Under the copyright laws, this publication may not be copied, in whole or in part, without the written
consent of Apple.
The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the
“keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may
constitute trademark infringement and unfair competition in violation of federal and state laws.
Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh,
Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered
in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of
Apple Computer, Inc.
Adobe and PostScript are trademarks of Adobe Systems Incorporated.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in
the U.S. and other countries.
Netscape Navigator is a trademark of Netscape Communications Corporation.
RealAudio is a trademark of Progressive Networks, Inc.
This guide consists primarily of chapters that tell you how to administer individual Mac OS X
Server services:
m
Chapter 1, “Administering Your Server,” highlights the major characteristics of Mac OS X
Server’s services and takes you on a tour of its administration applications.
m
Chapter 2, “Directory Services,” describes the services that Mac OS X computers use to
find information about users, groups, and devices on your network. The Mac OS X
directory services architecture is referred to as
m
Chapter 3, “Users and Groups,” covers user and group accounts, describing how to
administer settings for server users and collections of users (groups), including Open
Directory Password Server and other password authentication options.
m
Chapter 4, “Sharing,” tells you how to share folders, hard disks, and CDs among network
users, as well as how to make them automatically visible after logging in to Mac OS X
computers.
m
Chapter 5, “File Services,” describes the file services included in Mac OS X Server: Apple
file service, Windows services, Network File System (NFS) service, and File Transfer
Protocol (FTP) service.
m
Chapter 6, “Client Management: Mac OS X,” addresses client management for Mac OS X
computer users. Client management lets you customize a user’s working environment
and restrict a user’s access to network resources.
m
Chapter 7, “Print Service,” tells you how to share printers among users on Macintosh,
Windows, and other computers.
m
Chapter 8, “Web Service,” describes how to set up and administer a Web server and host
multiple Web sites on your server.
m
Chapter 9, “Mail Service,” describes how to set up and administer a mail server on
your server.
Open Directory.
39
m
Chapter 10, “Client Management: Mac OS 9 and OS 8,” addresses client management for
Mac OS 8 and 9 computer users, describing how to use Macintosh Manager to manage
their day-to-day working environments.
m
Chapter 11, “DHCP Service,” describes Dynamic Host Configuration Protocol (DHCP)
service, which lets you dynamically allocate IP addresses to the computers used by
server users.
m
Chapter 12, “NetBoot,” describes the application that lets Macintosh Mac OS 9 and X
computers boot from a network-based system image.
m
Chapter 13, “Network Install,” tells you how to use the centralized network software
installation service that automates installing, restoring, and upgrading Macintosh
computers on your network.
m
Chapter 14, “DNS Service,” describes Dynamic Name Service (DNS), a distributed
database that maps IP addresses to domain names.
m
Chapter 15, “Firewall Service,” addresses how to protect your server by scanning
incoming IP packets and rejecting or accepting these packets based on filters you create.
m
Chapter 16, “SLP DA Service,” describes Service Location Protocol Directory Assistant (SLP
DA), which you can use to make devices on your network visible to your server users.
m
Chapter 17, “Tools for Advanced Users,” describes server applications, tools, and
techniques intended for use by experienced server administrators.
m
Appendix A, “Open Directory Data Requirements,” provides information you’ll need
when you must map directory services information needed by Mac OS X to information
your server will retrieve from another vendor’s server.
m
The Glossary defines terms you’ll encounter as you read this guide.
Using This Guide
Review the first chapter to acquaint yourself with the services and applications that Mac OS X
Server provides.
Then read any chapter that’s about a service you plan to provide to your users. Each service’s
chapter includes an overview of how the service works, what it can do for you, strategies for
using it, how to set it up for the first time, and how to administer it over time.
Also take a look at any chapter that describes a service with which you’re unfamiliar. You may
find that some of the services you haven’t used before can help you run your network more
efficiently and improve performance for your users.
Most chapters end with a section called “Where to Find More Information.” This section
points you to Web sites and other reference material containing more information about
the service.
Preface
40
Setting Up Mac OS X Server for the First Time
If you haven’t installed and set up Mac OS X Server, do so now.
m
Refer to
Getting Started With Mac OS X Server,
the document that came with your
software, for instructions on server installation and setup. For many environments, this
document provides all the information you need to get your server up, running, and
available for initial use.
m
Review Chapter 1, “Administering Your Server,” in this guide to determine which services
you’d like to refine and expand, to identify new services you’d like to set up, and to learn
about the server applications you’ll use during these activities.
m
Read specific chapters to learn how to continue setting up individual services. Pay
particular attention to the information in these sections: “Setup Overview,” “Before You
Begin,” and “Setting Up for the First Time.”
Getting Help for Everyday Management Tasks
If you want to change settings, monitor services, view service logs, or do any other day-to-day
administration task, you can find step-by-step procedures by using the online help available
with server administration programs. While all the administration tasks are also documented
in this guide, sometimes it’s more convenient to retrieve information in online help form
while using your server.
Getting Additional Information
In addition to this document, you’ll find information about Mac OS X Server
m
in
Getting Started With Mac OS X Server, which tells you how to install and set up your
server initially
m in Upgrading to Mac OS X Server, which provides instructions for migrating data to
Mac OS X Server from existing Macintosh computers
m at www.apple.com/macosx/server
m in online help on your server
m in Read Me files on your server CD
How to Use This Guide
41
CHAPTER
1
1Administering Your Server
Mac OS X Server is a powerful server platform that delivers a complete range of services to
users on the Internet and local network:
m You can connect users to each other, using services such as mail and file sharing.
m You can share system resources, such as printers and computers—maximizing their
availability as users move about and making sure that disk space and printer usage remain
equitably shared.
m You can host Internet services, such as Web sites and streaming video.
m You can customize working environments—such as desktop resources and personal
files—of networked users.
This chapter is a tour of Mac OS X Server capabilities and administration. The chapter begins
by pointing out some of Mac OS X Server’s key features. Then it summarizes the services you
can set up to support the clients you want your server to host. Finally, it introduces the
applications you use to set up and administer your server.
Highlighting Key Features
Mac OS X Server has a wide range of features that characterize it as easy to use, yet robust
and high performing.
Ease of Setup and Administration
From the time you first unpack your server throughout its initial setup and deployment, its
ease of use is prominent.
Setup assistants quickly walk you through the process of making basic services initially
available. While your network users take advantage of the initial file sharing, mail, Web and
other services, you can add on additional client support and manage day-to-day server
operations using graphical administrative applications. From one administrator computer,
you can set up and manage all the Mac OS X Servers on your network.
43
Networking and Security
You can choose from several user authentication options, ranging from Kerberos or
Lightweight Directory Access Protocol (LDAP) to Mac OS X Server’s Open Directory
Password Server.
Password Server lets you implement password policies and supports a wide variety of client
protocols. The Password Server is based on a standard known as SASL (Simple
Authentication and Security Layer), so it can support a wide range of network user
authentication protocols that are used by clients of Mac OS X Server services, such as mail
and file servers, that need to authenticate users.
Kerberos authentication is available for file services—Apple Filing Protocol (AFP) and File
Transfer Protocol (FTP)—as well as for mail services (POP, IMAP, and SMTP).
External network communication requests can be controlled with built-in Internet Protocol
(IP) firewall management. And data communications can be encrypted and authenticated
with protocol-level data security provided with Secure Sockets Layer (SSL), Transport Layer
Security (TLS), and Secure Shell (SSH).
File and Printer Sharing
File sharing offers flexible support for various native protocols as well as security and high
availability:
m It’s easy to share files with Macintosh, Windows, UNIX, Linux, and anonymous Internet
clients.
m You can control how much file space individual users consume by setting up mail and file
quotas. Quotas limit the number of megabytes a user can use for mail or files.
m Kerberos authentication is available for AFP and FTP file servers.
m You can improve the security of NFS volumes by setting up share points on them that let
users access them using the more secure AFP protocol. This feature is referred to as
resharing NFS mounts.
m AFP autoreconnect lets client computers keep Apple file servers mounted after long
periods of inactivity or after sleep/wake cycles.
Mac OS X Server printer sharing includes
m the ability to set up print quotas. Print quotas can be set up for each user and each print
queue, letting you limit the number of pages that can be printed during a particular
period.
m support for sharing printers among Mac OS 9 users (AppleTalk and LaserWriter 8
support), Mac OS X, Windows, and UNIX users
44Chapter 1
Open Directory Services
User and group information is used by your server to authenticate users and authorize their
access to services and files. Information about other network resources is used by your
server to make printers and other devices available to particular users. To access this
information, the server retrieves it from centralized data repositories known as directory domains. The term for the services that locate and retrieve this data is directory services.
The Mac OS X directory services architecture is referred to as Open Directory. It lets you
store data in a way that best suits your environment. Mac OS X Server can host directory
domains using Apple’s NetInfo and LDAP directory domains. Open Directory also lets you
take advantage of information you have already set up in non-Apple directory domains—for
example, LDAP or Active Directory servers or Berkeley Software Distribution (BSD)
configuration files.
Comprehensive Management of Macintosh Workgroups
Workgroup management services let you simplify and control the environment that
Macintosh client users experience.
Mac OS X Server client management support helps you personalize the computing
environment of Macintosh clients. You can set up Mac OS 8, 9, and X computers to have
particular desktop environments and access to particular applications and network
resources. You can design your Macintosh users’ experience as circumstances warrant.
You can also use NetBoot and Network Install to automate the setup of software used by
Macintosh client computers:
m NetBoot lets Macintosh Mac OS 9 and X computers boot from a network-based system
image, offering quick and easy configuration of department, classroom, and individual
systems as well as Web and application servers throughout a network. When you update
NetBoot images, all NetBooted computers have instant access to the new configuration.
m Network Install is a centralized network software installation service. It lets you selectively
and automatically install, restore, or upgrade network-based Macintosh systems anywhere
in the organization.
Mac OS X Server also lets you automatically configure the directory services you want Mac OS X
clients to have access to. Automatic directory services configuration means that when a user
logs into a Mac OS X computer, the user’s directory service configuration is automatically
downloaded from the network, setting up the user’s network access policies, preferences, and
desktop configuration without the need to configure the client computer directly.
Administering Your Server45
High Availability
To maximize server availability, Mac OS X Server includes technology for monitoring server
activity, monitoring and reclaiming disk space, automatically restarting malfunctioning
services, and automatically restarting the server following a power failure.
You can also configure IP failover. IP failover is a way to set up a standby server that will take
over if the primary server fails. The standby server takes over the IP address of the failed
server, which takes the IP address back when it is online again. IP failover is useful for DNS
servers, Web servers hosting Web sites, media broadcast servers, and other servers that
require minimal data replication.
Extensive Internet and Web Services
Powerful Internet and Web services are built into Mac OS X Server:
m Apache, the most popular Web server, provides reliable, high-performance Web content
delivery. Integrated into Apache is Web-Based Distributed Authoring and Versioning
(WebDAV), which simplifies the Web publishing and content management environment.
m If your Web sites contain static HTML files that are frequently requested, you can enable a
performance cache to improve server performance.
m Web services include a comprehensive assortment of open-source services—Ruby,
Tomcat, MySQL, PHP, and Perl.
m Mac OS X Server includes a high-performance Java virtual machine.
m SSL support enables secure encryption and authentication for ecommerce Web sites and
confidential materials.
m QuickTime Streaming Server (QTSS) lets you stream both live and stored multimedia
content on the Internet using industry-standard protocols.
m Mail service lets you set up a mail server your network users can use to send and receive
email.
m WebMail service bundled with Mac OS X Server enables your users to access mail service
via a Web browser.
Highlighting Individual Services
This section highlights individual Mac OS X Server services and tells you where in this guide
to find more information about them.
46Chapter 1
Directory Services
Directory services let you use a central data repository for user and network information
your server needs to authenticate users and give them access to services. Information about
users (such as their names, passwords, and preferences) as well as printers and other
resources on the network is consolidated rather than distributed to each computer on the
network, simplifying the administrator’s tasks of directory domain setup and maintenance.
Open Directory
On Mac OS X computers, the directory services are collectively referred to as Open
Directory. Open Directory acts as an intermediary between directory domains that store
information and Mac OS X processes that need the information.
Open Directory supports a wide variety of directory domains, letting you store your directory
information on Mac OS X Server or on a server you already have set up for this purpose:
m You can define and manage information in directory domains that reside on Mac OS X
Server. Open Directory supports both NetInfo and LDAPv3 protocols and gives you
complete control over directory data creation and management.
m Mac OS X Server can also retrieve directory data from LDAP and Active Directory servers
and BSD configuration files you’ve already set up. Your server provides full read/write and
SSL communications support for LDAPv3 directory domains.
Chapter 2, “Directory Services,” provides complete information about all the Open Directory
options, including instructions for how to create Mac OS X–resident directory domains and
how to configure your server and your clients to access directory domains of all kinds.
Chapter 3, “Users and Groups,” describes how to work with user and group accounts stored
in Open Directory domains.
Password Validation
Open Directory gives you several options for validating a user’s password:
m Using a value stored as a readable attribute in the user’s account.
m Using a value stored in the Open Directory Password Server. This strategy lets you set up
user-specific password policies for users. For example, you can require a user to change
his password periodically or use only passwords having more than a minimum number
of characters.
Password Server supports a wide range of client authentication protocols.
m Using a Kerberos server.
m Using LDAP bind authentication with a non-Apple LDAPv3 directory server.
“Understanding Password Validation” on page 189 provides more information about these
options and tells you how to implement them.
Administering Your Server47
Search Policies
Before a user can log in to or connect with a Mac OS X client or server, he or she must enter
a name and password associated with a user account that the computer can find. A Mac OS X
computer can find user accounts that reside in a directory domain of the computer’s search
policy. A search policy is a list of directory domains the computer searches when it needs
configuration information.
You can configure the search policy of Mac OS X computers on the computers themselves.
You can automate Mac OS X client directory setup by using your server’s built-in DHCP
Option 95 support.
Chapter 2, “Directory Services,” describes how to configure search policies on any Mac OS X
computer.
File Services
Mac OS X Server makes it easy to share files using the native protocols of different kinds of
client computers. Mac OS X Server includes four file services:
m Apple file service, which uses the Apple Filing Protocol (AFP), lets you share resources
with clients who use Macintosh or Macintosh-compatible operating systems.
m Windows services use Server Message Block (SMB) protocol to let you share resources
with clients who use Windows, and to provide name resolution service for Windows
clients.
m File Transfer Protocol (FTP) service lets you share files with anyone using FTP.
m Network File System (NFS) service lets you share files and folders with users who have
NFS client software (UNIX users).
You can deploy network home directories for Mac OS X clients using AFP and for UNIX
clients using NFS. With a network home directory, users can access their applications,
documents, and individual settings regardless of the computer to which they log in. You can
impose disk quotas on network home directories to regulate server disk usage for users with
home directories.
Sharing
You share files among users by designating share points. A share point is a folder, hard disk
(or hard disk partition), or CD that you make accessible over the network. It’s the point of
access at the top level of a group of shared items.
On Mac OS X computers, share points can be found in the /Network directory and by using
the Finder’s Connect To Server command. On Mac OS 8 and 9 computers, users access share
points using the Chooser. On Windows computers, users use Network Neighborhood.
Chapter 4, “Sharing,” tells you how to set up and manage share points.
48Chapter 1
Static file server listings can also be published in a non-Apple directory domain, making it
easy for computers in your company that are not on your local network to discover and
connect to Mac OS X Server.
Apple File Service
Apple Filing Protocol (AFP) allows Macintosh client users to connect to your server and
access folders and files as if they were located on the user’s own computer.
AFP offers
m file sharing support for Macintosh clients over TCP/IP
m autoreconnect support when a file server connection is interrupted
m encrypted file sharing (AFP through SSH)
m automatic creation of user home directories
m Kerberos v5 authentication for Mac OS X v10.2 and later clients
m fine-grain access controls for managing client connections and guest access
m automatic disconnect of idle clients after a period of inactivity
AFP also lets you reshare NFS mounts using AFP. This feature provides a way for clients not
on the local network to access NFS volumes via a secure, authenticated AFP connection. It
also lets Mac OS 9 clients access NFS file services on traditional UNIX networks.
See “Apple File Service” on page 224 for details about AFP.
Windows Services
Windows services in Mac OS X Server provide four native services to Windows clients:
m file service, which allows Windows clients to connect to Mac OS X Server using Server
Message Block (SMB) protocol over TCP/IP
m print service, which uses SMB to allow Windows clients to print to PostScript printers on
the network
m Windows Internet Naming Service ( WINS), which allows clients across multiple subnets
to perform name/address resolution
m browsing, which allows clients to browse for available servers across subnets
See “Windows Services” on page 235 for more information about Windows services.
Network File System (NFS) Service
NFS is the protocol used for file services on UNIX computers.
The NFS term for sharing is export. You can export a shared item to a set of client computers
or to “World.” Exporting an NFS volume to World means that anyone who can access your
server can also access that volume.
Administering Your Server49
NFS does not support name/password authentication. It relies on client IP addresses to
authenticate users and on client enforcement of privileges—not a secure approach in most
networks. Therefore use NFS only if you are on a local area network (LAN) with trusted client
computers or if you are in an environment that can’t use Apple file sharing or Windows file
sharing. If you have Internet access and plan to export to World, your server should be
behind a firewall.
See “Network File System (NFS) Service” on page 256 for more information about NFS.
File Transfer Protocol (FTP)
FTP allows computers to transfer files over the Internet. Clients using any operating system
that supports FTP can connect to your FTP file server and download files, depending on the
permissions you set. Most Internet browsers and a number of freeware applications can be
used to access your FTP server.
FTP service in Mac OS X Server supports Kerberos v5 authentication and, for most FTP
clients, resuming of interrupted FTP file transfers. Mac OS X Server also supports dynamic
file conversion, allowing users to request compressed or decompressed versions of
information on the server.
FTP is considered to be an insecure protocol, since user names and passwords are
distributed across the Internet in clear text. Because of the security issues associated with
FTP authentication, most FTP servers are used as Internet file distribution servers for
anonymous FTP users.
Mac OS X Server supports anonymous FTP and by default prevents anonymous FTP users
from deleting files, renaming files, overwriting files, and changing file permissions. Explicit
action must be taken by the server administrator to allow uploads from anonymous FTP
users, and then only into a specific share point.
See “File Transfer Protocol (FTP) Service” on page 244 for details about FTP.
Print Service
Print service in Mac OS X Server lets you share network and direct-connect printers among
clients on your network. Print service also includes support for managing print queues,
monitoring print jobs, logging, and using print quotas.
Print service lets you
m share printers with Mac OS 9 (PAP, LaserWriter 8), Mac OS X (IPP, LPR/LPD), Windows
(SMB/CIFS), and UNIX (LPR/LPD) clients
m share direct-connect USB printers with Mac OS X version 10.2 and later clients
m connect to network printers using AppleTalk, LPR, and IPP and connect to direct-connect
printers using USB
m make printers visible using Open Directory directory domains
50Chapter 1
m impose print quotas to limit printer usage
See Chapter 7, “Print Service,” for information about print service.
Web Service
Web service in Mac OS X Server is based on Apache, an open-source HTTP Web server. A Web
server responds to requests for HTML Web pages stored on your site. Open-source software
allows anyone to view and modify the source code to make changes and improvements.
This has led to Apache’s widespread use, making it the most popular Web server on the
Internet today.
Web service includes a high-performance, front-end cache that improves performance for
Web sites that use static HTML pages. With this cache, static data doesn’t need to be accessed
by the server each time it is requested.
Web service also includes support for Web-based Distributed Authoring and Versioning,
(WebDAV). With WebDAV capability, your client users can check out Web pages, make
changes, and then check the pages back in while the site is running. In addition, Mac OS X
users can use a WebDAV-enabled Web server as if it were a file server.
Web service’s Secure Sockets Layer (SSL) support enables secure encryption and
authentication for ecommerce Web sites and confidential materials. An easy-to-use digital
certificate provides non-forgeable proof of your Web site identity.
Mac OS X Server offers extensive support for dynamic Web sites:
m Web service supports Java Servlets, JavaServer Pages, MySQL, PHP, Perl, and UNIX and
Mac CGI scripts.
m Mac OS X Server also includes WebObjects deployment software. WebObjects offers a
flexible and scalable way to develop and deploy ecommerce and other Internet
applications. WebObjects applications can connect to multiple databases and dynamically
generate HTML content. You can also purchase the WebObjects development tools if you
want to create WebObjects applications. For more information and documentation on
WebObjects, go to the WebObjects Web page:
www.apple.com/webobjects
See Chapter 8, “Web Service,” for details about Web service.
Mail Service
Mail services support the SMTP, POP, and IMAP protocols, allowing you to select a local or
server-based mail storage solution for your users.
Administering Your Server51
With remote mail administration you can manage the message database from any IMAP
client. Realtime Blackhole List support allows you to block messages from known spam
sources. Support for single or dual IMAP/POP3 mail inboxes gives flexibility in mail retrieval; a
user can have a POP mailbox for office use and an IMAP mailbox for mobile use. Automatic
blind copying (BCC) on incoming mail from specified hosts lets you track email coming from
specific sites. You can limit the amount of disk space a user consumes for mail messages.
To protect email communication from eavesdroppers, mail service features SSL encryption of
IMAP connections between the mail server and clients, SMTP AUTH authentication using
LOGIN and PLAIN, and APOP and Kerberos v5 authentication for POP, IMAP, and SMTP clients.
For complete information about mail services, see Chapter 9, “Mail Service.”
Macintosh Workgroup Management
Mac OS X Server provides work environment personalization for Mac OS 8, 9, and X
computer users, ranging from preference management to operating system and application
installation automation.
Client Management
You can use Mac OS X Server to manage the work environments of Mac OS 8, 9, and X
clients. Preferences you define for individual users, groups of users, and computers provide
your Macintosh users with a consistent desktop, application, and network appearance
regardless of the Macintosh computer to which they log in.
To manage Mac OS 8 and 9 clients, you use Macintosh Manager, described in Chapter 10,
“Client Management: Mac OS 9 and OS 8.” To manage Mac OS X clients, you use Workgroup
Manager, as Chapter 6, “Client Management: Mac OS X,” describes.
Mac OS X client management has several advantages:
m You can take advantage of the directory services autoconfiguration capability to
automatically set up the directory services used by Mac OS X client computers.
m When you update user, group, and computer accounts, managed Mac OS X users inherit
changes automatically. You update Mac OS 8 and 9 accounts independently, using
Macintosh Manager.
m You have more direct control over individual system preferences.
m Network home directories and group directories can be mounted automatically at login.
NetBoot
NetBoot lets Macintosh clients boot from a system image located on Mac OS X Server instead
of from the client computer’s disk drive. You can set up multiple NetBoot disk images, so
you can boot clients into Mac OS 9 or X or even set up customized Macintosh environments
for different groups of clients.
52Chapter 1
NetBoot can simplify the administration and reduce the support normally associated with
large-scale deployments of network-based Macintosh systems. NetBoot is ideal for an
organization with a number of client computers that need to be identically configured. For
example, NetBoot can be a powerful solution for a data center that needs multiple identically
configured Web and application servers.
NetBoot allows administrators to configure and update client computers instantly by simply
updating a boot image stored on the server. Each image contains the operating system and
application folders for all clients on the server. Any changes made on the server are
automatically reflected on the clients when they reboot. Systems that are compromised or
otherwise altered can be instantly restored simply by rebooting.
See Chapter 12, “NetBoot,” for information about setting up and managing NetBoot.
Network Install
Network Install is a centrally managed installation service that allows administrators to
selectively install, restore, or upgrade client computers. Installation images can contain the
latest release of Mac OS X, a software update, site-licensed or custom applications, even
configuration scripts:
m Network Install is an excellent solution for operating system migrations, installing
software updates and custom software packages, restoring computer classrooms and labs,
and reimaging desktop and portable computers.
m You can define custom installation images for various departments in an organization,
such as marketing, engineering, and sales.
With Network Install you don’t need to insert multiple CDs to configure a system. All the
installation files and packages reside on the server and are installed onto the client computer
at one time. Network Install also includes pre- and post-installation scripts you can use to
invoke actions prior to or after the installation of a software package or system image.
See Chapter 13, “Network Install,” for more information about Network Install.
Network Services
Mac OS X Server includes these network services for helping you manage Internet
communications on your TCP/IP network:
m Dynamic Host Configuration Protocol (DHCP)
m Domain Name System (DNS)
m IP firewall
m Service Location Protocol Directory Agent (SLP DA)
Administering Your Server53
DHCP
DHCP helps you administer and distribute IP addresses dynamically to client computers from
your server. From a block of IP addresses that you define, your server locates an unused
address and “leases” it to client computers as needed. DHCP is especially useful when an
organization has more clients than IP addresses. IP addresses are assigned on an as-needed
basis, and when they are not needed they are available for use by other clients.
As you learned in “Search Policies” on page 48, you can automate the directory services setup
of Mac OS X clients using your DHCP server’s Option 95 support. This option lets client
computers learn about their directory settings from an LDAP server.
Chapter 11, “DHCP Service,” provides information about your server’s DHCP capabilities.
DNS
DNS service lets users connect to a network resource, such as a Web or file server, by
specifying a host name (such as server.apple.com) rather than an IP address (192.168.11.12).
DNS is a distributed database that maps IP addresses to domain names.
A server that provides DNS service keeps a list of names and the IP addresses associated with
the names. When a computer needs to find the IP address for a name, it sends a message to
the DNS server (also known as a name server). The name server looks up the IP address and
sends it back to the computer. If the name server doesn’t have the IP address locally, it sends
messages to other name servers on the Internet until the IP address is found.
You will use DNS if you use SMTP mail service or if you want to create subdomains within
your primary domain. You will also use DNS if you are hosting multiple Web sites. If you don’t
have an Internet service provider (ISP) who handles DNS for your network, you can set up a
DNS server on your Mac OS X Server.
You’ll find complete information about DNS in Chapter 14, “DNS Service.”
IP Firewall
IP firewall service protects your server and the content you store on it from intruders. It
provides a software firewall, scanning incoming IP packets and accepting or rejecting them
based on filters you define.
You can set up server-wide restrictions for packets from specific IP addresses. You can also
restrict access to individual services—such as Web, mail, and FTP—by defining filters for the
ports used by the services.
See Chapter 15, “Firewall Service,” for more information about this service.
SLP DA
Service Location Protocol (SLP) provides structure to the services available on a network and
gives users easy access to them.
54Chapter 1
Anything that can be addressed using a URL can be a network service—for example, file
servers and WebDAV servers. When a service is added to your network, the service uses SLP
to register itself on the network; you don’t need to configure it manually. When a client
computer needs to locate a network service, it uses SLP to look for services of that type. All
registered services that match the client computer’s request are displayed for the user, who
then can choose which one to use.
SLP Directory Agent (DA) is an improvement on basic SLP, providing a centralized repository
for registered network services. You can set up a DA to keep track of services for one or more
scopes (groups of services). When a client computer looks for network services, the DA for
the scope in which the client computer is connected responds with a list of available network
services. Because a client computer only needs to look locally for services, network traffic is
kept to a minimum and users can connect to network services more quickly.
See Chapter 16, “SLP DA Service,” for information about this service.
QuickTime Streaming Service
QuickTime Streaming Server (QTSS) lets you stream multimedia in real time using the
industry-standard RTSP/RTP protocols. QTSS supports MPEG-4, MP3, and QuickTime file
formats.
You can deliver live and prerecorded media over the Internet to both Macintosh and
Windows users, or relay streamed media to other streaming servers. You can provide unicast
streaming, which sends one stream to each individual client, or multicast streaming, which
sends the stream to a group of clients.
For more information about QTSS, refer to the QuickTime Web site:
www.apple.com/quicktime/products/qtss/
You can use QuickTime Broadcaster in conjunction with QTSS when you want to produce a
live event. QuickTime Broadcaster allows you to stream live audio and video over the
Internet. QuickTime Broadcaster meets the needs of both beginners and professionals by
providing preset broadcast settings and the ability to create custom settings. Built on top of
the QuickTime architecture, QuickTime Broadcaster enables you to produce a live event
using most codecs that QuickTime supports.
When teamed with QuickTime Streaming Server or Darwin Streaming Server, QuickTime
Broadcaster can produce a live event for delivery to an audience of any size, from an
individual to a large global audience.
For information about QuickTime Broadcaster, go to this Web site and navigate to the
QuickTime Broadcaster page:
www.apple.com/quicktime/
Administering Your Server55
Highlighting Server Applications
This section introduces you to the applications, tools, and techniques you use to set up and
administer your Mac OS X Server. The following table summarizes them and tells you where
to find more information about them.
Application, tool,
or techniqueUse to
For more
information, see
Server AssistantInitialize servicespage 58
Open Directory
Assistant
Create or set up access to existing NetInfo and
LDAPv3 directory domains and create and
page 58
configure Password Servers
Directory AccessConfigure access to data in existing directory
page 59
domains and define a search policy
Workgroup ManagerAdminister accounts, manage share points, and
page 59
administer client management for Mac OS X
users
Server SettingsConfigure file, print, mail, Web, NetBoot, and
page 60
network services
Server StatusMonitor servicespage 61
Macintosh ManagerAdminister client management for Mac OS 8
softwareupdateFind new versions of software and install them
page 561
remotely on a server
systemsetupConfigure system preferences on a remote
page 561
server
networksetupConfigure network services for a particular
page 562
network hardware port on a remote server
MySQL ManagerManage the version of MySQL that is installed
page 565
with Mac OS X Server
Simple Network
Monitor your server using the SNMP interfacepage 566
Management Protocol
(SNMP) administration
tools
diskKeyFinderVerify the physical location of a remote
page 566
headless server volume that you want to
manage
Enabling IP failoverSet up a standby server that takes over if the
page 567
primary server fails
Administering Your Server57
Administering a Server From Different Computers
You can use the server applications to manage the local server or to manage a remote server,
including headless servers. You can also manage Mac OS X Servers remotely from an
administrator computer. An administrator computer is a Mac OS X computer onto which
you have installed the server applications from the Mac OS X Server Administration Tools CD.
Administrator
computer
Mac OS X Servers
The following sections give you more information about the first 11 applications in the table
above, including instructions for using them to manage a remote server. The remaining
applications and tools are for use by experienced server administrators; see Chapter 17,
“Tools for Advanced Users,” for information about them.
Server Assistant
Server Assistant is the application you use to perform initial service setup of a Mac OS X
Server. You can use Server Assistant the first time you set up a local or remote Mac OS X
Server. See Getting Started With Mac OS X Server for instructions.
Open Directory Assistant
Use Open Directory Assistant to create shared server–resident NetInfo or LDAPv3 directory
domains, set up Password Servers, and configure access to shared domains and Password
Servers.
You can run Open Directory Assistant immediately after running Server Assistant, or you can
run it later, as many times as you like.
58Chapter 1
You’ll find Open Directory Assistant in /Applications/Utilities/. For information about how to
use the application, see Chapter 2, “Directory Services.”
Directory Access
Directory Access is the primary application for setting up a Mac OS X computer’s
connections with directory domains as well as defining the computer’s search path.
Unlike Open Directory Assistant, Directory Access does not create directory domains. It
m configures connections with existing domains
m enables or disables service discovery protocols (AppleTalk, Rendezvous, SLP, and SMB)
m enables or disables directory protocols (LDAPv2, LDAPv3, NetInfo, and BSD configuration
files)
In addition, Directory Access is available on both Mac OS X Servers and Mac OS X client
computers, whereas Open Directory Assistant is available only on servers.
You’ll find Directory Access in /Applications/Utilities/. For information about how to use it,
see Chapter 2, “Directory Services.”
Workgroup Manager
You use Workgroup Manager to administer user, group, and computer accounts; manage
share points; and administer client management for Mac OS X users.
For information about using Workgroup Manager to administer user and group accounts, see
Chapter 3, “Users and Groups.” For information about using it to administer computer
accounts and client management settings, see Chapter 6, “Client Management: Mac OS X,”
and Chapter 10, “Client Management: Mac OS 9 and OS 8.” Chapter 4, “Sharing,” describes
how to use Workgroup Manager to manage share points.
Opening and Authenticating in Workgroup Manager
Workgroup Manager is installed in /Applications/Utilities/ when you install your server or set
up an administrator computer. To open Workgroup Manager, click the Workgroup Manager
icon in the Dock of Mac OS X Server or in the toolbar of Server Status:
m To open Workgroup Manager on the server you are using without authenticating, choose
View Directories from the Server menu. You will have read-only access to information
displayed in Workgroup Manager. To make changes, click the lock icon to authenticate as
an administrator. This approach is most useful when you are administering different
servers and working with different directory domains.
m To authenticate as an administrator for a particular server, enter the server’s IP address or
DNS name in the login window, or click Browse to choose from a list of servers. Specify
the user name and password for an administrator of the server, then click Connect. Use
this approach when you will be working most of the time with a particular server.
Administering Your Server59
Major Workgroup Manager Tasks
After login, the user account window appears, with lists of user, group, and computer
accounts in the server’s local directory domain. Here is how to get started with the major
tasks you’ll be performing with this application:
m To administer user, group, or computer accounts, click the Accounts icon in the toolbar.
See Chapter 3, “Users and Groups,” for information about user and group accounts and
Chapter 6, “Client Management: Mac OS X,” for information about computer accounts.
m To work with preferences for managed users, groups, or computers, click the Preferences
icon in the toolbar. See Chapter 6, “Client Management: Mac OS X,” for instructions.
m To work with share points, click the Sharing icon in the toolbar. See Chapter 4, “Sharing,”
for instructions.
m To work with accounts in different directory domains at the same time, open multiple
Workgroup Manager windows by choosing New Workgroup Manager Window from the
Server menu.
m To open Server Status so you can monitor the status of a particular server, click the Status
icon in the toolbar. See “Server Status” on page 61 for information about the Server Status
application.
m To open Server Settings so you can work with a server’s file, print, mail, Web, NetBoot,
and network settings, choose Configure Services from the Server menu. See “Server
Settings” on page 60 for information about the Server Settings application.
m To control the way Workgroup Manager lists users and groups, whether it should use SSL
transactions, and other behaviors, choose Preferences from the Workgroup Manager
menu.
m To customize the Workgroup Manager toolbar, choose Customize Toolbar from the View
menu.
m To retrieve online information, use the Help menu. It provides help for server
administrators about Workgroup Manager as well as other Mac OS X Server topics.
Server Settings
You use Server Settings to administer file, print, mail, Web, NetBoot, and network services on
a server.
Server Settings is installed in /Applications/Utilities/ when you install your server or set up an
administrator computer. To open Server Settings, click the Server Settings icon in the Dock of
Mac OS X Server or choose Configure Services from the Server menu in Workgroup Manager.
To select a server to work with, enter its IP address or DNS name in the login window, or
click Browse to choose from a list of servers. Specify the user name and password for an
administrator, then click Connect.
60Chapter 1
Click the service modules arranged on the Server Settings tabs to choose commands that let
you work with individual services:
m For administering file and print services, select the File & Print tab to access modules.
m For administering mail and Web service, select the Internet tab to access modules.
m For administering IP Firewall, DHCP, NetBoot, DNS, and SLP DA services, select the
Network tab to access modules.
m To retrieve online information, use the Help menu. It provides help for server
administrators about Server Settings as well as other Mac OS X Server topics.
Server Settings is not compatible with versions of Mac OS X Server earlier than version 10.2.
Server Status
You use Server Status to monitor the services running on Mac OS X Servers.
Server Status is installed in /Applications/Utilities/ when you install your server or set up an
administrative computer. To open Server Status, click the Server Status icon in the Dock of
Mac OS X Server or the Status icon in Workgroup Manager.
To select a server to monitor, click the Connect button in the Server Status toolbar. Enter the
IP address or DNS name of the server you want to monitor in the login window, or click
Browse to choose from a list of servers. Specify the user name and password for an
administrator, then click Connect.
Select items in the Devices & Services list to monitor specific servers and services running on
the servers:
m To review general status information for a particular server, select the server name.
m To review status information for a particular service running on a server, click the
disclosure triangle next to the server name to see a list of its services. Then select the
service of interest.
m To add a server to the Devices & Services list, click Connect in the toolbar and log in to
the server. The next time you open Server Status, any server you have added is displayed
in the Devices & Services list and can be monitored again by selecting a server in the list.
If a server in the list appears grey, double-click the server or click the Reconnect button in
the toolbar to log in again. Check the Add to Keychain option while you log in to enable
autoreconnect the next time you open Server Status.
m To remove a server from the Devices & Services list, select the server, click the Disconnect
button in the toolbar, and choose Remove From List from the Server menu.
m To control the way Server Status lists servers and services, how often status data is
refreshed, and other behaviors, choose Preferences from the Server Status menu.
m To customize the Server Status toolbar, choose Customize Toolbar command from the
View menu.
Administering Your Server61
m To retrieve online information, use the Help menu. It provides help for server
administrators about Server Status as well as other Mac OS X Server topics.
Macintosh Manager
You use Macintosh Manager to administer client management for Mac OS 8 and 9 client
computers. You can use it locally (at the server) or remotely (from a Mac OS 9 or X computer
on the same network as your Mac OS X Server).
Open Macintosh Manager by clicking its icon in the Dock. Log in using a server, Macintosh
Manager, or workgroup administrator user name and password. As a server administrator,
you automatically have global administrator privileges for Macintosh Manager.
See Chapter 10, “Client Management: Mac OS 9 and OS 8,” for more information.
NetBoot Administration Tools
There are several applications you use to administer NetBoot:
m NetBoot Desktop Admin lets you modify Mac OS 9 images.
m Network Image Utility lets you create and modify Mac OS X images.
m The DHCP/NetBoot module of Server Settings lets you save NetBoot images.
See Chapter 12, “NetBoot,” for information about these tools.
Network Install Administration Application
You use Package Maker to create Network Install packages.
See Chapter 13, “Network Install,” for information about this application.
Server Monitor
You use Server Monitor to monitor Xserve hardware and trigger email notifications when
circumstances warrant attention. Server Monitor shows you information about the installed
operating system, drives, power supply, enclosure and processor temperature, cooling
blowers, security, and network.
Server Monitor is installed in /Applications/Utilities/ when you install your server or set up an
administrator computer. Use the application to monitor local or remote servers:
m To specify the Xserve server to monitor, click Add Server, identify the server of interest,
and enter user name and password information for an administrator of the server.
m Use the “Update every” pop-up menu to specify how often you want to refresh data.
m Use the Export Items and Import Items buttons to manage different lists of Xserve servers
you want to monitor. The Merge Items button lets you consolidate lists into one.
62Chapter 1
m The system identifier lights on the front and back of an Xserve server light when service is
required. Use Server Monitor to understand why the lights are on. You can also turn the
lights on to identify a particular Xserve server in a rack of servers by selecting the server
and clicking “system identifier light on” on the Info tab.
m You can set Server Monitor to notify you by email when an Xserve server’s status changes.
For each server, you set up the conditions that you want notification about. The email
message can come from Server Monitor or from the server.
m Server Monitor keeps logs of Server Monitor activity for each Xserve server. (The logs do
not include system activity on the server.) The log shows, for example, the times Server
Monitor attempted to contact the server, and whether a connection was successful. The
log also shows server status changes. You can also use Server Monitor to get an Apple
System Profiler report on a remote server.
Streaming Server Admin
To set up and manage QTSS, you use the Web-based Streaming Server Admin program.
Streaming Server Admin lets you easily create and serve playlists, customize general settings,
monitor connected users, view log files, manage user and bandwidth usage, and relay a
stream from one server to another for scalability.
To use Streaming Server Admin:
1From Mac OS X Server, click the Streaming Server Admin icon in the Dock, then go to step 3.
Alternatively, from a server with QTSS installed, open a Web browser. You can also use a Web
browser from a remote Mac OS X computer.
2Enter the URL for your Streaming Server Admin.
For example, myserver.com:1220
Replace “myserver.com” with the name of your Streaming Server computer. 1220 is the
port number.
3The first time you run Streaming Server Admin, the Setup Assistant prompts you for your
user name and password.
To display online help information about using Streaming Server Admin, setting up secure
administration (SSL), and setting up your server to stream hinted media, click the question
mark button in the application. Information about QTSS is also available at the QuickTime
Web site:
www.apple.com/quicktime/products/qtss/
Administering Your Server63
Where to Find More Information
Regardless of your server administration experience, you may want to take advantage of the
wide range of Apple customer training courses. To learn more, go to
train.apple.com
If You’re New to Server and Network Management
If you want to learn more about Mac OS X Server, see the Mac OS X Server Web site:
www.apple.com/macosx/server/
Online discussion groups can put you in touch with your peers. Many of the problems you
encounter may already have been solved by other server administrators. To find the lists
available through Apple, see the following site:
www.lists.apple.com
The AppleCare support site’s discussion boards are an additional source of information:
www.info.apple.com/
Consider obtaining some of these reference materials. They contain background information,
explanations of basic concepts, and ideas for getting the most out of your network.
m Teach Yourself Networking Visually, by Paul Whitehead and Ruth Maran (IDG Books
Worldwide, 1998).
m Internet and Intranet Engineering, by Daniel Minoli (McGraw-Hill, 1997).
In addition, NetworkMagazine.com offers a number of online tutorials on its Web site:
www.networkmagazine.com
If You’re an Experienced Server Administrator
If you’re already familiar with network administration and you’ve used Mac OS X Server,
Linux, UNIX, or a similar operating system, you may find these additional references useful.
m A variety of books from O’Reilly & Associates cover topics applicable to Mac OS X Server,
such as Internet Core Protocols:The Definitive Reference, DNS and BIND, and TCP/IP
Network Administration. For more advanced information, see Apache: The Definitive
Guide, Writing Apache Modules with Perl and C, Web Performance Tuning, and Web
Security & Commerce, also published by O’Reilly and Associates. See the O’Reilly &
Associates Web site:
www.ora.com
m See the Apache Web site for detailed information about Apache:
www.apache.org/
64Chapter 1
CHAPTER
2
2Directory Services
Directory services provide a central repository for information about the systems,
applications, and users in an organization. In education and enterprise environments,
directory services are the ideal way to manage users and computing resources. Organizations
with as few as 10 people can benefit by deploying directory services.
Directory services can be doubly beneficial. They centralize system and network
administration, and they simplify a user’s experience on the network. With directory services,
information about all the users—such as their names, passwords, and preferences—as well as
printers and other resources on a network can be maintained in a single location rather than
on each computer on the network. Using directory services can reduce the system
administrator’s user management burden. In addition, users can log in to any authorized
computer on the network. Anywhere a user logs in, the user’s personal Desktop appears,
customized for the user’s individual preferences. The user always has access to personal files
and can easily locate and use authorized network resources.
Apple has built an open, extensible directory services architecture, called Open Directory,
into Mac OS X and Mac OS X Server. A Mac OS X Server or Mac OS X client computer can use
Open Directory to retrieve authoritative information about users and network resources
from a variety of sources:
m directory domains on the computer itself and on other Mac OS X Servers
m directory domains on other servers, including LDAP directory domains and Active
Directory domains on non-Apple servers
m BSD configuration files located on the computer itself
m network services, such as file servers, that make themselves known with the Rendezvous,
AppleTalk, SLP, or SMB service discovery protocols
Mac OS 9 and Mac OS 8 managed clients also use Open Directory to retrieve some user
information. For more information, see “How Macintosh Manager Works With Directory
Services” on page 420 in Chapter 10, “Client Management: Mac OS 9 and OS 8.”
65
The Open Directory architecture also includes Open Directory Password Server. A Password
Server can securely store and validate the passwords of users who want to log in to client
computers on your network or use other network resources that require authentication. A
Password Server can also enforce such policies as password expiration and minimum length.
To understand the information in this chapter, you should be comfortable with Mac OS X.
You do not need advanced network administrator or UNIX experience to use directory
services provided by Mac OS X Servers. If you want to integrate LDAP directories from other
servers, you need to be familiar with LDAP. If you want to integrate Active Directory servers,
you need to be familiar with Active Directory and LDAP. You need to be comfortable with
UNIX if you want to integrate BSD configuration files.
Storage for Data Needed by Mac OS X
Directory services act as an intermediary between directory domains, which store
information about users and resources, and the application and system software processes
that want to use the information. A directory domain stores information in a specialized
database that is optimized to handle a great many requests for information and to find and
retrieve information quickly. Information may be stored in one directory domain or in
several related directory domains.
Users
Groups
Printers
Servers
Mounts
Directory
domains
Directory
services
Processes
Processes running on Mac OS X computers can use directory services to save information in
a directory domain. For example, when you set up a user account, the application that you
use to do this has directory services store information about the user in a directory domain.
m On a computer with Mac OS X version 10.2, you use the My Account pane or the
Accounts pane of System Preferences to set up user accounts that are valid only on the
one computer.
m On a computer with Mac OS X Server version 10.2, you use the Accounts module of
Workgroup Manager to set up user accounts that are valid on all Mac OS X computers on
your network. You can specify additional user attributes in a network user account, such
as the location of the user’s home directory.
66Chapter 2
Whether you use Workgroup Manager or System Preferences to create a user account, the
user information is stored in a directory domain.
When someone attempts to log in to a Mac OS X computer, the login process uses Mac OS X
directory services—Open Directory—to validate the user name and password.
Directory
domain
Accounts
Directory
services
Accounts
A Historical Perspective
Like Mac OS X, Open Directory has a UNIX heritage. Open Directory provides access to
administrative data that UNIX systems have generally kept in configuration files, which require
much painstaking work to maintain. (Some UNIX systems still rely on configuration files.)
Open Directory consolidates the data and distributes it for ease of access and maintenance.
Directory Services67
Data Consolidation
For years, UNIX systems have stored administrative information in a collection of files located
in the /etc directory. This scheme requires each UNIX computer to have its own set of files,
and processes that are running on a UNIX computer read its files when they need
administrative information. If you’re experienced with UNIX, you probably know about the
files in the /etc directory—group, hosts, hosts.eq, passwd, and so forth. For example, a UNIX
process that needs a user’s password consults the /etc/passwd file, which contains a record for
each user account. A UNIX process that needs group information consults the /etc/group file.
/etc/
hosts
/etc/
passwd
/etc/
group
UNIX processes
Open Directory consolidates administrative information, simplifying the interactions
between processes and the administrative data they create and use.
Directory
services
Mac OS X processes
68Chapter 2
Processes no longer need to know how and where administrative data is stored. Open
Directory gets the data for them. If a process needs the location of a user’s home directory,
the process simply has Open Directory retrieve the information. Open Directory finds the
requested information, and then returns it, insulating the process from the details of how the
information is stored. If you set up Open Directory to access administrative data in several
directory domains, Open Directory automatically consults them as needed.
Directory
domain
Directory
domain
Directory
services
Mac OS X processes
Some of the data stored in a directory domain is identical to data stored in UNIX
configuration files. For example, the authentication attributes, home directory location, real
name, user ID, and group ID—all stored in the user records of a directory domain—have
corresponding entries in the standard /etc/passwd file. However, a directory domain stores
much additional data to support functions that are unique to Mac OS X, such as support for
managed clients and Apple Filing Protocol (AFP) directories.
Data Distribution
Another characteristic of UNIX configuration files is that the administrative data they contain
is available only to the computer on which they are stored. Each computer has its own UNIX
configuration files. With UNIX configuration files, each computer that someone wants to use
must have that person’s user account settings stored on it, and each computer must store
the account settings for every person who may want to use the computer. To set up a
computer’s network settings, the administrator needs to go to the computer and directly
enter the IP address and other information that identifies the computer on the network.
Similarly, when user or network information needs to be changed in UNIX configuration files,
the administrator must make the changes on the computer where the files reside. Some
changes, such as network settings, require the administrator to make the same changes on
multiple computers. This approach becomes unwieldy as networks grow in size and complexity.
Directory Services69
Open Directory solves this problem by letting you store administrative data in a directory
domain that can be managed by a system administrator from one location. Open Directory
lets you distribute the information so that it is visible on a network to the computers that
need it and the administrator who manages it:
Directory
domain
Directory
services
System
administrator
Users
Uses of Directory Data
Open Directory makes it possible to consolidate and maintain network information easily in
a directory domain, but this information has value only if application and system software
processes running on network computers actually access the information. The real power of
Open Directory is not that it provides directory services, but the fact that Mac OS X software
accesses data through Open Directory.
Here are some of the ways in which Mac OS X system and application software use directory
data:
m Authentication. As mentioned already, the Accounts module of Workgroup Manager
or the Accounts pane of System Preferences creates user records in a directory domain,
and these records are used to authenticate users who log in to Mac OS X computers.
When a user specifies a name and a password in the Mac OS X login window, the login
process asks Open Directory for the user record that corresponds to the name that the
user specified. Open Directory finds the user record in a directory domain and retrieves
the record.
70Chapter 2
m Folder and file access. After logging in successfully, a user can access files and folders.
Mac OS X uses another data item from the user record—the user ID (UID)—to determine
the user’s access privileges for a file or folder that the user wants to access. When a user
accesses a folder or file, the file system compares this user’s UID to the UID assigned to
the folder or file. If the UIDs are the same, the file system grants owner privileges (usually
read and write privileges) to the user. If the UIDs are different, the user doesn’t get owner
privileges.
m Home directories. Each user record in a directory domain stores the location of the user’s
home directory, which is also known as the user’s home folder. This is where the user
keeps personal files, folders, and preferences. A user’s home directory can be located on
a particular computer that the user always uses or on a network file server.
m Automount share points. Share points can be configured to automount (appear
automatically) in the /Network folder (the Network globe) in the Finder windows of client
computers. Information about these automount share points is stored in a directory
domain. Share points are folders, disks, or disk partitions that you have made accessible
over the network.
m Mail account settings. Each user’s record in a directory domain specifies whether the
user has mail service, which mail protocols to use, how to present incoming mail,
whether to alert the user when mail arrives, and more.
m Resource usage. Disk, print, and mail quotas can be stored in each user record of a
directory domain.
m Managed client information. A user’s personal preference settings, as well as preset
preferences that affect the user, are stored in a directory domain.
m Group management. In addition to user records, a directory domain also stores group
records. Each group record affects all users who are in the group. Information in group
records specifies preferences settings for group members. Group records also determine
access to files, folders, and computers.
Inside a Directory Domain
Information in a directory domain is organized into record types, which are specific categories
of records, such as users, machines, and mounts. For each record type, a directory domain may
contain any number of records. Each record is a collection of attributes, and each attribute has
one or more values. If you think of each record type as a spreadsheet that contains a category of
information, then records are like the rows of the spreadsheet, attributes are like spreadsheet
columns, and each spreadsheet cell contains one or more values.
Directory Services71
For example, when you define a user by using the Accounts module of Workgroup Manager,
you are creating a user record (a record of the user’s record type). The settings that you
configure for the user—short name, full name, home directory location, and so on—become
values of attributes in the user record. The user record and the values of its attributes reside
in a directory domain.
Discovery of Network Services
Open Directory can provide more than administrative data from directories. Open Directory
can also provide information about services that are available on the network. For example,
Open Directory can provide information about file servers that are currently available.
File server
Directory
services
File server
Information about file servers and other services tends to change much more frequently than
information about users. Therefore, information about network services typically isn’t stored
in directory domains. Instead, information about file servers and other network servers is
discovered as the need arises.
Open Directory can discover network services that make their existence and whereabouts
known. Services make themselves known by means of standard protocols. Open Directory
supports the following service discovery protocols:
m Rendezvous, the Apple protocol that uses multicast DNS
m AppleTalk, the legacy Mac OS protocol for file services
m Service Location Protocol (SLP), an open standard for discovering file and print services
m Server Message Block (SMB), the protocol used by Microsoft Windows
72Chapter 2
In fact, Open Directory can provide information about network services both from service
discovery protocols and from directory domains. To accomplish this, Open Directory simply
asks all its sources of information for the type of information requested by a Mac OS X
process. The sources that have the requested type of information provide it to Open
Directory, which collects all the provided information and hands it over to the Mac OS X
process that requested it.
For example, if Open Directory requests information about file servers, the file servers on the
network respond via service discovery protocols with their information. A directory domain
that contains relatively static information about some file servers also responds to the
request. Open Directory collects the information from the service discovery protocols and
the directory domains.
Directory
domain
Directory
File server
services
File server
When Open Directory requests information about a user, service discovery protocols don’t
respond because they don’t have user information. (Theoretically, AppleTalk, Rendezvous,
SMB, and SLP could provide user information, but in practice they don’t have any user
information to provide.) The user information that Open Directory collects comes from
whatever sources have it—from directory domains.
Directory Domain Protocols
Administrative data needed by directory services is stored on Mac OS X Servers in Open
Directory databases. An Open Directory database is one type of directory domain. Open
Directory can use either of two protocols to store and retrieve directory data:
Directory Services73
m Lightweight Directory Access Protocol (LDAP), an open standard commonly used in
domain
domain
mixed environments
m NetInfo, the Apple directory services protocol for Mac OS X
The directory services of Mac OS X version 10.2—Open Directory—can also store and
retrieve administrative data that resides in existing directory domains on other servers. Open
Directory can read and write data in the following domains:
m Shared NetInfo domains on other Mac OS X computers (servers or clients)
m OpenLDAP directories on various UNIX servers
m Active Directory domains on Windows servers
m Other LDAPv3-compliant directories that are configured to allow remote administration
and read and write access
In addition, Open Directory can retrieve but not store administrative data in the following
domains:
m BSD configuration files located on the Mac OS X Server
m LDAPv2 domains and read-only LDAPv3 domains on other servers
Local and Shared Directory Domains
Where you store your server’s user information and other administrative data is determined
by whether the data needs to be shared.
Local Data
Every Mac OS X computer has a local directory domain. A local domain’s administrative data
is visible only to applications and system software running on the computer where the
domain resides. It is the first domain consulted when a user logs in or performs some other
operation that requires data stored in a directory domain.
When the user logs in to a Mac OS X computer, Open Directory searches the computer’s
local directory domain for the user’s record. If the local directory domain contains the user’s
record (and the user typed the correct password), the login process proceeds and the user
gets access to the computer.
Log in to
Mac OS X
74Chapter 2
Local
Connect to
Mac OS
X Server
Local
After login, the user may choose Connect To Server from the Go menu and connect to a file
domain
domain
server on a computer running Mac OS X Server. In this case, Open Directory on the server
searches for the user’s record in the server’s local directory domain. If the server’s local
directory domain has a record for the user (and the user types the correct password), the
server grants the user access to the file services.
When you first set up a Mac OS X computer, its local directory domain is automatically
created and populated with records. For example, a user record is created for the user who
performed the installation. It contains the user name and password entered during setup, as
well as other information, such as a unique ID for the user and the location of the user’s
home directory.
Shared Data
While Open Directory on any Mac OS X computer can store administrative data in the
computer’s local directory domain, the real power of Open Directory is that it lets multiple
Mac OS X computers share administrative data by storing the data in shared directory domains.
When a computer is configured to use a shared domain, any administrative data in the shared
domain is also visible to applications and system software running on that computer.
If Open Directory does not find a user’s record in the local domain of a Mac OS X computer,
Open Directory automatically searches for the user’s record in any shared domains to which
the computer has access. In the following example, the user can access both computers
because the shared domain accessible from both computers contains a record for the user.
Shared
domain
Log in to
Mac OS X
Local
Connect to
Mac OS
X Server
Local
Shared domains generally reside on Mac OS X Servers, because servers are equipped with
the tools, such as Workgroup Manager and Server Settings, that facilitate managing network
resources and network users.
Directory Services75
Similarly, you can make network resources such as printers visible to certain computers by
setting up printer records in a shared domain accessed by those computers. For example,
graphic artists in a company might need to access color printers, while copy center personnel
need to use high-speed laser printers. Rather than configuring printer access for each
computer individually, you could use the Print module of Server Settings to add printers to
two shared domains: Graphics and Repro.
Graphics
domain
Graphic artistsCopy center personnel
Repro
domain
Printers visible in the Print Center of graphic artists’ computers would be those in the
Graphics domain, while printers in the Repro domain would be visible to computers used by
copy center personnel. Printers that have records in shared domains appear in the Directory
Services printer list in Print Center.
76Chapter 2
While some devices may need to be used only by specific departments, other resources, such
as personnel forms, may need to be shared by all employees. You could make a folder of
those forms available to everybody by setting up a share point for the folder in another
shared domain that all computers can access.
Company
domain
Graphics
domain
Graphic artistsCopy center personnel
Repro
domain
The shared domain at the top of a hierarchy of directory domains is sometimes called the
root domain.
Directory Services77
Shared Data in Existing Directory Domains
3
Some organizations—such as universities and worldwide corporations—maintain user
information and other administrative data in directory domains on UNIX or Windows servers.
Open Directory can be configured to search these non-Apple domains as well as shared
Open Directory domains of Mac OS X Servers.
Mac OS X Server
Mac OS 9 user
Local
domain
Shared
domain
Mac OS X user
LDAP server
1
Windows user
When a user logs in to a computer on your network, Open Directory still searches for the
user in the computer’s local domain and in shared domains on Mac OS X Servers. But if the
user is not found and Open Directory has been configured to search an LDAP domain on a
UNIX server, Open Directory consults the LDAP domain for information about the user.
Directory Domain Hierarchies
Local and shared domains are organized into hierarchies, tree-like topologies that have a
shared domain at the top and local domains at the bottom of the tree. A hierarchy can be as
simple as a local domain and a shared domain, or it can contain more shared domains.
78Chapter 2
Two-Level Hierarchies
The simplest hierarchy is a two-level hierarchy:
Shared
directory domain
Local directory
domain
Here’s a scenario in which a two-level hierarchy might be used:
Shared domain
Local domain on
English department’s
computer
Local domain on
Math department’s
computer
Local domain on
Science department’s
computer
Each department (English, Math, Science) has its own computer. The students in each
department are defined as users in the local domain of that department’s computer. All three
of these local domains have the same shared domain, in which all the instructors are defined.
Instructors, as members of the shared domain, can use services on all the departmental
computers. The members of each local domain can only use services on the server where
their local domain resides.
Directory Services79
While local domains reside on their respective servers, a shared domain can reside on any
Mac OS X Server accessible from the local domain’s computer. In this example, the shared
domain can reside on any server accessible from the departmental servers. It can reside
on one of the departmental servers, or—as shown here—on an entirely different server on
the network:
Faculty Mac OS X
Server
Local
domain
Shared
domain
Local
domain
English department’s
computer
Science department’s
computer
Local
domain
Local
domain
Math department’s
computer
When an instructor logs in to any of the three departmental servers and cannot be found in
the local domain, the server searches the shared domain. In this example, there is only one
shared domain, but in more complex hierarchies, there may be many shared domains.
80Chapter 2
More Complex Hierarchies
Open Directory also supports multilevel domain hierarchies. Complex networks with large
numbers of users may find this kind of organization useful, although it’s much more complex
to administer.
Campus domain
Graduates
domain
Employees
domain
Faculty
domain
Students
domain
Undergraduates
domain
Local domains on Mac OS X clients or servers
In this scenario, an instructor defined in the Campus domain can use Mac OS X computers on
which any of the local domains reside. A student defined in the Students domain can log in to
any Mac OS X computers that are below the Graduates domain or Undergraduates domain.
A directory domain hierarchy affects which Mac OS X computers can see particular
administrative data. The “subtrees” of the hierarchy essentially hide information from other
subtrees in the hierarchy. In the education example, computers using the subtree that
includes the Graduates domain do not have access to records in the Undergraduates domain.
But records in the Campus domain are visible to any computer.
Directory domain visibility depends on the computer, not the user. So when a user logs in to
a different computer, administrative data from different directory domains may be visible to
that computer. In the education scenario described here, an undergraduate can log in to a
graduate student’s computer if the undergraduate’s user record resides in the Students
domain. But the devices that are defined in the Undergraduates domain are not visible unless
they are also defined in the Graduates, Students, or Campus domain.
Directory Services81
You can affect an entire network or just a group of computers by choosing which domain to
publish administrative data in. The higher the administrative data resides in a directory
domain hierarchy, the fewer places it needs to be changed as users and system resources
change. Probably the most important aspect of directory services for administrators is
planning directory domains and hierarchies. These should reflect the resources you want to
share, the users you want to share them among, and even the way you want to manage your
directory data.
Search Policies for Directory Domain Hierarchies
In a hierarchy of directory domains, each Mac OS X computer has a search policy that
specifies the order in which Open Directory searches the domains. A search policy, also
known as a search path, is simply a list of directory domains. On a Mac OS X computer, Open
Directory goes down this list of directory domains whenever an application or system
software running on the computer needs administrative data. The list of directory domains
defines the computer’s search policy. The search policy effectively establishes the
computer’s place in the hierarchy.
A computer’s local directory domain is always first on the list. It may be followed by shared
Open Directory domains on Mac OS X Servers and LDAP domains on other servers. It may
also include a set of BSD configuration files that are on the computer.
For example, when someone tries to log in to a Mac OS X computer, Open Directory
searches the computer’s local domain for the user’s record. The local directory domain is
always first on a computer’s search policy.
Graduates
domain
Is the user
defined here?
82Chapter 2
Local domain
If the local domain does not contain the user’s record, Open Directory goes to the next
directory domain in the search policy.
Is the user
defined here?
No
Graduates
domain
Local domain
If the second directory domain also does not contain the user’s record, Open Directory
searches the remaining directory domains in the search policy one by one until it searches
the last shared domain.
Is the user
defined here?
No
No
Campus domain
Students domain
Graduates domain
No
Local domain
The Automatic Search Policy
Initially, every computer with Mac OS X version 10.2 is set to use an automatic search policy.
It consists of three parts, two of which are optional:
m local directory domain
m shared NetInfo domains (optional)
m shared LDAPv3 domains (optional)
A computer’s automatic search policy always begins with the computer’s local directory
domain.
Directory Services83
Next the automatic search policy looks at the binding of shared NetInfo domains. The
computer’s local domain may be bound to a shared NetInfo domain, which may in turn be
bound to another shared NetInfo domain, and so on. The NetInfo binding, if any, constitutes
the second part of the automatic search policy. See “Configuring NetInfo Binding” on
page 111 for additional information.
The third and final part of a computer’s automatic search policy consists of shared LDAPv3
domains. They are included only if the computer uses a DHCP service that’s configured to
supply the addresses of one or more LDAPv3 servers. The DHCP service of Mac OS X Server
can supply LDAPv3 servers. See “Setting the LDAP Server for DHCP Clients” on page 479 in
Chapter 11, “DHCP Service.”
A computer’s automatic search policy may change if the computer is moved to a part of the
network served by a different DHCP service. When the user logs in at the new location, the
computer connects to the new DHCP service. The new DHCP service may change the
NetInfo binding and may supply a different list of LDAPv3 servers than the DHCP service at
the former location.
Custom Search Policies
If you don’t want a Mac OS X version 10.2 computer—server or client—to use the automatic
search policy supplied by DHCP, you can define a custom search policy for the computer.
Campus domain
Students domain
LDAP Server 1
Graduates domain
Local domain
In this scenario, a custom search policy specifies that LDAP Server 1 be consulted when a
user record or other administrative data cannot be found in the directory domains of the
automatic search policy. The custom search policy also specifies that if the user information
or other administrative data is not found on the LDAP server, a shared Open Directory
domain named “Campus” is searched.
84Chapter 2
Directory Domain Planning
domain
domain
domain
domain
Keeping information in shared directory domains gives you more control over your network,
allows more users access to the information, and makes maintaining the information easier for
you. But the amount of control and convenience depends on the effort you put into planning
your shared domains. The goal of directory domain planning is to design the simplest hierarchy
of shared domains that gives your Mac OS X users easy access to the network resources they
need and minimizes the time you spend maintaining administrative data.
General Planning Guidelines
If you do not need to share user and resource information among multiple Mac OS X
computers, there is very little directory domain planning necessary. Everything can be accessed
from local directory domains. Just ensure that all individuals who need to use a particular
Mac OS X computer are defined as users in the local directory domain on the computer.
Log in to
Mac OS X
Local
Connect to
Mac OS
X Server
Local
If you want to share information among Mac OS X computers, you need to set up at least one
shared domain.
Shared
domain
Log in to
Mac OS X
Local
Connect to
Mac OS
X Server
Local
A hierarchy this simple may be completely adequate when all your network computer users
share the same resources, such as printers and share points for home directories,
applications, and so forth.
Directory Services85
Larger, more complex organizations can benefit from a deeper directory domain hierarchy.
Students
domain
Under-
graduates
domain
Controlling Data Accessibility
Campus
domain
Graduates
domain
Employees
domain
Faculty
domain
Hierarchies that contain several shared domains let you make directory information visible to
only subsets of a network’s computers. In the foregoing example hierarchy, the administrator
can tailor the users and resources visible to the community of Mac OS X computers by
distributing directory information among six shared domains.
If you want all computers to have access to certain administrative data, you store that data in
the shared domain at the top of your hierarchy, where all computers can access it. To make
some data accessible only to a subset of computers, you store it in a shared domain that only
those computers can access.
You might want to set up multiple shared directory domains to support computers used by
specific groups within an organization. For example, you might want to make share points
containing programming applications and files visible only to engineering computers. On the
other hand, you might give technical writers access to share points that store publishing
software and document files. If you want all employees to have access to each other’s home
directories, you would store mount records for all the home directories in the topmost
shared domain.
Simplifying Changes to Data in Directory Domains
If you need more than one shared directory domain, you should organize your hierarchy of
shared domains to minimize the number of places data has to change over time. You should
also devise a plan that addresses how you want to manage such ongoing events as
m new users joining and leaving your organization
m file servers being added, enhanced, or replaced
86Chapter 2
m printers being moved among locations
You’ll want to try to make each directory domain applicable to all the computers that use it
so you don’t have to change or add information in multiple domains. In the education
hierarchy example, all students may have user records in the Students domain and all
employees have accounts in the Employees domain. As undergraduate students leave or
become graduate students, or as employees are hired or retire, the administrator can make
adjustments to user information simply by editing one domain.
If you have a widespread or complex hierarchy of directory domains in a network that is
managed by several administrators, you need to devise strategies to minimize conflicts. For
example, you can predefine ranges of user IDs (UIDs) to avoid inadvertent file access. (For
more information, see “Defining User IDs” on page 144 in Chapter 3, “Users and Groups.”)
Identifying Computers for Hosting Shared Domains
If you need more than one shared domain, you need to identify the computers on which
shared domains should reside. Shared domains affect many users, so they should reside on
Mac OS X Servers that have the following characteristics:
m restricted physical access
m limited network access
m equipped with high-availability technologies, such as uninterruptible power supplies
You should select computers that will not be replaced frequently and that have adequate
capacity for growing directory domains. While you can move a shared domain after it has
been set up, you may need to reconfigure the search policies of computers that bind to the
shared domain so that their login hierarchies remain intact.
Open Directory Password Server
Besides providing directory services on Mac OS X Servers and other Mac OS X computers,
Open Directory can also provide authentication services. An Open Directory Password Server
can store and validate user passwords for login and other network services that require
authentication. A Password Server supports basic authentication as well as authentication
protocols that protect the privacy of a password during transmission on the network. A
Password Server lets you set up specific password policies for each user, such as automatic
password expiration and minimum password length.
Your Mac OS X Server can host a Password Server, or it can get authentication services from a
Password Server hosted by another Mac OS X Server.
Directory Services87
Authentication With a Password Server
When a user’s account is configured to use a Password Server, the user’s password is not
stored in a directory domain. Instead, the directory domain stores a unique password ID
assigned to the user by the Password Server. To authenticate a user, directory services pass
the user’s password ID to the Password Server. The Password Server uses the password ID to
find the user’s actual password and any associated password policy.
For example, the Password Server may locate a user’s password but discover that it has
expired. If the user is logging in, the login window asks the user to replace the expired
password. Then the Password Server can authenticate the user.
A Password Server can’t authenticate a user during login on a computer with Mac OS X
version 10.1 or earlier.
You’ll find more information about configuring user accounts to use a Password Server in
“Understanding Password Validation” on page 189 of Chapter 3, “Users and Groups.”
Network Authentication Protocols
The Password Server is based on a standard known as Simple Authentication and Security
Layer (SASL). This standard enables a Password Server to support the wide range of network
user authentication protocols used by various network services of Mac OS X Server, such as
mail service and file services. Here are a few of the network authentication protocols that the
Password Server supports:
m CRAM-MD5
m MD5
m APOP
m NT and LAN Manager (for SMB)
m SHA-1
m DHX
m AFP 2-Way Random
m WebDAV Digest
Password Server Database
The Password Server maintains a record for each user that includes the following:
m Password ID, a 128-bit value assigned when the password is created. The value includes a
key for finding a user’s Password Services record.
88Chapter 2
m The password, stored in recoverable or hashed form. The form depends on the network
authentication protocols enabled for the Password Server (using Open Directory
Assistant). If APOP or 2-Way Random is enabled, the Password Server stores a recoverable
(encrypted) password. If neither of these methods is enabled, only hashes of the
passwords are stored.
m Data about the user that is useful in log records, such as the user’s short name.
m Password policy data.
Password Server Security
The Password Server stores passwords, but never allows passwords to be read. Passwords can
only be set and verified. Malicious users who want to gain access to your server must try to
log in over the network. Invalid password instances, logged by the Password Server, can alert
you to such attempts.
Using a Password Server offers flexible and secure password validation, but you need to make
sure that the server on which a Password Server runs is secure:
m Set up Password Servers on a server that is not used for any other activity.
m Since the load on a Password Server is not particularly high, you can have several (or even
all) of your Open Directory server domains share a single Password Server.
m Set up IP firewall service so nothing is accepted from unknown ports. Password Server
uses a well-known port.
m Make sure that the Password Server’s computer is located in a physically secure location,
and don’t connect a keyboard or monitor to it.
m Equip the server with an uninterruptible power supply.
The Password Server must remain available to provide authentication services. If the
Password Server goes down, password validation cannot occur, because you cannot replicate
a Password Server.
Overview of Directory Services Tools
The following applications help you set up and manage directory domains and Password
Servers.
m Open Directory Assistant. Use to create and configure shared or standalone Open
Directory domains (NetInfo or LDAPv3) and to set up Open Directory Password Servers.
Located in /Applications/Utilities.
m Directory Access. Use to enable or disable individual directory service protocols; define
a search policy; configure connections to existing LDAPv3, LDAPv2, and NetInfo
domains; and configure data mapping for LDAPv3 and LDAPv2 domains. Located in
/Applications/Utilities.
Directory Services89
m Server Status. Use to monitor directory services and view directory services logs. Located
in /Applications/Utilities.
Experts can also use the following applications to manage directory domains:
m Property List Editor. Use to add BSD configuration files that you want Open Directory to
access for administrative data, and change the mapping of the data in each BSD
configuration file to specific Mac OS X record types and attributes. Located in /Developer/
Applications if you have installed the developer tools from the Developer Tools CD.
m NetInfo Manager. Use to view and change records, attributes, and values in an Open
Directory domain (LDAPv3 or NetInfo) or in a NetInfo domain; manage a NetInfo
hierarchy; and back up and restore a NetInfo domain. Located in /Applications/Utilities.
m Terminal. Open to use UNIX command-line tools that manage NetInfo domains. Located
in /Applications/Utilities.
Setup Overview
Here is a summary of the major tasks you perform to set up and maintain directory services.
See the pages indicated for detailed information about each task.
Step 1: Before you begin, do some planning
See “Before You Begin” on page 91 for a list of items to think about before you start
configuring directory domains.
Step 2: Set up Open Directory domains and Password Servers
Create shared directory domains on the Mac OS X Servers that you want to host them. At the
same time, set up Open Directory Password Servers. See the following sections:
m “Setting Up an Open Directory Domain and Password Server” on page 92
m “Deleting a Shared Open Directory Domain” on page 93
Step 3: Set up access to directory domains on other servers
If some of your user information and other administrative data will not reside in Open
Directory domains, you must make sure your other sources of data are set up for Mac OS X.
For instructions, see the following sections of this chapter:
m “Configuring Access to Existing LDAPv3 Servers” on page 98
m “Using an Active Directory Server” on page 104
m “Accessing an Existing LDAPv2 Directory” on page 106
m “Using NetInfo Domains” on page 110
m “Using Berkeley Software Distribution (BSD) Configuration Files” on page 115
90Chapter 2
Step 4: Implement search policies
Set up search policies so that all computers have access to the shared directory domains they
need. Note that if all computers have Mac OS X version 10.2 and can use the automatic
search policy, there is nothing to set up. Otherwise, see “Setting Up Search Policies” on
page 94.
If your network includes computers with Mac OS X versions earlier than 10.2, configure the
local domain on each of them so that it binds to a shared NetInfo domain. See “Using
NetInfo Domains” on page 110.
Step 5: Configure Open Directory service protocols (optional)
You may want to disable some of the protocols that Open Directory uses to access directory
domains and to discover network services. See “Configuring Open Directory Service
Protocols” on page 93.
Before You Begin
Before setting up directory services for the first time:
m Understand why clients need directory data, as discussed in the first several sections of
this chapter.
m Assess your server access requirements.
Identify which users need to access your Mac OS X Servers.
Users whose information can be managed most easily on a server should be defined in a
shared Open Directory domain on a Mac OS X Server. Some of these users may instead be
defined in Active Directory domains or LDAP domains on other servers.
For more information, see “Local and Shared Directory Domains” on page 74 and
“Directory Domain Hierarchies” on page 78.
m Understand search policies, as described in “Search Policies for Directory Domain
Hierarchies” on page 82.
m Design the hierarchy of shared directory domains.
Determine whether user information should be stored in a local directory domain or in a
directory domain that can be shared among servers. Design your directory domain
hierarchy, identifying the shared and local domains you want to use, the servers on which
the shared domains should reside, and the relationships between shared domains. In
general, try to limit the number of users associated with any directory domain to no more
than 10,000.
“Directory Domain Planning” on page 85 provides some guidelines that will help you
decide what your directory domain hierarchy should look like.
m Assess your authentication needs.
Directory Services91
Decide whether to use an Open Directory Password Server. Decide which Mac OS X
Server will host the Password Server. See “Open Directory Password Server” on page 87.
m Consider the best equipment and location for your servers.
Choose computers and locations that are reliable and accessible.
If possible, use a dedicated Mac OS X Server for directory services.
Make the server physically secure. It shouldn’t have a keyboard or monitor, especially if it
hosts a Password Server.
m Pick server administrators very carefully. Give only trusted people administrator
passwords.
Have as few administrators as possible. Don’t delegate administrator access for minor
tasks, such as changing settings in a user record.
Always remember: directory information is authoritative. It vitally affects everyone whose
computers use it.
Setting Up an Open Directory Domain and Password Server
You can use the Open Directory Assistant application to configure how a Mac OS X Server
works with directory information and a Password Server. This application can configure a
server to use a directory domain in one of the following ways:
m Use a shared directory domain hosted by another server.
m Host a shared Open Directory domain.
m Use only the server’s own local directory domain.
m Delete the server’s shared directory domain.
In addition, Open Directory Assistant can configure a server to use a Password Server in one
of the following ways:
m Use an existing Password Server.
m Host a Password Server.
m Don’t use a Password Server.
Open Directory Assistant runs automatically as part of the installation and setup process of
Mac OS X Server. At any other time, you can open Open Directory Assistant from the Finder.
To configure how your server works with directory information and a Password
Server:
1Open the Open Directory Assistant application.
It is located in the /Applications/Utilities folder.
2Enter the connection and authentication information for the Mac OS X Server that you want
to configure, then click Connect.
92Chapter 2
For Address, enter the DNS name or IP address of the server that you want to configure.
For User Name, enter the user name of an administrator on the server.
For Password, enter the password for the user name you entered.
3Follow the self-guided steps for configuring the server’s use of a directory domain and a
Password Server.
Deleting a Shared Open Directory Domain
You can delete a shared Open Directory domain that is hosted by a Mac OS X Server. Use
Open Directory Assistant to do this.
Warning When you delete a directory domain, all user account information and other
administrative data that it contains is lost.
To delete a shared directory domain hosted by a Mac OS X Server:
1Start Open Directory Assistant.
2Enter the connection and authentication information for the Mac OS X Server that hosts the
shared domain you want to delete, then click Connect.
For Address, enter the DNS name or IP address of the server.
For User Name, enter the user name of an administrator on the server.
For Password, enter the password for the user name you entered.
3Choose Delete Hosted Domain from the Domain menu.
After deleting a shared domain that is supplied automatically by DHCP, you must remove it
from the DHCP service. Otherwise client computers may pause for long periods of time
while trying to access the deleted domain. For instructions, see “Setting the LDAP Server for
DHCP Clients” on page 479 in Chapter 11, “DHCP Service.”
Configuring Open Directory Service Protocols
Open Directory uses many protocols to access administrative data in directory domains and
discover services on the network. You can enable or disable each of the protocols individually
by using the Directory Access application. The protocols include
m AppleTalk, the legacy Mac OS protocol for file and print services
m BSD Configuration Files, the original method still used by some organizations for
accessing administrative data on UNIX computers
m Lightweight Directory Access Protocol version 2 (LDAPv2), an open standard that Open
Directory can use to access (read-only) directory domains on a variety of servers
Directory Services93
m LDAPv3, a newer version of the popular directory services protocol, which Open
Directory uses to access (read and write) data in Open Directory domains on computers
and servers with Mac OS X version 10.2, Active Directory domains on Windows servers,
and directory domains on various other servers
m NetInfo, an Apple directory services protocol that Open Directory can use to access (read
and write) data in directory domains on all Mac OS X computers
m Rendezvous, an Apple protocol for discovering file, print, and other services on Internet
Protocol (IP) networks
m Service Location Protocol (SLP), an open standard for discovering file and print services
on IP networks
m Server Message Block (SMB), a protocol used by Microsoft Windows for file and print
services
If you disable a protocol on a computer, Open Directory does not use it for directory access or
service discovery on the computer. Other network services may still use the protocol,
however. For example, if you disable the AppleTalk protocol, Open Directory does not use it to
discover file servers, but you can still connect to an AppleTalk file server if you know its URL.
To enable or disable protocols used by Open Directory:
1In Directory Access, click the Services tab.
2If the lock icon is locked, click it and type the name and password of a server administrator.
3Click the checkbox next to the protocol that you want to enable or disable.
4Click Apply.
Setting Up Search Policies
This section describes how to configure the search policy that Open Directory uses when it
retrieves authentication information and other administrative data from directory domains.
The search policy can also include protocols for discovering services on the network, such as
file and print services.
A Mac OS X computer—server or client—actually has more than one search policy. The
authentication search policy is used to find authentication information and most other
administrative data. The contacts search policy is used by mail, address book, personal
information manager, and similar applications to locate name, address, and other contact
information.
94Chapter 2
You can configure the authentication search policy for a Mac OS X Server or other Mac OS X
computer by using the Directory Access application. You can use the same application to
configure the computer’s contacts search policy. (The Open Directory Assistant application
also configures the authentication search policy of a Mac OS X Server, but does not offer as
many options as Directory Access.)
You can configure the search policy of the computer on which you are running Directory
Assistant as follows:
m Use the automatic search policy—shared NetInfo domains, list of LDAP servers supplied
by DHCP, or both.
m Define a custom search policy for the computer if it needs to search additional directory
servers, BSD configuration files, or service discovery protocols.
m Use only the computer’s local directory domain.
Using the Automatic Search Policy
You can configure a Mac OS X computer to use the automatic search policy. This is the
default configuration. You can configure a computer to use the automatic search policy by
using the Directory Access application on the computer.
The automatic search policy always includes the local directory domain. The automatic
search policy also includes shared NetInfo domains to which the computer is bound and
shared LDAPv3 domains supplied by DHCP. The shared NetInfo domains are optional, as are
the shared LDAPv3 domains. For more information, see “Using NetInfo Domains” on
page 110 and “Setting the LDAP Server for DHCP Clients” on page 479.
To use the automatic search policy supplied by DHCP:
1In Directory Access, click the Authentication tab or the Contacts tab.
Click Authentication to configure the search policy used for authentication and most other
administrative data.
Click Contacts to configure the search policy used for contact information in some mail,
address book, and personal information manager applications.
2If the lock icon is locked, click it and type the name and password of a server administrator.
3Choose Automatic from the Search pop-up menu, then click Apply.
Defining a Custom Search Policy
You can configure a Mac OS X computer to search specific Open Directory servers, LDAP
servers, NetInfo domains, BSD configuration files, or directory service protocols in addition
to the servers in the automatic search policy. You define a custom search policy with the
Directory Access application on the computer that you want to configure.
Directory Services95
Note: Make sure the computer has been configured to access the LDAP servers, Active
Directory servers, NetInfo domains, and BSD configuration files that you want to add to the
search policy. For instructions, see the subsequent sections of this chapter.
To define a custom search policy for the computer:
1In Directory Access, click the Authentication tab or the Contacts tab.
Click Authentication to configure the search policy used for authentication and most other
administrative data.
Click Contacts to configure the search policy used for contact information in some mail,
address book, and personal information manager applications.
2If the lock icon is locked, click it and type the name and password of a server administrator.
3Choose “Custom path” from the Search pop-up menu.
4Click Add.
5Select from the list of available directories and click Add.
To add multiple directories, select more than one and click Add.
6Change the order of the listed directory domains as needed, and remove listed directory
domains that you don’t want in the search policy.
Move a listed directory domain by dragging it up or down.
Remove a listed directory domain by selecting it and clicking Remove.
7Click Apply.
Using a Local Directory Search Policy
If you want to limit the access that a computer has to authentication information and other
administrative data, you can restrict the computer’s authentication search policy to the local
directory domain. If you do this, users without local accounts on the computer will be unable
to log in or authenticate for any services it provides. You can configure a computer to use
only its local directory domain by using the Directory Access application on the computer.
To restrict a computer to its local directory domain:
1In Directory Access, click the Authentication tab or the Contacts tab.
Click Authentication to configure the search policy used for authentication and most other
administrative data.
Click Contacts to configure the search policy used for contact information in some mail,
address book, and personal information manager applications.
2If the lock icon is locked, click it and type the name and password of a server administrator.
3Choose “Local directory” from the Search pop-up menu, then click Apply.
96Chapter 2
Changing Basic LDAPv3 Settings
You can use the Directory Access application to change basic settings for accessing LDAPv3
servers, including the shared Open Directory domains of Mac OS X Servers:
m Enable or disable use of LDAPv3 servers supplied by DHCP.
m Reveal an intermediate level of LDAPv3 information and options.
The Open Directory Assistant application also configures use of LDAPv3 servers supplied by
DHCP, but does not offer as many options as Directory Access.
Enabling or Disabling Use of DHCP-Supplied LDAPv3 Servers
Your Mac OS X computer can automatically access LDAPv3 servers via DHCP. This automatic
access requires that the DHCP service be configured to supply an LDAPv3 server on request.
You can enable or disable this method of accessing an LDAPv3 server for each network
location that is defined in the Network pane of System Preferences.
To enable or disable automatic access to an LDAPv3 server:
1In Directory Access, click the Services tab.
2If the lock icon is locked, click it and type the name and password of a server administrator.
3Select LDAPv3 in the list of services, then click Configure.
4From the Location pop-up menu, choose the network location that you want to affect, or
use Automatic.
5Click the checkbox to enable or disable use of the LDAPv3 server supplied by DHCP.
If you disable this setting, this computer doesn’t use any LDAPv3 servers supplied by DHCP.
However, the computer may automatically access shared NetInfo domains. See “Using
NetInfo Domains” on page 110 for more information.
If you enable this setting, the DHCP service should be configured to supply one or more
LDAPv3 server addresses. For instructions, see “Setting the LDAP Server for DHCP Clients”
on page 479 in Chapter 11, “DHCP Service.”
Showing or Hiding Available LDAPv3 Configurations
You can show or hide a list of available LDAPv3 server configurations. When you show the
list, you see and can change some settings for each LDAPv3 configuration.
To show or hide the available LDAPv3 configurations:
1In Directory Access, click the Services tab.
2If the lock icon is locked, click it and type the name and password of a server administrator.
3Select LDAPv3 in the list of services, then click Configure.
Directory Services97
4From the Location pop-up menu, choose the network location that you want to see, or
use Automatic.
5Click Show Options or Hide Options.
Configuring Access to Existing LDAPv3 Servers
On a Mac OS X computer that is not configured to access an LDAPv3 server automatically via
DHCP, you can manually configure access to one or more LDAPv3 servers. You can do the
following:
m Create server configurations and enable or disable them individually. For instructions, see
“Creating an LDAPv3 Configuration” on page 98.
m Edit the settings of a server configuration. For instructions, see “Editing an LDAPv3
Configuration” on page 99.
m Duplicate a configuration. For instructions, see “Duplicating an LDAPv3 Configuration” on
page 99.
m Delete a configuration. For instructions, see “Deleting an LDAPv3 Configuration” on
page 100.
m Change the connection settings for an LDAPv3 configuration. For instructions, see
“Changing an LDAPv3 Configuration’s Connection Settings” on page 100.
m Define custom mappings of Mac OS X record types and attributes to LDAPv3 record types,
search bases, and attributes. For instructions, see “Configuring LDAPv3 Search Bases and
Mappings” on page 101.
m Populate LDAPv3 directory domains with records and data. For instructions, see
“Populating LDAPv3 Domains With Data for Mac OS X” on page 103.
Creating an LDAPv3 Configuration
You can use Directory Access to create a configuration for an LDAPv3 server.
To create an LDAPv3 server configuration:
1In Directory Access, click the Services tab.
2If the lock icon is locked, click it and type the name and password of a server administrator.
3Select LDAPv3 in the list of services, then click Configure.
4If the list of server configurations is hidden, click Show Options.
5Click New and enter a name for the configuration.
6Press Tab and enter the LDAPv3 server’s DNS name or IP address.
7Choose a mapping template from the inline pop-up menu, or choose From Server.
98Chapter 2
8Enter the search base for your LDAPv3 server and click OK.
If you chose a template in step 7, you must enter a search base, or the LDAPv3 server will
not function.
If you chose From Server in step 7, you may be able to leave the search base blank and have
the LDAPv3 server function. In this case, Open Directory will look for the search base at the
first level of the LDAPv3 server.
9Select the SSL checkbox if you want Open Directory to use Secure Sockets Layer (SSL) for
connections with the LDAPv3 server.
After creating a new server configuration, you should add the server to an automatic search
policy supplied by a DHCP server or to a custom search policy. A computer can access an
LDAP server only if the server is included in the computer’s search policy, either automatic
or custom. For more information, see “Setting Up Search Policies” on page 94 and “Setting
the LDAP Server for DHCP Clients” on page 479 of Chapter 11, “DHCP Service.”
Editing an LDAPv3 Configuration
You can use Directory Access to change the settings of an LDAPv3 server configuration.
To edit an LDAPv3 server configuration:
1In Directory Access, click the Services tab.
2If the lock icon is locked, click it and type the name and password of a server administrator.
3Select LDAPv3 in the list of services, then click Configure.
4If the list of server configurations is hidden, click Show Options.
5Change any of the settings displayed in the list of server configurations.
Click an Enable checkbox to activate or deactivate a server.
To change a configuration name, double-click it in the list.
To change a server name or IP address, double-click it in the list.
Choose a mapping template from the inline pop-up menu.
Click the SSL checkbox to enable or disable Secure Sockets Layer (SSL) connections.
Duplicating an LDAPv3 Configuration
You can use Directory Access to duplicate an LDAPv3 server configuration. After duplicating a
configuration, you can change its settings.
To duplicate an LDAPv3 server configuration:
1In Directory Access, click the Services tab.
2If the lock icon is locked, click it and type the name and password of a server administrator.
Directory Services99
3Select LDAPv3 in the list of services, then click Configure.
4If the list of server configurations is hidden, click Show Options.
5Select a server configuration in the list, then click Duplicate.
6Change any of the duplicate configuration’s settings.
Click an Enable checkbox to activate or deactivate a server.
To change a configuration name, double-click it in the list.
To change a server name or IP address, double-click it in the list.
Choose a mapping template from the inline pop-up menu.
Click the SSL checkbox to enable or disable Secure Sockets Layer (SSL) connections.
After duplicating a server configuration, you should add the duplicate to an automatic search
policy supplied by a DHCP server or to a custom search policy. A computer can access an
LDAP server only if the server is included in the computer’s search policy, either automatic
or custom. For more information, see “Setting Up Search Policies” on page 94 and “Setting
the LDAP Server for DHCP Clients” on page 479 of Chapter 11, “DHCP Service.”
Deleting an LDAPv3 Configuration
You can use Directory Access to delete an LDAPv3 server configuration.
To delete an LDAPv3 server configuration:
1In Directory Access, click the Services tab.
2If the lock icon is locked, click it and type the name and password of a server administrator.
3Select LDAPv3 in the list of services, then click Configure.
4If the list of server configurations is hidden, click Show Options.
5Select a server configuration in the list, then click Delete.
Changing an LDAPv3 Configuration’s Connection Settings
You can use Directory Access to change the connection settings for an LDAPv3 server
configuration.
To change the connection settings of an LDAPv3 server configuration:
1In Directory Access, click the Services tab.
2If the lock icon is locked, click it and type the name and password of a server administrator.
3Select LDAPv3 in the list of services, then click Configure.
4If the list of server configurations is hidden, click Show Options.
5Select a server configuration in the list, then click Edit.
100Chapter 2
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.