAP....................................................................................................82
10.2. Creating a database off-line..........................................................................................................83
10.2.1. The slapadd program...........................................................................................................84
10.2.2. The slapindex program........................................................................................................84
10.2.3. The slapcat program............................................................................................................84
10.3. The LDIF text entry format...........................................................................................................87
11. Backends......................................................................................................................................................87
11.1. Berkeley DB Backends.................................................................................................................87
11.1.1. Overview.............................................................................................................................87
11.1.2. back-bdb/back-hdb Configuration.......................................................................................87
11.1.3. Further Information.............................................................................................................87
11.2. LDAP............................................................................................................................................87
11.2.1. Overview.............................................................................................................................88
11.2.2. back-ldap Configuration......................................................................................................89
11.2.3. Further Information.............................................................................................................89
11.3. LDIF..............................................................................................................................................89
11.3.1. Overview.............................................................................................................................89
11.3.2. back-ldif Configuration.......................................................................................................90
11.3.3. Further Information.............................................................................................................90
11.4. LMDB...........................................................................................................................................90
11.4.1. Overview.............................................................................................................................90
11.4.2. back-mdb Configuration......................................................................................................90
11.4.3. Further Information.............................................................................................................90
11.5. Metadirectory................................................................................................................................91
11.5.1. Overview.............................................................................................................................91
OpenLDAP Software 2.4 Administrator's Guide
iii
剩余263页未读,继续阅读
资源评论
ldy_yzf
- 粉丝: 0
- 资源: 3
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功