The information in this document is subject to change without notice.
Hewlett-Packard makes no warranty of any kind with regard to this
manual, including, but not limited to, the implied warranties of
merchantability and fitness for a particular purpose. Hewlett-Packard
shall not be held liable for errors contained herein or direct, indirect,
special, incidental or consequential damages in connection with the
furnishing, performance, or use of this material.
Warranty
A copy of the specific warranty terms applicable to your Hewlett-Packard
product and replacement parts can be obtained from your local Sales and
Service Office.
U.S. Government License
Proprietary computer software. Valid license from HP required for
possession, use or copying. Consistent with FAR 12.211 and 12.212,
Commercial Computer Software, Computer Software Documentation,
and Technical Data for Commercial Items are licensed to the U.S.
Government under vendor's standard commercial license.
Copyright Notices
Copyright 2006 Hewlett-Packard Company L.P. All rights reserved.
Reproduction, adaptation, or translation of this document without prior
written permission is prohibited, except as allowed under the copyright
laws.
Trademark Notices
UNIX is a registered trademark in the United States and other
countries, licensed exclusively throughThe Open Group.
NIS is a trademark of Sun Microsystems, Inc.
Netscape and Netscape Directory Server are registered trademarks of
Netscape Communications Corporation in the United States and other
countries. Other product and brand names are trademarks of their
respective owners.
Table 5-3. LDAP-UX Client Services Libraries on the HP-UX 11i v2 PA machine 141
Table 5-4. LDAP-UX Client Services Libraries on the HP-UX 11i v2 IA machine. 142
The latest version of this document can be found on line at:
http://www.docs.hp.com
This document describes how to install and configure LDAP-UX Client
Services product on HP-UX platforms.
The document printing date and part number indicate the document’s
current edition. The printing date will change when a new edition is
printed. Minor changes may be made at reprint without changing the
printing date. The document part number will change when extensive
changes are made.
Document updates may be issued between editions to correct errors or
document product changes. To ensure that you receive the updated or
new editions, you should subscribe to the appropriate product support
service. See your HP sales representative for details.
Intended Audience
This document is intended for system and network administrators
responsible for installing, configuring, and managing the LDAP-UX
Client Services. Administrators are expected to have knowledge of the
LDAP-UX Client Services Integration product.
New and Changed Documentation in This
Edition
This edition documents the following new information for the LDAP-UX
Client Services version B.04.00:
•Support the automount service under the AutoFS subsystem. This
new feature allows you to store and manage the automount maps in
the LDAP directory server.
•Support discovery and and management of publickeys in an LDAP
directory.
•Provide the pam_authz login authorization enhancements. This new
feature allows you to define access rules in the local policy file,
/etc/opt/ldapux/pam_authz.policy.
xi
•Support NIS+ migration scripts that can be used to migrate from an
NIS+ domain into an LDAP directory server.
•Support Mozilla LDAP C SDK 5.14.1 which contains a set of LDAP
Application Programming Interfaces (API) to allow you to build
LDAP-enabled clients.
Publishing History
Table 1Publishing History Details
Document
Manufacturing
Part Number
J4269-90016 11.0, 11iB.03.00September
J4269-90030 11.0, 11i v1
J4269-90038 11.0, 11i v1B.03.30July 2004
J4269-90040 11.0, 11i v1
J4269-90048 11i v1 and v2B.04.00July 2005
J4269-90051 11i v1 and v2B.04.00August 2005
J4269-90053 11i v1 and v2B.04.00June 2006
J4269-9007111i v1, v2 andv3B.04.00February
Operating
Systems
Supported
and v2
and v2
Supported
Product
Versions
B.03.20October
B.03.30September
Publicatio
n Date
2002
2003
2004
2007
What’s in This document
xii
This manual describes how to install, configure and administer the
LDAP-UX Client Services software product.
The manual is organized as follows:
Chapter 1Introduction Use this chapter to learn the LDAP-UX
Client Services product features, components and
client administration tools.
Chapter 2Installing And Configuring LDAP-UX Client
Services Use this chapter to learn how to install,
configure, and use the LDAP-UX Client Services
software.
Chapter 3LDAP Printer Configurator Support Use this
chapter to learn how to set up, configure, and use the
printer configurator.
Chapter 4Administering LDAP-UX Client Services Use this
chapter to understand how to administer your
LDAP-UX Clients to keep them running smoothly and
expand them as your computing environment expands.
Chapter 5Command and Tool Reference Use this chapter to
learn about the commands and tools associated with
the LDAP-UX Client Services product.
Chapter 6User Tasks Use this chapter to learn how to change
passwords and personal information.
Chapter 7Mozilla LDAP C SDK Use this chapter to learn the
Mozilla LDAP SDK software features and its major file
components.
xiii
Typographical Conventions
This document uses the following conventions.
Book TitleThe title of a book. On the web and on the Instant
Information CD, it may be a hot link to the book itself.
EmphasisText that is emphasized.
BoldText that is strongly emphasized.
BoldThe defined use of an important word or phrase.
ComputerOutText displayed by the computer.
UserInputCommands and other text that you type.
CommandA command name or qualified command phrase.
Variable
[]The contents are optional in formats and command
{}The contents are required in formats and command
\The continuous line symbol.
The name of a variable that you may replace in a
command or function or information in a display that
represents several possible values.
descriptions. If the contents are a list separated by |,
you must choose one of the items.
descriptions. If the contents are a list separated by |,
you must choose one of the items.
HP Encourages Your Comments
HP encourages your comments concerning this document. We are truly
committed to providing documentation that meets your needs.
Please send comments to: netinfo_feedback@cup.hp.com
Please include document title, manufacturing part number, and any
comment, error found, or suggestion for improvement you have
concerning this document. Also, please include what we did right so we
can incorporate it into other documents.
xiv
1Introduction
LDAP-UX Client Services simplifies HP-UX system administration by
consolidating account and configuration information into a central LDAP
directory. This LDAP directory could reside on an HP-UX system such as
Netscape Directory Server 6.x, or the account information could be
integrated in Windows 2000/2003 Active Directory.
Information provided in this manual outlines the installation and
administration tasks of LDAP-UX Client Services with HP-UX based
LDAP directories such as Netscape Directory Server 6.x.
For information on the integration of LDAP-UX Client Services with
Windows 2000/2003 Active Directory, see LDAP-UX with Microsoft
Windows 2000/2003 Active Directory Administrator’s Guide
(J4269-90041) at http://docs.hp.com/hpux/internet.
This chapter introduces LDAP-UX Client Services and briefly describes
how it works.
Overview of LDAP-UX Client Services
Traditionally, HP-UX account and configuration information is stored in
text files, for example, /etc/passwd and /etc/group. NIS was developed to
ease system administration by sharing this information across systems
Chapter 11
Introduction
Overview of LDAP-UX Client Services
on the network. With NIS, account and configuration information resides
on NIS servers. NIS client systems retrieve this shared configuration
information across the network from NIS servers, as shown below:
Figure 1-1A Simplified NIS Environment
NIS master server
Map transfers
NIS slave server
NIS Requests
NIS client
LDAP-UX Client Services improves on this configuration information
sharing. HP-UX account and configuration information is stored in an
LDAP directory, not on the local client system. Client systems retrieve
this shared configuration information across the network from the LDAP
NIS slave server
NIS clientNIS client
Chapter 12
Overview of LDAP-UX Client Services
directory, as shown below. LDAP adds greater scalability,
interoperability with other applications and platforms, and less network
traffic from replica updates.
LDAP-UX Client Services supports the following name service data:
passwd, groups, hosts, rpc, services, networks, protocols, publickeys,
automount, netgroup. See the LDAP-UX Integration B.04.00 ReleaseNotes for any additional supported services.
Updates
LDAP Requests
LDAP Directory
Server Replica
LDAP-UX client
How LDAP-UX Client Services Works
LDAP-UX Client Services works by leveraging the authentication
mechanism provided in the Pluggable Authentication Module, or PAM,
and the naming services provided by the Name Service Switch, or NSS.
See pam(3), pam.conf(4), and Managing Systems and Workgroups at
http://docs.hp.com/hpux/os for information on PAM. For information on
NSS, see switch(4) and “Configuring the Name Service Switch” in
Installing and Administering NFS Services at
http://docs.hp.com/hpux/communications/#NFS.
These extensible mechanisms allow new authentication methods and
new name services to be installed and used without changing the
underlying HP-UX commands. And, by supporting the PAM architecture,
the HP-UX client becomes truly integrated in the LDAP environment.
The PAM_LDAP library allows the HP-UX system to use the LDAP
directory as a trusted server for authentication. This means that
Chapter 13
Introduction
Overview of LDAP-UX Client Services
passwords may not only be stored in any syntax but also means that
passwords may remain hidden from view (preventing a decryption attack
on the hashed passwords). Because passwords may be stored in any
syntax, HP-UX will be able to share passwords with other LDAP-enabled
applications.
With LDAP-UX Client Services B.03.20 or later versions, the client
daemon, ldapclientd, becomes the center of the product. It supports
all NSS backend services for LDAP and data enumeration. It also
supports PAM_LDAP for authentication and password change.
With LDAP-UX Client Services, HP-UX commands and subsystems can
transparently access name service information from the LDAP directory
through ldapclientd. The following table shows some examples of
commands and subsystems that use PAM and NSS:
Table 1-1Examples of Commands and Subsystems
that use PAM and NSS
Commands that use
Commands that use PAM and
NSS
lslogin
nsquery
a
passwd
whoftp
whoamisu
finger
b
rlogin
idtelnet
lognamedtlogin
groups
b
newgrp
b
pwget
b
grget
listusers
b
b
remsh
NSS
Chapter 14
Introduction
Overview of LDAP-UX Client Services
Table 1-1Examples of Commands and Subsystems
that use PAM and NSS (Continued)
Commands that use
NSS
b
logins
Commands that use PAM and
NSS
nslookup
a. nsquery(1) is a contributed tool included with the
ONC/NFS product.
b. These commands enumerate the entire passwd or
group database, which may reduce network and
directory server performance for large databases.
In addition, the getpwent(3C) and getgrent(3C) family of system calls get
user and group information from the directory.
Chapter 15
Introduction
Overview of LDAP-UX Client Services
After you install and configure an LDAP directory and migrate your
name service data into it, HP-UX client systems locate the directory from
a “start-up file.” The start-up file tells the client system how to download
a “configuration profile” from the LDAP directory. The configuration
profile is a directory entry containing configuration information common
to many clients. Storing it in the directory lets you maintain it in one
place and share it among many clients rather than storing it
redundantly across the clients. Because the configuration information is
stored in the directory, all each client needs to know is where its profile
is, hence the start-up file. Each client downloads the configuration profile
from the directory.
The profile is an entry in the directory containing details on how clients
are to access the directory, such as:
•where and how clients should search the directory for user, group
and other name service information.
•how clients should bind to the directory: anonymously or as a proxy
user. Anonymous access is simplest. Configuring a proxy user adds
some security, but at the same time it adds the overhead of managing
the proxy user.
•other configuration parameters such as search time limits.
Chapter 16
Overview of LDAP-UX Client Services
Figure 1-4The Local Start-up File and the Configuration Profile
LDAP Directory
Introduction
The start-up file points
to the configuration
profile in the directory.
The following chapter describes in detail how to install, configure, and
verify LDAP-UX Client Services.
Configuration
profile
Start-up
file
LDAP-UX client
The shared configuration
profile is stored in the
directory and downloaded
to all LDAP-UX clients.
Configuration
profile
Chapter 17
Introduction
Overview of LDAP-UX Client Services
Chapter 18
2Installing And Configuring
LDAP-UX Client Services
This chapter describes the decisions you need to make and the steps to
install Netscape and configure LDAP-UX Client Services. This chapter
contains the following sections:
•“Before You Begin” on page 9.
•“Summary of Installing and Configuring” on page 10.
•“Plan Your Installation” on page 12.
•“Install LDAP-UX Client Services on a Client” on page 20.
•“Configure Your Directory” on page 21.
•“Import Name Service Data into Your Directory” on page 25.
•“Configure the LDAP-UX Client Services” on page 27.
•“Configure the LDAP-UX Client Serivces with SSL Support” on
page 41.
•“Configure LDAP-UX Client Services with Publickey Support” on
page 46.
•“AutoFS Support” on page 55.
•“Verify the LDAP-UX Client Services” on page 68.
•“Configure Subsequent Client Systems” on page 72.
•“Download the Profile Periodically” on page 74.
•“Use r-command for PAM_LDAP” on page 76.
Before You Begin
This section lists some things to keep in mind as you plan your
installation.
•Use the configuration worksheet to record your decisions and other
information you’ll need later for configuration in Appendix A,
“Configuration Worksheet,” on page 183.
•See the LDAP-UX Integration B.04.00 Release Notes (J4269-90042)
at http://docs.hp.com/hpux/internet for last-minute information.
•You must have an LDAP directory. You can obtain the Netscape
Directory Server for HP-UX version 6.x from your local HP sales
office or www.hp.com and view the documentation at
http://docs.hp.com/hpux/internet/#Netscape%20Directory%20Server.
Chapter 29
Installing And Configuring LDAP-UX Client Services
Summary of Installing and Configuring
•See the white paper Preparing Your Directory for HP-UX Integration
at http://docs.hp.com/hpux/internet for advice on how to set up and
configure your directory to work with HP-UX.
•Most examples here use the Netscape Directory Server for HP-UX
version 6.x and assume you have some knowledge of this directory
and its tools, such as the Directory Console and ldapsearch. If you
have another directory, consult your directory’s documentation for
specific information.
•For details on how to integrate LDAP-UX Client Services with
Windows 2000 Active Directory, please refer to LDAP-UX Client
Services with Microsoft Windows 2000/2003 Active Directory
Administrator’s Guide (J4269-90041) at
•The examples use a base DN of o=hp.com for illustrative purposes.
Summary of Installing and Configuring
The following summarizes the steps you take when installing and
configuring an LDAP-UX Client Services environment.
• See “Plan Your Installation” on page 12.
•Install LDAP-UX Client Services on each client system. See “Install
LDAP-UX Client Services on a Client” on page 20.
•Install and configure an LDAP directory, if not already done. See
“Configure Your Directory” on page 21.
•Configure your LDAP server to support SSL if you attempt to enable
SSL support with LDAP-UX.
•Migrate your name service data to the directory. See “Import Name
Service Data into Your Directory” on page 25.
•Install and set up the security database files on the LDAP-UX client
system if you want to enable SSL support with LDAP-UX. See
“Configure the LDAP-UX Client Serivces with SSL Support” on
page 41.
Chapter 210
Installing And Configuring LDAP-UX Client Services
Summary of Installing and Configuring
•Run the setup program to configure LDAP-UX Client Services on a
client system. Setup does the following for you:
— Extends your Netscape directory schema with the configuration
profile schema, if not already done.
— Imports the LP printer schema into your LDAP directory server
if you choose to start the LDAP printer configurator.
— Imports the publickey schema into your LDAP directory if you
choose to store the public keys of users and hosts in the LDAP
directory.
— Imports the automount schema into your LDAP directory server
if you choose to store the AutoFS maps in the LDAP directory.
— Creates a start-up file on the client. This enables each client to
download the configuration profile.
— Creates a configuration profile of directory access information in
the directory, to be shared by a group of (or possibly all) clients.
— Downloads the configuration profile from the directory to the
client.
— Start the product daemon, ldapclientd, if you choose to start it.
Starting with LDAP-UX Client B.03.20 or later, the client
daemon must be started for LDAP-UX functions to work. With
LDAP-UX Client B.03.10 or earlier, running the client daemon is
optional.
See “Configure the LDAP-UX Client Services” on page 27.
•Modify the files /etc/pam.conf and /etc/nsswitch.conf on the client to
specify LDAP authentication and name service, respectively. See
“Configure the LDAP-UX Client Services” on page 27.
•Optionally modify the disable_uid_range flag in the
/etc/opt/ldapux/ldapux_client.conf file to disable logins to the local
system from specific ldap users.
•Optionally modify the /etc/opt/ldapux/pam_authz.policy and
/etc/pam.conf files to verify the user access rights of a subset of
users in a large repository needing access, if appropriate. See the
pam_authz(5) man page for the command syntax.
•Verify each client is working properly. See “Verify the LDAP-UX
Client Services” on page 68.
•See also “Configure Subsequent Client Systems” on page 72 for some
shortcuts.
Chapter 211
Installing And Configuring LDAP-UX Client Services
Plan Your Installation
Plan Your Installation
Before beginning your installation, you should plan how you will set up
and verify your LDAP directory and your LDAP-UX Client Services
environment before putting them into production. Consider the following
questions. Record your decisions and other information you’ll need later
in Appendix A, “Configuration Worksheet,” on page 183.
•How many LDAP directory servers and replicas will you need?
Each client system binds to an LDAP directory server containing
your user, group, and other data. Multiple clients can bind to a single
directory server or replica server. The answer depends on your
environment, the size and configuration of your directory and how
many users and clients you have.Write your directory server host
and TCP port number in Appendix A, “Configuration Worksheet,” on
page 183. See the white paper Preparing Your Directory for HP-UXIntegration at: http://docs.hp.com/hpux/internet for more
information.
See the Netscape Directory Server Deployment Guide for more
information. You can add directory replicas to an existing LDAP-UX
Client Services environment as described under “Adding a Directory
Replica” on page 118. You may also want to review the LDAP-UX
performance white paper at http://docs.hp.com/hpux/internet.
•Where will you get your name service data from when migrating it to
the directory?
You can get it from your files in the /etc directory or, if you are using
NIS, from the same source files you create your NIS maps from, or
you can get it from your NIS maps themselves. Write this
information in Appendix A, “Configuration Worksheet,” on page 183.
See “Import Name Service Data into Your Directory” on page 25 for
how to import your information into the directory and “Name Service
Migration Scripts” on page 160 for details on the migration scripts.
To add an individual user entry or modify an existing user entry in
your directory, you can use the ldapmodify command or other
directory administration tools such as the Netscape Console. See also
the LDAP-UX Integration B.03.20 Release Notes for additional
contributed tools.
Chapter 212
Installing And Configuring LDAP-UX Client Services
Plan Your Installation
NOTEYou should keep a small subset of users in /etc/passwd, particularly
the root login. This allows administrative users to log in during
installation and testing. Also, if the directory is unavailable you can
still log in to the system.
•Where in your directory will you put your name service data?
Your directory architect needs to decide where in your directory to
place your name service information. LDAP-UX Client Services by
default expects user and group data to use the object classes and
attributes specified by RFC 2307. The migration scripts by default
create and populate a new subtree that conforms to RFC 2307.
Figure 2-1 on page 15 shows a base DN of ou=unix,o=hp.com. Write
the base DN of your name service data in Appendix A,
“Configuration Worksheet,” on page 183.
If you prefer to merge your name service data into an existing
directory structure, you can map the standard RFC 2307 attributes
to alternate attributes. See “LDAP-UX Client Services Object
Classes” on page 187 for more information.
•How will you put your user, group, and other data into your
directory?
LDAP supports group membership defined in the X.500 syntax
(using the member or uniquemember attribute), while still
supporting the RFC 2307 syntax (using the memberuid attribute).
This new group membership syntax increases LDAP-UX integration
with LDAP and other LDAP-based applications, and may reduce
administration overhead eliminating the need to manage the
memberuid attribute. In addition, a new performance improvement
has been made through the addition of a new caching daemon which
caches passwd, group and X.500 group membership information
retrieved from an LDAP server. This significantly reduces
LDAP-UX’s response time to applications. In addition, the daemon
re-uses connections for LDAP queries and maintains multiple
connections to an LDAP server to improve performance.
The migration scripts provided with LDAP-UX Client Services can
build and populate a new directory subtree for your user and group
data.
Chapter 213
Installing And Configuring LDAP-UX Client Services
Plan Your Installation
If you merge your data into an existing directory, for example to
share user names and passwords with other applications, the
migration scripts can create LDIF files of your user data, but you will
have to write your own scripts or use other tools to merge the data
into your directory. You can add the posixAccount object class to your
users already in the directory to leverage your existing directory
data.
See “Import Name Service Data into Your Directory” on page 25 for
how to import your information into the directory and “Name Service
Migration Scripts” on page 160 for details on the migration scripts.
CAUTIONIf you place a root login in the LDAP directory, that user and
password will be able to log in as root to any client using LDAP-UX
Client Services. Keeping the root user in /etc/passwd on each client
system allows the root user to be managed locally. This can be
especially useful if the network is down because it allows local access
to the system.
It is not recommended that you put the same users both in
/etc/passwd and in the directory. This could lead to conflicts and
unexpected behavior.
•How many profiles do you need?
A configuration profile is a directory entry that contains
configuration information shared by a group of clients. The profile
contains the information clients need to access user and group data
in the directory, for example:
— Your directory server hosts
— Where user, group, and other information is in the directory
— The method clients use to bind to the directory
— Other configuration parameters such as search time limits
If these parameters are the same for all your clients, you would need
only one profile. You will need at least one profile per directory server
or replica. In general, it is a good idea to have as few profiles as
necessary to simplify maintenance. Look at the posixNamingProfile
object class in Appendix B, “LDAP-UX Client Services Object
Classes,” on page 187 to see what is in a profile to decide how many
different profiles you need.
Chapter 214
If you are familiar with NIS, one example is to create a separate
profile for each NIS domain.
•Where in your directory will you put your profile?
The profile contains directory access information. It specifies how
and where clients can find user and group data in the directory. You
can put the profile anywhere you want as long as the client systems
can read it. For example, you might put it near your user data, or in a
separate administrative area. You should put the profile in the same
directory as your user and group data to simplify access permissions.
Clients must have access to both the profile and the user and group
data. The following example shows a configuration profile DN of
cn=profile1,ou=profiles,ou=devices,ou=unix,o=hp.com.
Figure 2-1Example Directory Structure
Installing And Configuring LDAP-UX Client Services
Plan Your Installation
o=hp.com
ou=unix
ou=peopleou=groupsou=profiles
user
data
Write your configuration profile DN on the worksheet in Appendix A,
“Configuration Worksheet,” on page 183.
•By what method will client systems bind to the directory?
Clients can bind to the directory anonymously. This is the default
and is simplest to administer. If you need to prevent access to your
data from anonymous users or your directory does not support
anonymous access, you can use a proxy user. If you configure a proxy
user, you can also configure anonymous access to be attempted in the
event the proxy user fails.
Write your client access method and proxy user DN, if needed, on the
worksheet in Appendix A, “Configuration Worksheet,” on page 183.
Chapter 215
data
profile1group
ou=hosts
host
data
Installing And Configuring LDAP-UX Client Services
Plan Your Installation
•How will you increase the security level of the product to prevent an
unwanted user from logging in to the system via LDAP? What is the
procedure to set up increased login security?
The default is to allow all users stored in the LDAP directory to
login. To disallow specific users to login to a local system, you will
have to configure the disable_uid_range flag in
/etc/opt/ldapux/ldapux_client.conf file. There are two sections in this
file, the [profile] section and the [NSS] section. HP recommends that
you do not edit the [profile] section. The [NSS] section contains the
disable_uid_range flag along with two logging flags. For example, the
flag might look like this: disable_uid_range=0-100, 300-450, 89.
Another common example would be to disable root access This flag
would look like this: disable_uid_range=0.
When the disable_uid_range is turned on, the disabled uid will not
be displayed when you run commands such as pwget, listusers,
logins, etc.
NOTEThe passwd command may still allow you to change a password for a
disabled user when alternative authentication methods, such as
PAM Kerberos, are used since LDAP does not control these
subsystems.
•What PAM authentication will you use? How will you set up
/etc/pam.conf? What other authentication do you want to use & in
what order?
PAM is the Pluggable Authentication Module, providing
authentication services. You can configure PAM to use ldap,
Kerberos, or other traditional UNIX locations (for example files, NIS,
NIS+) as controlled by NSS. See pam(3), pam.conf(4), and ManagingSystems and Workgroups at http://docs.hp.com/hpux/os for more
information on PAM.
It is recommended you use HP-UX file-based authentication first,
followed by LDAP or other authentication. /etc/pam.ldap is an
example of this configuration. With this configuration, PAM uses
traditional authentication first, searching /etc/passwd when any user
logs in, then attempts to authenticate to the directory if the user is
Chapter 216
Installing And Configuring LDAP-UX Client Services
Plan Your Installation
not in /etc/passwd. If you have a few users in /etc/passwd, in
particular the root user, and if the directory is unavailable, you can
still log in to the client as a user in /etc/passwd.
•Do you want to use SSL for secure communication between LDAP
clients and Netscape Directory servers?
LDAP-UX Client Services B.03.20 or later supports SSL with
password as the credential, using either simple or DIGEST-MD5
authentication (DIGEST-MD5 for the Netscape Directory Server
only) to ensure confidentiality and data integrity between the clients
and servers. By default, SSL is disabled. For detailed information,
refer to “Configure the LDAP-UX Client Serivces with SSL Support”
on page 41.
•What authentication method will you use when you choose to enable
SSL?
You have a choice between SIMPLE with SSL (the default), or SASL
DIGEST-MD5 with SSL.
•What authentication method will you use when you choose to not
enable SSL?
You have a choice between SIMPLE (the default), or SASL
DIGEST-MD5. SASL DIGEST-MD5 improves security, preventing
snooping over the network during authentication.
Using the DIGEST-MD5 authentication, the password must be
stored in the clear text in the LDAP directory.
•Do you want to import the LDAP printer schema if you choose to
start the printer configurator?
LDAP-UX Client Services B.03.20 or later provides the integration
with the LDAP printer configurator to simplify the LP printer
management by updating LP printer configuration automatically on
your client system. A new printer schema, which is based on
IETF<draft-fleming-ldap-printer-schema-02>, is required to start the
services.
Chapter 217
Installing And Configuring LDAP-UX Client Services
Plan Your Installation
IMPORTANTIf you attempt to use this new feature, in the ldapclientd.conf
file, the start configuration parameter of the printer services
section must be set to “yes”. If the start option is enabled, the
printer configurator will start when ldapclientd is initialized. By
default, the start parameter is enabled.
•Do you want to import the publickey schema into your LDAP
directory if you choose to store and manage publickeys in the LDAP
directory.
LDAP-UX Client Services B.04.00 supports discovery and
management of publickeys in an LDAP directory. Both public and
private (secret) keys, used by the SecureRPC API can be stored in
user and host entries in an LDAP directory server, using the
nisKeyObject objectclass.
•Do you want to import the automount schema into your LDAP
directory server if you choose to store and manage automount maps
in the LDAP directory?
LDAP-UX Client Services B.04.00 supports the automount service
under the AutoFS subsystem. This new feature allows you to store or
retrieve automount maps in/from an LDAP directory. LDAP-UX
Client Services supports the new automount schema based on
RFC2307-bis. The nisObject automount schema can also be used if
configured via attribute mappings.
The setup program will import the new automount schema into your
Netscape Directory Server. An obsolete automount schema is shipped
with the Netscape Directory Server version 6.x. You must manually
delete the obsolete automount schema before the setup program can
successfully import the new automount schema into the LDAP
directory.
For the detailed information about AutoFS with LDAP support, see
“AutoFS Support” on page 55.
•What name services will you use? How will you set up
/etc/nsswitch.conf? What order do you want NSS to try services?
NSS is the Name Service Switch, providing naming services for user
names, group names, and other information. You can configure NSS
to use files, ldap, or NIS in any order and with different parameters.
Chapter 218
Installing And Configuring LDAP-UX Client Services
Plan Your Installation
See /etc/nsswitch.ldap for an example nsswitch.conf file using files
and ldap. See switch(4) and “Configuring the Name Service Switch”
in Installing and Administering NFS Services at http://docs.hp.com
for more information.
It is recommended you use files first, followed by LDAP for passwd,
group and other supported name services. With this configuration,
NSS will first check files, then check the directory if the name service
data is not in the respective files. /etc/nsswitch.ldap is an example of
this configuration.
•Do you need to configure login authorization for a subset of users
from a large repository such as an LDAP directory? How will you set
up the /etc/opt/ldapux/pam_authz.policy and /etc/pam.conf
files to implement this feature?
The pam_authz service module for PAM provides functionality that
allows the administrator to control who can login to the system.
These modules are located at /usr/lib/security/libpam_authz.1 on the
HP 9000 machine and at libpam_authz.so.1 on the Integrity (ia64)
machine. pam_authz has been created to provide access control
similar to the netgroup filtering feature that is performed by NIS.
These modules are located at /usr/lib/security/libpam_authz.1 on the
HP 9000 machine (libpam_authz.so.1 on the Integrity (ia64)
machine). Starting with LDAP-UX Client Services B.04.00,
pam_authz has been enhanced to allow system administrators to
configure and customize their local access rules in a local policy file,
/etc/opt/ldapux/pam_authz.policy. pam_authz uses these
access control rules defined in the
/etc/opt/ldapux/pam_authz.policy file to control the login
authorization. pam_authz is intended to be used when NIS is not
used, such as when the pam_ldap or pam_kerberos authentication
modules are used. Because pam_authz doesn’t provide
authentication, it doesn’t verify if a user account exists.
Starting with LDAP-UX Client Services B.04.00, if the
/etc/opt/ldapux/pam_authz.policy file does not exist in the
system, pam_authz provides access control based on the netgroup
information found in the /etc/passwd and /etc/netgroup files. If
the /etc/opt/ldapux/pam_authz.policy file exists in the system,
pam_authz uses the access rules defined in the policy file to
determine who can login to the system.
Chapter 219
Installing And Configuring LDAP-UX Client Services
Install LDAP-UX Client Services on a Client
For detailed information on this feature and how to configure the
/etc/opt/ldapux/pam_authz.policy file, see “PAM_AUTHZ Login
Authorization Enhancement” on page 109 or the pam_authz(5) man
page.
•How will you communicate with your user community about the
change to LDAP?
For the most part, your user community should be unaffected by the
directory. Most HP-UX commands will work as always. However, for
some LDAP directories (such as Netscape Directory Server 6.x), data
in replica servers cannot be modified. The passwd(1) command will
not work on clients configured to use such a directory replica. See “To
Change Passwords” on page 169 for how you can use ldappasswd(8)
in this situation.
Check the Release Notes for any other limitations and tell your users
how they can work around them.
Install LDAP-UX Client Services on a Client
Use swinstall(1M) to install the LDAP-UX Client Services software, the
NativeLdapClient subproduct, on a client system. See the LDAP-UXIntegration B.04.00 Release Notes for any last-minute changes to this
procedure. You don’t need to reboot your system after installing the
product.
NOTEStarting with LDAP-UX Client Services B.03.20 or later, system reboot is
not required after installing the product.
NOTEFor the HP 9000 and Integrity (ia64) client systems, you need to install
the required patches. For the detailed information about the required
patches, refer to “LDAP-UX Client Services B.04.00 Release Notes at:
http://www.docs.hp.com.
Chapter 220
Installing And Configuring LDAP-UX Client Services
Configure Your Directory
Configure Your Directory
This section describes how to configure your directory to work with
LDAP-UX Client Services. Examples are given for Netscape Directory
Server for HP-UX version 6.x. See the LDAP-UX Integration B.04.00Release Notes for information on supported directories. If you have a
different directory, see the documentation for your directory for details
on how to configure it.
See Preparing Your LDAP Directory for HP-UX Integration at
http://docs.hp.com/hpux/internet for more details on directory
configuration.
Step 1. Install the posix schema (RFC 2307) into your directory.
If you have Netscape Directory Server for HP-UX version 4.0, or later,
the posix schema is already installed.
The schema is in the file /opt/ldapux/ypldapd/etc/slapd-v3.nis.conf. For
information on the posix schema (RFC 2307), see
http://www.ietf.org/rfc.html. RFC 2307 consists of object classes such as:
posixAccount, posixGroup, shadowAccount, etc. posixAccount represents
a user entry from /etc/passwd. posixGroup represents a group entry from
/etc/group. And shadowAccount provides additional user information for
added security.
Step 2. Restrict write access to certain passwd (posixAccount) attributes of the
posix schema.
CAUTIONMake sure you restrict access to the attributes listed below. Allowing
users to change them could be a security risk
Grant write access of the uidnumber, gidnumber, homedirectory, and uid
attributes only to directory administrators; disallow write access by all
other users. You may want to restrict write access to other attributes in
the passwd (posixAccount) entry as well.
Chapter 221
Installing And Configuring LDAP-UX Client Services
Configure Your Directory
With Netscape Directory Server for HP-UX, you can use the Netscape
Console or ldapmodify to set up access control instructions (ACI) so
ordinary users cannot change these attributes in their passwd entry in
the directory.
The following access control instruction is by default at the top of the
directory tree for a 6.x Netscape directory. This ACI allows a user to
change any attribute in their passwd entry:
You could modify this example ACI to the following, which prevents
ordinary users from changing their uidnumber, gidnumber,
homedirectory, and uid attributes:
3.0; acl “Allow self entry modification, except for important posix attributes”;
allow (write)userdn = “ldap:///self”;)
You may have other attributes you need to protect as well.
To change an ACI with the Netscape Directory Console, select the
Directory tab, select your directory suffix in the left-hand panel, then
select the Object: Set Access Permissions menu item. In the dialog box,
select the “Allow self entry modification” ACI and click OK. Use the Set
Access Permissions dialog box to modify the ACI. See “Managing Access
Control” in the Netscape Directory Server Administrator’s Guide for
complete details.
Step 3. Restrict write access to certain group (posixGroup) attributes of the posix
schema.
Grant write access of the cn, memberuid, gidnumber, and userPassword
attributes only to directory administrators; disallow write access by all
other users.
With Netscape Directory Server for HP-UX, you can use the Netscape
Console or ldapmodify to set up access control lists (ACL) so ordinary
users cannot change these attributes in the posixGroup entry in the
directory. For example, the following ACI, placed in the directory at
ou=groups,ou=unix,o=hp.com, allows only the directory administrator
to modify entries below ou=groups,ou=unix,o=hp.com:
aci: (targetattr = "*")(version 3.0;acl "Disallow modification of group
entries"; deny (write) (groupdn != "ldap:///ou=Directory Administrators,
o=hp.com");)
Chapter 222
Installing And Configuring LDAP-UX Client Services
Configure Your Directory
Step 4. Grant read access of all attributes of the posix schema.
Ensure all users have read access to the posix attributes.
When using PAM_LDAP as your authentication method, users do not
need read access to the userPassword attribute since the authentication
is handled by the directory itself. Therefore, for better security, you can
remove read access to userPassword from ordinary users.
Step 5. Configure anonymous access, if needed. If you do not configure a proxy
user, then the attributes of your name service data must be readable
anonymously.
Step 6. Create a proxy user in the directory, if needed.
To create a proxy user with Netscape Directory Server for HP-UX, use
the Netscape Console, Users and Groups tab, Create button. For
example, you might create a user uid=proxyuser,ou=SpecialUsers,o=hp.com.
Step 7. Set access permissions for the proxy user, if configured.
Give the proxy user created above read permission for the posix account
attributes.
With Netscape Directory Server, for example, the following ACI gives a
proxy user permission to compare, read, and search all posix account
attributes except the userPassword attribute:
||telephoneNumber ||telexNumber ||title ||userCertificate ||userPassword
||userSMIMECertificate ||x500UniqueIdentifier")
(version 3.0; acl "Enable selfwrite for common attributes"; allow (write)
(userdn = "ldap:///self"))
You can modify the default ACI and give appropriate access rights to
change your own common attributes.
Step 9. Index important attributes for better performance of Netscape Directory
Server.
Since many of your directory requests will be for the attributes listed
below, you should index these to improve performance. If you don’t index,
your directory may search sequentially causing a performance
bottleneck. As a rule of thumb, databases containing more than 100
entries should be indexed by their key attributes.
The following attributes are recommended for indexing:
•cn
•objectclass
•memberuid
•uidnumber
•gidnumber
•uid
•ipserviceport
•iphostnumber
To index these entries with Netscape Directory Server, use the Console,
Configuration tab, Indexes tab, Add Attributes button.
Step 10. Determine if you need to support enumeration requests. If you do,
increase the Look-Through limit, the Size limit, and the
All-IDs-Threshold in the Netscape Directory Server.
Enumeration requests are directory queries that request all of a
database, for example all users or all groups. Enumeration requests of
large databases could reduce network and server performance. With
large Netscape Directories and default configurations, enumerations
may fail or provide incomplete data, but the default configuration also
may prevent performance problems from enumerations.
If you need to support enumerations with large Netscape Directories,
increase the listed parameters as described in Preparing Your LDAPDirectory for LDAP-UX Integration available at
http://docs.hp.com/hpux/internet/#LDAP-UX%20Integration.
Chapter 224
Installing And Configuring LDAP-UX Client Services
Import Name Service Data into Your Directory
The Look-through limit specifies the maximum number of directory
entries to examine before aborting the search operation. The Size limit
determines the maximum number of entries to return to any query
before aborting. The All-IDs-Threshold specifies the number of entries
that can be maintained for an index key. In general, it is bad practice to
have an extremely large All-ID’s threashold, as it can dramatically
increase the size of your directory server’s database. However, if you
have a large number of posixAccounts, posixGroups or other form of RFC
2307 data that needs to be enumerated and you also have other large
sets of data in your directory server, increasing the All-UID’s threashold
to above the maximum number of posixAccounts, posixGroups, or others,
can dramatically increase enumeration performance.
For information on these parameters and how to change them, see the
Netscape Directory Server Administrator’s Guide. See also “Minimizing
Enumeration Requests” on page 125.
Step 11. If you want to enable SSL support with LDAP-UX, you need to turn on
SSL in your directory server. For detailed information on how to set up
and configure your Netscape Directory Server to enable SSL
communication over LDAP, see “Managing SSL Chapter” in the
Administrator’s Guide for Netscape Directory Server at
http://enterprise.netscape.com/docs/directory/61/pdf/ds61admin.pdf
Import Name Service Data into Your
Directory
The next step is to import your name service data into your LDAP
Directory. Here are some considerations when planning this:
•If you have already imported data into your directory with the
NIS/LDAP Gateway product, LDAP-UX Client Services can use that
data and you can skip to “Configure the LDAP-UX Client Services”
on page 27.
Chapter 225
Installing And Configuring LDAP-UX Client Services
Import Name Service Data into Your Directory
•If you are using NIS, the migration scripts take your NIS maps and
generate LDIF files. These scripts can then import the LDIF files
into your directory, creating new entries in the directory. This only
works if you are starting with an empty directory or creating an
entirely new subtree in your directory for your data.
If you are not using NIS, the migration scripts can take your user,
group, and other data from files, generate LDIF, and import the
LDIF into your directory.
•If you integrate the name service data into your directory, the
migration scripts may be helpful depending on where you put the
data in your directory. You could use them just to generate LDIF, edit
the LDIF, then import the LDIF into your directory. For example, you
could manually add the posixAccount object class to your existing
entries under ou=People and add their HP-UX information there.
Steps to Importing Name Service Data into Your
Directory
Here are the steps for importing your user and group data into your
LDAP directory. Modify them as needed.
Step 1. Decide which migration method and scripts you will use.
Migration scripts are provided to ease the task of importing your existing
name service data into your LDAP directory.
See “Name Service Migration Scripts” on page 160 for a complete
description of the scripts, what they do, and how to use them. Modify the
migration scripts, if needed.
Step 2. Back up your directory.
Step 3. Run the migration scripts, using the worksheet in Appendix A,
“Configuration Worksheet,” on page 183.
Step 4. If the method you used above did not already do so, import the LDIF file
into your directory.
Chapter 226
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Services
Configure the LDAP-UX Client Services
Below is a summary of how to configure LDAP-UX Client Services with
Netscape Directory Server 6.x. For a default configuration, see “Quick
Configuration” on page 29. For a custom configuration, see “Custom
Configuration” on page 34 for more information.
NOTEThe setup program has only been certified with Netscape Directory
Server 6.x, and Windows 2000/2003 Active Directory. See the LDAP-UXClient Services B.04.00 Release Notes (P/N J4269-90042).
NOTEThe LDAP-UX Client Services B.04.00 supports storage of automount
maps and publickeys on Netscape Directory Server 6.11 or 6.21. See the
LDAP-UX Client Services B.04.00 Release Notes (P/N J4269-90045).
•Run the Setup program. The setup program provides the following
assistance:
— Extends your Netscape directory schema with the configuration
profile schema, if not already done
— Imports the LDAP printer schema into your Netscape Directory
Server if you choose to start the LDAP printer configurator
— Imports the publickey schema into your Netscape Directory
Server if you choose to store the public keys of users and hosts in
an LDAP directory
— Imports the new automount schema into your Netscape
Directory Server if you choose to store the AutoFS maps in an
LDAP directory
— Provides the option to enable SSL for secure communication
between LDAP clients and Netscape Directory servers
— Creates a configuration profile entry in your Netscape directory
from information you provide
Chapter 227
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Services
— Updates the local client’s start-up file
(/etc/opt/ldapux/ldapux_client.conf) with your directory and
configuration profile location
— Downloads the configuration profile from the directory to your
local client system
— Configures a proxy user for the client, if needed
— Starts the Client Daemon if you choose to start it
IMPORTANTStarting with LDAP-UX Client Services B.03.20, the client daemon,
/opt/ldapux/bin/ldapclientd, must be running for LDAP-UX
functions to work. With LDAP-UX Client Services B.03.10 or earlier,
running the client daemon, ldapclientd, is optional.
NOTEThe LDAP printer configurator can support any Directory Servers
that support the LDAP printer schema based on
IETF<draft-fleming-ldap-printer-schema-02.txt>.
However, the LDAP-UX Client Services only supports automatically
importing the LDAP printer schema into the Netscape Directory
Server by running the setup program.
If your directory server does not support the LDAP printer schema,
you may experience problems when importing the printer schema.
•Configure the Pluggable Authentication Module (PAM) by modifying
the file /etc/pam.conf. See /etc/pam.ldap for a sample.
•Configure the Name Service Switch (NSS) by modifying the file
/etc/nsswitch.conf. See /etc/nsswitch.ldap for a sample.
•Optionally modify the disable_uid_range flag in the
/etc/opt/ldapux/ldapux_client.conf file to disable logins to the local
system from specific users.
•Optionally configure the authorization of one or more subgroups
from a large repository such as an LDAP directory server. For the
detailed information on how to set up the policy file,
/etc/opt/ldapux/pam_authz.policy, see “Policy File” on
page 111.
Chapter 228
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Services
After you configure your directory and the first client system, configuring
additional client systems is simpler. Refer to “Configure Subsequent
Client Systems” on page 72 for more information.
Quick Configuration
You can quickly configure a Netscape directory and the first client by
letting most of the configuration parameters take default values as
follows. For a custom configuration, see “Custom Configuration” on
page 34.
The steps described below assume that you don’t use SSL support with
LDAP-UX. If you want to enable SSL support, see “Custom
Configuration” on page 34.
Step 1. Log in as root and run the Setup program:
cd /opt/ldapux/config
./setup
The Setup program asks you a series of questions and usually provides
default answers. Press the Enter key to accept the default, or change the
value and press Enter. At any point during setup, enter Control-b to back
up or Control-c to exit setup.
Step 2. Choose Netscape Directory as your LDAP directory server (option 1).
Step 3. Enter either the host name or IP address of the directory server where
your profile exists, or where you want to create a new profile from
Appendix A, “Configuration Worksheet,” on page 183.
Step 4. Enter the port number of the previously specified directory server that
you want to store the profile from Appendix A, “Configuration
Worksheet,” on page 183. The default port number is 389.
Step 5. If the profile schema has already been imported, setup skips this step.
Otherwise, enter “yes” to extend the profile schema if the schema has not
been imported with LDAP-UX Client Services object class
DUAConfigProfile. See Appendix B, “LDAP-UX Client Services Object
Classes,” on page 187 for a detailed description of this object class.
Step 6. If the LDAP printer schema has already been extended, setup skips this
steps. Otherwise, enter “yes” to extend the LP printer schema if you
choose to start the printer configurator. The LDAP printer configurator is
a feature that simplifies the LP printer management by refreshing LP
Chapter 229
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Services
printer configurations on your client system. A new printer schema,
which is based on IETF<draft-fleming-ldap-printer-schema-02.txt>, is
required to start the services.
Step 7. If the publickey schema has already extended, setup skips this step.
Otherwise, enter “yes” to extend the publickey schema if you choose to
store the public keys of users and hosts in the LDAP directory. A
publickey schema, which is based on RFC 2307-bis is required to migrate
the publickeys in the NIS+ credential table entries on the NIS+ server to
the LDAP directory.
Step 8. If the new automount schema has already been imported, setup skips to
step 9.
Otherwise, you will be asked whether or not you want to install the new
automount schema which is based on RFC 2307-bis. Enter “yes” if you
want to import the new automount schema into the LDAP directory
server. Enter “no” if you do not want to import new automount schema
into the LDAP directory server. Setup skips to step 9 if you enter “no”.
Step 9. Next, if the setup program detects the obsolete automount schema exists
in the LDAP directory, it will prompt you for the information shown as
follows:
The obsolete automount schema exists in the directory.
If you still want to use the new automount schema, you must
perform the following steps:
1. Exit this program
2. Stop directory server
3. Remove the obsolete automount schema:
a. objectclass- automount
b. attribute-automountInformation
Note: for Netscape Directory Server, they are in
10rfc2307.ldif.
4. Start directory and re-run setup program to install the new
automount schema.
Do you still want to use the new automount schema? Press Yes
will exit this program. {YES]:
Reply “yes ” when asked do you still want to use the new automount
schema. If you reply yes, it will take you to exit this program. You must
re-run the setup program again to install the new automount schema
after you exit this program and manually delete the obsolete automount
Chapter 230
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Services
schema. For detailed information on how to remove the obsolete
automount schema, see “Removing The Obsolete Automount Schema” on
page 59.
If you reply no, setup skips to step 9 and the new automount schema
will not be imported.
Otherwise, you will be asked to enter the DN (Distinguished Name) and
password of the directory user who can import the schema into the LDAP
directory.
Step 10. If you are creating a new profile, add all parent entries of the profile DN
to the directory (if any). If you attempt to create a new profile and any
parent entries of the profile do not already exist in the directory, setup
will fail. For example, if your profile will be
cn=profile1,ou=profiles,o=hp,com, then ou=profiles,o=hp.com
must exist in the directory or setup will fail.
Step 11. Next enter either the DN of a new profile, or the DN of an existing profile
you want to use, from Appendix A, “Configuration Worksheet,” on
page 183.
To display all the profiles in the directory, use a command like the
following:
If you are using an existing profile, setup configures your client,
downloads the profile, and exits. In this case, continue with step 12
below.
Step 12. If you are creating a new profile, enter the DN and password of the
directory user who can create a new profile from Appendix A,
“Configuration Worksheet,” on page 183.
Step 13. Next, it will prompt you for the following information:
Select authentication method for users to bind/authenticate to
the server
1. SIMPLE
2. SASL DIGEST-MD5
To accept the default shown in brackets, press the Return key.
Authentication method: [1]:
Chapter 231
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Services
Press the return key if you choose to accept SIMPLE authentication
method, type 2 if you choose SASL DIGEST-MD5 authentication method
for the following prompt:
Authentication method: [1]:
Step 14. Next enter the host name and port number of the directory where your
name service data is, from Appendix A, “Configuration Worksheet,” on
page 183. For high availability, each LDAP-UX client can look for name
service data in up to three different directory hosts. You can enter up to
three hosts, to be searched in order.
Step 15. Enter the base DN where clients should search for name service data
from Appendix A, “Configuration Worksheet,” on page 183.
Step 16. You can quickly configure a Netscape directory and the first client by
accepting the remaining default configuration parameters when
prompted.
Table 2-1 shows the configuration parameters and the default values
they will be configured with.
Table 2-1Configuration Parameter Default Values
Parameter
Type of client bindingAnonymous
Bind time limit5 seconds
Search time limitno limit
Use of referralsYes
Profile TTL (Time To Live)0 - infinite
Use standard RFC-2307 object class attributes for
supported services
Use default search descriptions for supported servicesYes
Authentication methodSimple
Default
Value
Yes
Chapter 232
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Services
To change any of these default values, refer to “Custom Configuration”
on page 34.
Step 17. After entering all the configuration information, setup extends the
schema, creates a new profile, and configures the client to use the
directory.
Step 18. Configure the Pluggable Authentication Module (PAM).
Save a copy of the file /etc/pam.conf and edit the original to specify LDAP
authentication and other authentication methods you want to use. See
/etc/pam.ldap for a sample. You may be able to just copy /etc/pam.ldap to
/etc/pam.conf. See pam(3), pam.conf(4), and Managing Systems andWorkgroups at http://docs.hp.com/hpux for more information on PAM.
Step 19. Configure the Name Service Switch (NSS).
Save a copy of the file /etc/nsswitch.conf and edit the original to specify
the ldap name service and other name services you want to use. See
/etc/nsswitch.ldap for a sample. You may be able to just copy
/etc/nsswitch.ldap to /etc/nsswitch.conf. See nsswitch.conf(4) for more
information.
Step 20. Optionally, configure the Pam Authorization Service module
(pam_authz).
LDAP-UX Client Services provides a sample configuration file,
/etc/opt/ldapux/pam_authz.conf.template. This sample file shows
you how to configure the policy file to work with pam_authz. You can
copy this sample file and edit it using the correct syntax to specify the
access rules you wish to authorize or exclude from authorization. For
more detailed information on how to configure the policy file. see
“PAM_AUTHZ Login Authorization Enhancement” on page 109.
The sample /etc/pam.conf file in the man page will show you how to
configure the /etc/pam.conf file to work with pam_authz.For more
detailed information about pam_authz, refer to the pam_authz(5) man
page.
Step 21. Optionally configure the disable_uid_range flag.
Save a copy of the file /etc/opt/ldapux/ldapux_client.conf and edit the
original to activate the disable_uid_range flag. Uncomment the flag in
the [NSS] portion of the file and fill in the UID range. The format is
disable_uid_range=uid#,[uid#-uid#], .... where uid# stands for uid
number.
Chapter 233
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Services
For example: disable_uid_range=0-100,300-450,89
Note:
•White spaces between numbers are ignored.
•Only one line of the list is accepted, however, the line can be
wrapped.
•The maximum number of ranges is 20.
Step 22. “Verify the LDAP-UX Client Services” on page 68.
Step 23. Configure subsequent clients by running setup on those clients and
specifying an existing configuration profile. Or for a simpler process see
“Configure Subsequent Client Systems” on page 72.
Custom Configuration
Running the Setup program for a quick configuration, as described
above, configures your client using default values where possible. If you
would like to customize these parameters, proceed as follows.
If you want to use SSL, you must have the certificate database files,
cert7.db or cert8.db and key3.db, on your client system before you run the
custom configuration. See “Configure the LDAP-UX Client Serivces with
SSL Support” on page 41 for details.
Step 1. Perform the steps described in “Quick Configuration” on page 29.
However, after step 11, You will be asked whether you want to use SSL
or not. Enter “yes” to use SSL for the secure communication between
LDAP clients and the Netscape Directory Server. Enter “no” if you don’t
want to use SSL.
Step 2. Next, it will prompt you for selecting the authentication method for users
to bind/authenticate to the server.
You have a choice between SIMPLE (the default), or SASL DIGEST-MD5
if you choose to not enable SSL. However, you have a choice between
SIMPLE with SSL (the default), or SASL DIGEST-MD5 with SSL if you
choose to enable SSL.
If you select SASL DIGEST-MD5, two additional prompts will appear.
The first will prompt you for a user mapping (UID, DN, or Other). The
second will prompt you for a single realm to use when retrieving user
authentication information. If no realm is specified, user information will
be retrieved from the first realm the directory server offers.
Chapter 234
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Services
Step 3. Specify the host name and optional port number where your directory is
running. If you choose to not use SSL, the default directory port number
is 389. If you choose to use SSL, the default directory port number is 636.
For high availability, each LDAP-UX client can look for user and group
information in up to three different directory servers. You are able to
specify up to three directory hosts, to be searched in order.
Step 4. Reply “no” when asked if you want to accept the remaining default
configuration parameters.
Step 5. Select the client binding you want from Appendix A, “Configuration
Worksheet,” on page 183. This determines the identity that client
systems use when binding to the directory to search for user and group
information.
Step 6. If you configured a proxy user, enter the DN and password of your proxy
user, from Appendix A, “Configuration Worksheet,” on page 183.
Step 7. Enter the maximum time in seconds the client should wait for directory
searches before aborting. Enter 0 for no time limit.
Step 8. Enter whether or not you want directory searches to follow referrals.
Referrals are a redirection mechanism supported by the LDAP protocol.
Please see your directory manuals for more information on referrals.
NOTEIf you want your directory searches to follow referrals, you must allow
anonymous access into your directories.
Step 9. Enter the Profile TTL (Time To Live) value. This value defines the time
interval between automatic downloads (refreshes) of new configuration
profiles from the directory. Automatic refreshing ensures that the client
is always configured using the newest configuration profile.
If you want to disable automatic refresh or manually control when the
refresh occurs, enter a value of 0. See “Download the Profile Periodically”
on page 74.
Step 10. Next, the setup program will prompt you for the following information:
LDAP-UX Client Services supports the following services:
Each services uses a standard object class (defined by RFC
2307)
You can remap any of these attributes to alternate attributes
Do you want to remap any of the standard RFC 2307 attributes?
Enter whether or not you want to remap the standard object class
attributes to alternate attributes. You need to do this if your user and
group data do not conform to the object classes defined in RFC 2307,
posixAccount, posixGroup, shadowAccount, and so forth.
You can remap the attributes for any of the supported services: passwd,
shadow passwd, group, PAM, netgroup, rpc, protocols, networks, hosts,
automount and services. Select the service you want to remap. Then
select the attribute you want to remap and enter the new attribute
name. For example, you might map the standard UNIX user id number
attribute uidnumber to an employeeID attribute.
11.Automount
By default, LDAP-UX Client Services uses the RFC2307-bis automount
schema. The nisObject automount schema can also be used if
configured via attribute mappings.
Use the following steps if you want to remap the automount attributes to
the nisObject automount attributes:
1. Enter yes for the following question:
Do you want to remap any of the standard RFC 2307
attributes? [yes]: yes
2. If you want to select the automount service, then enter 11 for the
following question and press the return key:
Specify the service you want to map? [0]:11
3. Next, it will take you to the screen which shows you the following
information:
Current Automount attribute names:
Chapter 236
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Services
1.automountMapName ->[automountMapname]
2.automountKey -> [automountKey]
3.automountInformation -> [automountInformation]
Specify the attribute you want to map. [0]:
You type 1 for the following question and press the return key:
Specify the attribute you want to map. [0]:1
4. Next, type the attribute nisMapName that you want to map to the
automountMapName attribute for the following question and press
the return key:
automountMapName -> nisMapName
5. Next, it will take you to the screen which shows you the following
information:
Current Automount attribute names:
1.automountMapName ->[nisMapname]
2.automountKey -> [automountKey]
3.automountInformation -> [automountInformation]
Specify the attribute you want to map. [0]:
If you want to specify the attribute to map to the automountKey
attribute , then type 2 for the following question and press the return
key:
Specify the attribute you want to map. [0]:2
6. Next, type the attribute cn you want to map to the automountKey
attribute and press the return key:
automountKey -> cn
7. Next, it will take you to the screen which shows you the following
information:
Current Automount attribute names:
1.automountMapName ->[nisMapname]
2.automountKey -> [cn]
3.automountInformation -> [automountInformation]
Specify the attribute you want to map. [0]:
Chapter 237
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Services
If you want to specify the attribute to map to the
automountInformation attribute , then type 3 for the following
question and press the return key:
Specify the attribute you want to map. [0]:3
8. Next, type the attribute nisMapEntry you want to map to the
automountInformation attribute and press the return key:
automountInformation -> nisMapEntry
9. Next, it will take you to the screen which shows you the following
information:
Current Automount attribute names:
1.automountMapName ->[nisMapname]
2.automountKey -> [cn]
3.automountInformation -> [nisMapEntry]
Specify the attribute you want to map. [0]:
You type 0 to exit this menu for the following question:
Specify the attribute you want to map. [0]:0
If you will be configuring X.500 group membership support, you should
remap the group member attribute (to member or uniquemember) instead
of using the default.
NOTEMake sure that the attribute name is typed in correctly to avoid
unpredictable results later on.
See RFC 2307 at http://www.ietf.org/rfc/rfc2307.txt for a description of
the standard object classes and attributes.
Optionally, you may set up X.500 by executing the following steps:
1. #cd /opt/ldapux/config/
2. Execute the setup program:
#./setup
For the question:
Accept remaining defaults? (y/n) [y]: N
Answer “N” instead of the default “Y”
Chapter 238
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Services
3. For the question:
Do you want to remap any of the standard RFC 2307
attributes? [No]: Y
Answer “Y” instead of the default “N”
4. For the question:
Specify the service you want to map? [0]: 3
Answer “3”
5. For the question:
Specify the attribute you want to map? [0]: 3
Answer “3”
6. Type the attributes you want to map to the member attribute:
[memberuid]: member
NOTELDAP-UX supports DN-based (X.500 style) membership syntax. This
means that you do not need to use the memberUid attribute to define
the members of a POSIX group. Instead, you can use either the
member or uniqueMember attribute. LDAP-UX can convert from the
DN syntax to the POSIX syntax (an account name).
For Netscape Directory Server, the typical member attribute would
be either memberUid, member or uniqueMember.
7. Follow the prompts to finish the setup.
Step 11. Next, the setup program will prompt you the following information:
LDAP-UX Client Services supports the following services:
You can create up to three custom search descriptors for each
name service to search different locations in the directory for
user and group information.
Do you want to create custom search descriptors? [No]:
Chapter 239
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Services
Enter whether or not you want to create custom search descriptors for
any of the supported services: passwd, shadow passwd, group, PAM,
netgroup, rpc, protocols, network, hosts and services. Select the service
you want to create a custom search descriptor for.
A custom search descriptor consists of three parts: a search base DN,
scope, and filter. Use custom search descriptors if you want clients to
search different locations in the directory or to apply different search
filters, for example some clients might search for employees only in a
particular department. Each service can have up to three different
search descriptors. The client uses the search descriptors in order until it
finds what it is looking for.
NOTEIf your search filters overlap, enumeration requests will result in
duplicate entries being returned. For example, if one search filter
searched a subset of your organization and a second search filter
searched your entire organization, an enumeration request would return
duplicate entries.
See “Minimizing Enumeration Requests” on page 125 for more
information.
LDAP-UX Client Services uses the automount search filter for the
automount service as default. If you want to create the nisObject
search filter for the automount service to search a different location in
the directory, use the following steps:
1. Type yes for the following question and press the return key:
Do you want to create custom search descriptors? [No]: yes
2. Next, it will take you to the screen which shows you the following
information:
To accept the default shown in brackets, press the Return
key.
search base [dc=cup,dc=hp,dc=com]:
search scope (base, one, sub) [sub]
Search filter [(objectclass=automount)]
Chapter 240
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Serivces with SSL Support
If you want to create the nisObject search filter for the automount
service, then type (objectclass=nisObject) for the following
prompt and press the Return key; otherwise press the return key to
accept the default search filter, objectclass=automount:
Search filter [(objectclass=automount)]:
(objectclass=nisObject)
Step 12. You will be asked whether or not you want to start the client daemon. For
LDAP-UX Client B.03.20 or later versions, the client daemon must be
started for LDAP-UX functions to work. With LDAP-UX Client B.30.10
or earlier, the client daemon is optional, and should be turned on in order
to provide better prformance (response time) and for the X.500 group
membership to work.
Configure the LDAP-UX Client Serivces with
SSL Support
The LDAP-UX Client Services provides SSL (Secure Socket Layer)
support to secure communication between the LDAP client and the
Directory Server. The LDAP-UX Client Services supports SSL with
password as the credential, using either simple bind or DIGEST-MD5
authentication (DIGEST-MD5 for Netscape Directory Server only) to
ensure confidentiality and data integrity between clients and servers.
With SSL support, the LDAP-UX Clients provides a secure way to
protect the password over the network, This allows the directory
administrator has the choice in selecting authentication mechanism,
such as using simple password stored in the directory server as a hash
syntax.
The LDAP-UX Client Services supports Microsoft Windows 2000/2003
Active Directory Server (ADS) and Netscape Directory Server (NDS)
over SSL. For detailed information on how to set up and configure your
Netscape Directory Server to enable SSL communication over LDAP, see
“Managing SSL Chapter” in the Administrator’s Guide for Netscape
Directory Server at http://www.redhat.com/docs/manuals/dir-server/
Chapter 241
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Serivces with SSL Support
Configuring the LDAP-UX Client to Use SSL
You can choose to enable SSL with LDAP-UX when you run the setup
program. If you attempt to use SSL, you must install Certificate
Authority (CA) certificate on your LDAP-UX Client and configure your
LDAP directory server to support SSL before you run the setup program.
NOTEIf you already have the certificate database files, cet7 or cert8.db and
key3.db, on your client for your HP-UX applications, you can simply
create a symbolic link /etc/opt/ldapux/cert7.db that points to cert7.db
or /etc/opt/ldapux/cert8.db that points to cer8.db and
/etc/opt/ldapux/key3.db that points to key3.db.
You can Download the certificate database from the Netscape
Communicator or Mozilla browser to set up the certificate database into
your LDAP-UX Client.
Steps to Download the CA Certificate from Mozilla Browser
The following steps show you an example on how to download the
Certificate Authority (CA) certificate on your client system using Mozilla
browser 1.4 for HP-UX:
Step 1. Log in to your system as root.
Step 2. Use Mozilla browser to connect to your Certificate Authority Server.
The following shows an example of using a link to connect to your
Certificate Authority Server:
https://CA servername:port number/ca/
Step 3. Click the retrieval tab in the Netscape certificate management window
screen.
Step 4. Click the “import CA certificate chain” link to take you to the “import CA
certificate chain” window screen.
Step 5. Check the “import the CA certificate chain into your browser” check box
in the “import CA certificate chain” window screen. Then, click the
submit button.
Chapter 242
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Serivces with SSL Support
Step 6. Check the “Trust the CA to identify web sites”, “Trust the CA to identify
e-mail users”, and “Trust the CA to identify software developers”
checkboxes in the Downloading Certificate window screen. Then click OK
button.
Step 7. The Netscape Directory CA certificate will be downloaded to the
following two files on your LDAP-UX Client:
/.mozilla/default/*.slt/cert8.db
/.morilla/default/*.slt/key3.db
Step 8. You can simply copy the /.mozilla/default/*slt/cert8.db file to
/etc/opt/ldapux/cert8.db and /.mozilla/default/*slt/key3.db file to
/etc/opt/ldapux/key3.db.
Step 9. Set the file access permissions for/etc/opt/ldapux/cert7..db and
/etc/opt/ldapux/key3.db to be read only by root as follows:
-r-------- 1 root sys 65536 Jun 14 16:27 \
/etc/opt/ldapux/cert8.db
-r-------- 1 root sys 32768 Jun 14 16:27 \
/etc/opt/ldapux/key3.db
NOTEYou may use the unsupported /opt/ldapux/contrib/bin/certutil
command line tool to create the certificate database files, cert8.db and
key3.db. For detailed command options and their arguments, see Using
the Certificate Database Tool available at
http://www.mozilla.org/projects/security/pki/nss/tools/certutil.html.
NOTEIf your browser does not generate cert7.db or cert8.db and key3.db
security database files, you must export the certificate (preferably the
root certificate of the Certificate Authority that signed the LDAP server’s
certificate) from your certificate server as a Base64-Encoded certificate
and use the certutil utility to create the cert8.db and key3.db
security database files.
Chapter 243
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Serivces with SSL Support
Steps to create database files using the certutil utility
The following steps show you an example on how to create the security
database files, cert8.db and key3.db on your client system using the
certutil utility:
Step 1. Retrieve the Base64-Encoded certificate from the certificate server and
save it.
For example, get the Base64-Encoded certificate from the certificate
server and save it as the /tmp/mynew.cert file. This file should look
like:
--------------- BEGIN CERTIFICATE ------------------------------------
Step 4. Add the Certificate Authority (CA) certificate or the LDAP server’s
certificate to the security database:
•To use the certutil command to add a CA certificate to the
database:
For example, the following command adds the CA certificate,
my-ca-cert, to the security database directory, /etc/opt/ldapux,
with the Base64-Encoded certificate request file, /tmp/mynew.cert:
/opt/ldapux/contrib/bin/certutil -A -n my-ca-cert -t \
"C,," -d /etc/opt/ldapux -a -i /tmp/mynew.cert
Chapter 244
Installing And Configuring LDAP-UX Client Services
Configure the LDAP-UX Client Serivces with SSL Support
NOTEThe -t "C,," represents the minimum trust attributes that may be
assigned to the CA certificate for LDAP-UX to successfully use SSL
to connect to the LDAP directory server. If you have other
applications that use the CA certificate for other functions, then you
may wish to assign additional trust flags. See
http://www.mozilla.org/projects/security/pki/nss/tools/certutil.ht
ml for additional information.
•To use the certutil command to add the LDAP server’s certificate
to the security database:
For example, the following command adds the LDAP server’s
certificate, my-server-cert, to the security database directory,
/etc/opt/ldapux, with the Base64-Encoded certificate request file,
/tmp/mynew.cert:
/opt/ldapux/contrib/bin/certutil -A -n my-server-cert -t \
"P,," -d /etc/opt/ldapux -a -i /tmp/mynew.cert
NOTEThe -t "p,," represents the minimum trust attributes that may be
assigned to the LDAP server’s certificat for LDAP-UX to successfully
use SSL to connect to the LDAP directory server. See
http://www.mozilla.org/projects/security/pki/nss/tools/certutil.ht
ml for additional information.
Chapter 245
Installing And Configuring LDAP-UX Client Services
Configure LDAP-UX Client Services with Publickey Support
Configure LDAP-UX Client Services with
Publickey Support
LDAP-UX Client Services B.04.00 or later version supports discovery
and management of publickeys in an LDAP directory. Both public and
secret keys, used by the Secure RPC API can be stored in user and host
entries in an LDAP directory server, using the nisKeyObject
objectclass. Support for discovery of keys in an LDAP directory server is
provided through the getpublickey() and getsecretkey() APIs. You
can use chkey and newkey commands to manage user and host keys in
an LDAP server. The chkey -s ldap command is used to change user’s
secure RPC public key and secret key in an LDAP directory. The newkey
-u <username> -s ldap command is used to add new keys for users to
an LDAP directory while the newkey -h <hostname> -s ldap command
is used to create new keys for machines to an LDAP directory.
For detailed information on the newkey and chkey commands, refer to
newkey(1M), chkey(1), getpublickey(3N), getsecretkey() and
publickey(4) man pages.
HP-UX Enhanced Publickey-LDAP Software
Requirement on HP-UX 11i v1 or v2
Support for publickey through LDAP requires functionality
enhancement in LDAP-UX Client Services and an enhancement in the
ONC product. ONC with publickey LDAP support is available through
the HP-UX Enhanced Publickey-LDAP Software Pack (SPK) web
release.
To enable the publickey LDAP support, you must install the Enhanced
Publickey-LDAP software bundle shown on Table 2-2 and LDAP-UX
Client Services B.04.00 or later on your client systems. The software
bundle contains all the required patches plus the enablement product for
this new feature. On HP-UX 11i v3, the software bundle is not required.
For detailed information, refer to the ONC with Publickey LDAP SupportSoftware Pack Release Notes at the following web site:
http://docs.hp.com/en/netcom.html
Chapter 246
Installing And Configuring LDAP-UX Client Services
Configure LDAP-UX Client Services with Publickey Support
Navigate to NFS Services.
Table 2-2Enhanced Publickey-LDAP Software for HP-UX 11i v1 or v2
Operating System
Supported
HP-UX 11i v1Enhkey B.11.11.01June, 2006
HP-UX 11i v2Enhkey B.11.23.01October, 2006
You can download the Enhanced Publickey-LDAP software bundle from
the following Software Depot web site:
•Go to http://www.hp.com/go/softwaredepot
•Click on the Enhancement releases and patch bundles link.
•Select one of the following links:
— HP-UX Software Pack (Optional HP-UX 11i v1 Core
Enhancements) for HP-UX 11i v1
and then select
HP-UX Public Key LDAP link for HP-UX 11i v1
Select and download the following software bundle, place it to
your client system, /tmp is assumed:
Enhkey B.11.11.01 HP-UX B.11.11 64+32 depot for HP-UX
11i v1
Software Bundle
Version
Planned Release
Date
— HP-UX Software Pack (Optional HP-UX 11i v2 Core
Enhancements) for HP-UX 11i v2
and then select
PublicKey-LDAP link for HP-UX 11i v2
Select and download the following software bundle, place it to
your client system, /tmp is assumed:
Enhkey B.11.23.01 HP-UX B.11.23 IA+PA depot for HP-UX
11i v2
•Use swinstall to install the software bundle:
Chapter 247
Installing And Configuring LDAP-UX Client Services
Configure LDAP-UX Client Services with Publickey Support
— swinstall -x autoreboot=true -s
/tmp/ENHKEY_B.11.11.01_HP-UX_B.11.11_64_32.depot for
/tmp/ENHKEY_B.11.23.01_HP-UX_B.11.23_IA_PA.depot for
HP-UX 11i v2
Extending the Publickey Schema into Your Directory
The publickey schema is not loaded in the Netscape Directory Server. If
you are installing LDAP-UX B.04.00 or later version on your client
system, the setup program will extend the publickey schema into your
Netscape Directory Server. If you previously configured LDAP-UX
B.03.30 or earlier version, and now update the product to version B.04.00
or later, you must re-run the setup program to extend the publickey
schema into your LDAP directory. You do not need to re-run the setup
program for the subsequent client systems. For detailed information on
how to run the setup program to extend the publickey schema into an
LDAP directory, see “Quick Configuration” on page 29.
Admin Proxy User
A special type of proxy user, known as an Admin Proxy has been added to
LDAP-UX to support management of publickey information in an LDAP
directory server. The Admin Proxy represents the HP-UX
administrator’s rights in the directory server and typically is used to
represent root’s privileges extended to the directory server. Only an
Admin Proxy user is allowed to use the newkey tool to add host and user
keys into the LDAP directory server, or to use the chkey tool to modify
host keys in the LDAP directory server.
Configuring an Admin Proxy User Using ldap_proxy_config
You need to use a new ldap_proxy_config tool option -A to configure
an Admin Proxy user. You must specify the -A option along with other
options to perform operations applying to an Admin Proxy user. For
example, you can use the ldap_proxy_config -A -i command to
create an Admin Proxy user. See “The ldap_proxy_config Tool” on
page 146 for details.
Chapter 248
Installing And Configuring LDAP-UX Client Services
Configure LDAP-UX Client Services with Publickey Support
Password for an Admin Proxy User
In order to protect user’s secret keys in the LDAP directory, the secret
keys are encrypted using the user’s password. This process is used in
NIS as well as NIS+ environments. The host’s secret key must also be
encrypted. Since the host itself does not have its own password, root’s
password is used to encrypt the host’s secret key. The chkey or newkey
command prompts for root’s password when changing or adding a key for
a host. For this reason, you may wish to configure the Admin Proxy user
in the LDAP directory to have the same password as the root user on the
master host. Although it is not required that the Admin Proxy user and
root user share the same password, it allows you to avoid storing the
Admin Proxy user’s password in the /etc/opt/ldapux/acred file. In
such case, when you run the ldap_proxy_config -A -i command to
configure the Admin Proxy user, you enter only Admin Proxy user’s DN
without the password. LDAP-UX will use the root’s password given to
the chkey and newkey commands as the Admin Proxy user’s password to
perform public key operations. However, the ldap_proxy_config -A -v
command will not be able to validate the Admin Proxy user because no
password is available to ldap_proxy_config. As a result, the message
"No password is provided. Validation is not performed” will be
displayed.
Setting ACI for Key Management
Before storing public keys in an LDAP server, LDAP administrators may
wish to update their LDAP access controls such that users can manage
their own keys, and the Admin Proxy user can manage host keys. This
section describes how you set up access control instructions (ACI) for an
Admin Proxy user or a user.
Setting ACI for an Admin Proxy User
With Netscape Directory Server 6.11 and 6.21, you can use the Netscape
Console or ldapmodify to set up ACI, which gives an Admin Proxy user
permissions to manage host and user keys in the LDAP directory.
An Example
The following ACI gives the permissions for the Admin Proxy user
uid=keyadmin to read, write, and compare nissecretkey and
nispublickey attributes for hosts and users:
dn:dc=org,dc=hp,dc=com
Chapter 249
Installing And Configuring LDAP-UX Client Services
Configure LDAP-UX Client Services with Publickey Support
The default ACI of Netscape Directory Server 6.11 allows a user to
change his own nispublickey and nissecretkey attributes. For
Netscape Directory Server 6.21, you need to set up ACI which gives a
user permission to change his own nissecretkey and nispublickey
attributes. Use the Netscape Console or ldapmodify to set up ACI for a
user.
An Example
The following ACI gives a user permission to change his own
nissecretkey and nispublickey attributes for user keys:
serviceAuthenticationMethod is a newly supported attribute of the
configuration profile, /opt/ldapux/ldapux_profile.ldif. It’s function
is the same as authenticationMethod, but it allows authentication
configuration for specific name services. The
serviceAuthenticationMethod attribute is created to resolve issues
that may arise when the default authentication method is not considered
secure enough for specific name services. For example, if the default
authenticationMethod is configured as NONE then the newkey and
chkey commands would not know how to properly bind to the directory
server when changing or adding key pairs. LDAP-UX only supports the
serviceAuthenticationMethod attribute for the keyserv service, since
the keyserv service is the only one that currently needs modification of
privileges in the directory server.
To perform newkey and chkey operations, LDAP-UX binds the Admin
Proxy user to the LDAP directory using the authentication method
specified in serviceAuthenticationMethod. LDAP-UX only supports
serviceAuthenticationMethod for keyserv. Any other services
configured in serviceAuthenticationMethod will be ignored.
Chapter 250
Installing And Configuring LDAP-UX Client Services
Configure LDAP-UX Client Services with Publickey Support
Configuring serviceAuthenticationMethod is optional. If you do not
configure serviceAuthenticationMethod, LDAP-UX binds the Admin
Proxy user to the LDAP directory using the authentication method
specified for the proxy user.
Authentication Methods
LDAP-UX Client Services supports the following authentication methods
for the keyserv service:
•simple with SSL enabled
•SASL DIGEST-MD5 with SSL enabled
•simple with SSL disabled
•SASL DIGEST-MD5 with SSL disabled
NOTESSL settings for both authenticationMethod and
serviceAuthenticationMethod must be set the same. It is not
supported to have SSL enabled for authenticationMethod and SSL
disabled for serviceAuthenticationMethod, or vice versa.
Procedures Used to Configure serviceAuthenticationMethod
Use the following steps on one of LDAP-UX client sytems to configure the
serviceAuthenticationMethod attribute in the
/etc/opt/ldapux/ldapux_profile.ldif file:
Step 1. Login as root.
Step 2. Use the ldapentry tool to modify the profile entry in the LDAP directory
server to include serviceAuthenticationMethod. To do this,
ldapentry requires the profile DN. You can find the profile DN from
PROFILE_ENTRY_DN in /etc/opt/ldapux/ldapux_client.conf after
you finish running the setup program. The following example edits the
profile entry "cn=ldapuxprofile,dc=org,dc=hp,dc=com":
Configure LDAP-UX Client Services with Publickey Support
After you enter the prompts for "Directory login:" and "password:",
ldapentry will bring up an editor window with the profile entry. You can
add the serviceAuthenticationMethod attribute.
The value of the serviceAuthenticatioMethod entry depends on the
authentication method you configure. The following shows the possible
values of the serviceAuthenticationMethod attribute:
•For SASL DIGEST-MD5 using the Distinguish Name (DN) to
generate the DIGEST-MD5 hash, the data in the entry is:
•For simple authentication, the data in the entry is:
serviceAuthenticationMethod:keyserv:simple
•For simple with SSL enabled, the data in the entry is:
serviceAuthenticationMethod:keyserv:tls:simple
For more information on ldapentry, refer to Chapter 5, “Command and
Tool Reference,” on page 137.
Step 3. Go to /opt/ldapux/config:
cd /opt/ldapux/config
Step 4. Use /opt/ldapux/config/get_profile_entry to download the
modified LDIF profile:
Chapter 252
Installing And Configuring LDAP-UX Client Services
Configure LDAP-UX Client Services with Publickey Support
./get_profile_entry -s nss
Step 5. Run the /opt/ldapux/config/display_profile_cache tool to check
the configuration of the serviceAuthenticationMethod attribute:
./display_profile_cache
For example:
If the serviceAuthenticationMethod:keyserv:sasl/digest-md5
entry is added to the profile entry in the LDAP directory, you can see the
following information when you run the display_profile_cache tool:
For subsequent LDAP-UX client systems that share the same profile
configuration, use the following steps to download and activate the
profile:
Step 1. Login as root.
Step 2. Go to /opt/ldapux/config:
cd /opt/ldapux/config
Step 3. Use /opt/ldapux/config/get_profile_entry to download the
modified LDIF profile:
./get_profile_entry -s nss
Step 4. Run the /opt/ldapux/config/display_profile_cache tool to check
the configuration of the serviceAuthenticationMethod attribute:
./display_profile_cache
Configuring Name Service Switch
Configure the Name Service Switch (NSS) to enable the LDAP support
for publickey.
You can save a copy of /etc/nsswitch.conf file and modify the original
to add ldap support to the publickey service. See /etc/nsswitch.ldap
for a sample.
The following shows the sample file, /etc/nsswitch.ldap:
Chapter 253
Installing And Configuring LDAP-UX Client Services
Configure LDAP-UX Client Services with Publickey Support
AutoFS is a client-side service that automatically mounts appropriate
file systems when users request access to them. If an automounted file
system has been idle for a period of time, AutoFS unmounts it. AutoFS
uses name services such as files, NIS or NIS+ to store and manage
AutoFS maps.
LDAP-UX Client Services B.04.00 supports the automount service under
the AutoFS subsystem. This new feature allows users to store AutoFS
maps in an LDAP directory server. .
AutoFS Patch Requirement
In order to enable the LDAP support for AutoFS, you must install the
AutoFS patch or Enhanced AutoFS version on your client system shown
in Table 2-3:
Table 2-3Patch Requirement
Installing And Configuring LDAP-UX Client Services
AutoFS Support
Operating System
Supported
HP-UX 11i v1Enhanced AutoFS
HP-UX 11i v2PHNE_33100August, 2005
Patch ID/Version
version B.11.11.0509.1
Planned Release
Date
September, 2005
Automount Schemas
This section describes the following three automount schemas:
• new automount schema
An automount schema is based on RFC 2307-bis. This schema
defines new automountMap and automount structures to represent
the AutoFS maps and their entries in the LDAP directory.
•nisObject automount schema
Chapter 255
Installing And Configuring LDAP-UX Client Services
AutoFS Support
The nisObject automount schema defines nisMap and nisObject
structures to represent the AutoFS maps and their entries in the
LDAP directory. There are some limitations that you need to be
aware of when using the nisObject automount schema.
•obsolete automount schema
This is the schema that is shipped with Netscape Directory Server
version 6.x.
The LDAP-UX Client Services supports the new automount schema. The
nisObject automount schema can also be used if configured via
attribute mappings. LDAP-UX does not support the obsolete automount
schema. You must manually delete it before the setup program can
successfully import the new automount schema into the LDAP directory
server.
Read subsequent sections of this chapter for the detailed information
about the automount schemas.
New Automount Schema
This schema is a new schema defined in RFC2307-bis. This schema
defines new automountMap and automount structures to represent
AutoFS maps and their entries in the LDAP directory. AutoFS maps are
stored in the LDAP directory server using structures defined by this
schema.
The RFC2307-bis automount schema is not loaded in the Netscape
Directory Server. If you are installing LDAP-UX B.04.00 on your client
system, the setup program will import the new automount schema into
your Netscape Directory Server. If you previously configured LDAP-UX
B.03.30 or an earlier version, and are now updating the product to
version B.04.00, you must re-run the setup program to import the new
automount schema into the LDAP directory. The subsequent client
systems do not need to re-run the setup.
Schema
The following shows the RFC 2307-bis automount schema in the LDIF
format:
objectClasses: ( 1.3.6.1.1.1.2.16
NAME ’automountMap’
DESC ’Automount Map information’
SUP top STRUCTURAL
MUST automountMapName
Chapter 256
Installing And Configuring LDAP-UX Client Services
MAY description
X-ORIGIN ’user defined’ )
objectClasses: ( 1.3.6.1.1.1.2.17
NAME ’automount’
DESC ’Automount information’
SUP top STRUCTURAL
MUST ( automountKey $ automountInformation )
MAY description
X-ORIGIN ’user defined’ )
For Netscape Directory Server, each entry started by “attributetypes:”
or “objectclasses:” must be one continuous line.
An Example
The following shows an example of a direct AutoFS map, auto_direct,
stored in the LDAP directory server using new automount schema:
dn:automountMapName=auto_direct,dc=nishpind
objectClass: top
objectClass: automountMap
automountMapName: auto_direct
Chapter 257
Installing And Configuring LDAP-UX Client Services
AutoFS Support
dn:automountKey=/mnt_direct/test1,\
automountMapname=auto_direct, dc=nishpind
objectClass: top
objectClass: automount
automountInformation:hostA:/tmp
automountKey: /mnt_direct/test1
dn:automountKey=/mnt_direct/test2,\
automountMapname=auto_direct, dc=nishpind
objectClass: top
objectClass: automount
automountInformation:hostB:/tmp
automountKey:/mnt_direct/test2
The nisObject Automount Schema
The nisObject automount schema defines nisMap and nisObject
structures to represent the AutoFS maps and their entries. The AutoFS
maps are stored in the LDAP directory server using the nisMap and
nisObject structures.
An Example
The following shows an example of a direct AutoFS map, auto_direct,
stored in the LDAP directory server using the nisObject automount
schema:
dn:nisMapName=auto_direct,dc=nishpind
objectClass: top
objectClass: nisMap
nisMapName: auto_direct
The nisObject automount schema contains three attributes, cn,
nisMapEntry and nisMapName. cn is an attribute that ignores
case-matching. Consider the following example:
# an indirect map named auto_test
test1server1:/source
TEST1server2:/source
In the above example, because the cn attribute is case-insensitive, the
LDAP considers “cn=TEST1, nisMapName=auto_test” to be a
redefinition of “cn=test1, nisMapName=auto_test”.
Using the nisObject automount map schema, capital letters are not
significant. In other words, if two keys have names that are only
different by the use of capital letters, then one of those entries will be
rendered inoperable because the other one is the only one that can be
retrieved.
NOTEIf you use the nisObject automount map schema, do not use any keys
that have capital letters and only differ from other keys by those capital
letters.
Obsolete Automount Schema
The obsolete automount schema is shipped with the Netscape Directory
Server version 6.x. You must manually delete it before the setup program
can successfully import the new automount schema into the LDAP
directory server.
Removing The Obsolete Automount Schema
Perform the following steps to delete the obsolete automount schema:
Step 1. Login to your Netscape Directory Server as root.
Step 2. Stop your Netscape Directory Server daemon, slapd.
/var/opt/netscape/servers/slapd-<server-instance>/ \
config/schema/10rfc2307.ldif file. These two entries contain the
‘automountInformation’ attributetype and the ‘automount’ objectclass.
The data in these two entries define the obsolete automount schema. The
complete two entries are:
After you delete the obsolete automount schema, you must re-run the
setup program to import the new automount schema into the LDAP
directory server.
Attribute Mappings
LDAP-UX Client Services B.04.00 supports attribute mappings between
the new RFC 2307-bis automount schema and the nisObject automount
schema. This feature allows the directory administrators to use the
nisObject schema if they have already deployed it.
When both new automount schema and nisObject schema exist in the
LDAP directory server, if you choose to use the nisObject automount
schema, you must run the setup program using the custom configuration
to perform the attribute mappings and search filter changes for the
automount service. The attribute mappings include the following:
•Remap the new automount attributes to the nisObject automount
attributes. The attribute mappings are done in step 10 of the Custom
Configuration. For detailed information on how to remap the
automunt attributes, see “Custom Configuration” on page 34.
Chapter 260
Table 2-3 shows the attribute mappings:
Table 2-4Attribute Mappings
Installing And Configuring LDAP-UX Client Services
AutoFS Support
New Automount Attribute
automountMapnamenisMapname
automountKeycn
automountInformationnisMapEntry
•Change the automount search filter for the automount service to the
nisObject search filter. LDAP-UX Client Services uses the
automount search filter for the automount service as a default. The
search filter change can be done in step 11 of the Custom
Configuration. If you want to create the nisObject search filter for
the automount service to search a different location in the LDAP
directory server, see “Custom Configuration” on page 34 for details.
If you want to perform attribute mappings or search filter changes by
using the Custom Configuration, ensure that you do not accept the
remaining default configuration parameters in step 4 of the Custom
Configuration.
NOTEYou can use the nisObject automount schema without attribute
mappings and search filter changes if only the nisObject automount
schema exists in the LDAP directory.
nisObject Automount
Attribute
Configuring Name Service Switch
Configure the Name Service Switch (NSS) to enable the LDAP support
for AutoFS.
You can save a copy of /etc/nsswitch.conf file and modify the original
to add LDAP support to the automount service. See
/etc/nsswitch.ldap for a sample.
The following shows the sample file, /etc/nsswitch.ldap:
This section describes the migration scripts which can be used to migrate
your AutoFS maps from files, NIS servers or NIS+ servers to LDIF files.
After LDIF files are created, you can use the ldapmodify tool to import
LDIF files to your LDAP directory server. These migration scripts use
the new automount schema defined in RFC 2307-bis to migrate the
AutoFS maps to LDIF. You need to import the new automount schema
into your LDAP directory server before you use these migration scripts to
migrate AutoFS maps.
Table 2-4 describes the migration scripts:
Table 2-5Migration Scripts
Migration ScriptDescription
migrate_automount.plMigrates AutoFS maps from files to
migrate_nis_automount.plMigrates AutoFS maps from the NIS
migrate_nisp_autofs.plMigrates AutoFS maps from NIS+
Environment Variables
When you use the AutoFS migration scripts to migrate AutoFS maps, set
the following environment variables:
LDAP_BASEDNThe base distinguished name of the LDAP directory
that the AutoFS maps are to be placed in.
LDIF.
server to LDIF.
server to the nisp_automap.ldif file.
Chapter 262
Installing And Configuring LDAP-UX Client Services
AutoFS Support
DOM_ENVThis only applies to the migrate_nisp_autofs.pl
script. This variable defines the fully qualified name of
the NIS+ domain where you want to migrate your data
from.
NIS_DOMAINNAME This only applies to the migrate_nis_automount.pl
script. This variable specifies the fully qualified name
of the NIS domain where you want to migrate your
data from. This variable is optional. If the NIS domain
name is not specified, LDAP-UX uses the value of the
NIS_DOMAIN parameter configured in the
/etc/rc.conf.d/namesvrs file.
Examples:
The following command sets the fully qualified name of the NIS+ domain
to “cup.hp.com”:
export DOM_ENV=”cup.hp.com”
The following command sets the fully qualified name of the NIS domain
to “india.hp.com”:
export NIS_DOMAINNAME=”india.hp.com”
The following command sets the base DN to “dc=cup, dc=hp, dc=com”:
export LDAP_BASEDN=”dc=cup, dc=hp, dc=com”
General Syntax For Migration Scripts
The migration scripts use the following general syntax:
scriptname inputfile outfile
where
scriptname
inputfile
Is the name of the particular script you are using.
Is the fully qualified file name of the appropriate
AutoFS map that you want to migrate. For example,
/etc/auto_master.
outputfile
This only applies to the migrate_nis_automount.pl
and migrate_automount.pl scripts. This is optional
and is the name of the file where the LDIF is written.
stdout is the default output.
Chapter 263
Installing And Configuring LDAP-UX Client Services
AutoFS Support
The migrate_automount.pl Script
This script, found in /opt/ldapux/migrate, migrates the AutoFS maps
from files to LDIF.
Syntax
scriptname inputfile outputfile
Examples
The following commands migrate the AutoFS map /etc/auto_direct
to LDIF and place the results in the /tmp/auto_direct.ldif file:
#local mount pointremote server:directory
/mnt/direct/lab1hostA:/tmp
/mnt/direct/lab2hostB:/tmp
The following shows the /tmp/auto_direct.ldif file:
dn:automountMapName=auto_direct,dc=nishpind
objectClass: top
objectClass: automountMap
automountMapName: auto_direct
dn:automountKey=/mnt_direct/lab1,\
automountMapname=auto_direct, dc=nishpind
objectClass: top
objectClass: automount
automountInformation:hostA:/tmp
automountKey: /mnt_direct/lab1
dn:automountKey=/mnt_direct/lab2,\
automountMapname=auto_direct, dc=nishpind
objectClass: top
objectClass: automount
automountInformation:hostB:/tmp
automountKey:/mnt_direct/lab2
Chapter 264
Installing And Configuring LDAP-UX Client Services
AutoFS Support
You can use the /opt/ldapux/bin/ldapmodify tool to import the LDIF
file /tmp/auto_direct.ldif that you just created above into the LDAP
directory. For example, the following command imports the
/tmp/auto_direct.ldif file to the LDAP base DN “dc=nishpind” in
the LDAP directory server LDAPSERV1:
#local mount pointremote server:directory
lab1hostA:/tmp
lab2hostB:/tmp
The following shows the /tmp/auto_indirect.ldif file:
dn:automountMapName=auto_indirect,dc=nisserv1
objectClass: top
objectClass: automountMap
automountMapName: auto_indirect
dn:automountKey=lab1,\
automountMapname=auto_indirect, dc=nisserv1
objectClass: top
objectClass: automount
automountInformation:hostA:/tmp
automountKey: lab1
dn:automountKey=lab2, \
automountMapname=auto_indirect, dc=nisserv1
objectClass: top
objectClass: automount
automountInformation:hostB:/tmp
automountKey:lab2
Chapter 266
Installing And Configuring LDAP-UX Client Services
AutoFS Support
You can use the /opt/ldapux/bin/ldapmodify tool to import the LDIF
file /tmp/auto_indirect.ldif that you just created above into the
LDAP directory. For example, the following command imports the
/tmp/auto_indirect.ldif file to the LDAP base DN “dc=nisserv1” in
the LDAP directory server LDAPSERV1:
dn:automountKey=lab2, \
automountMapname=auto_indirect, dc=nishpbnd
objectClass: top
objectClass: automount
automountInformation:hostB:/tmp
automountKey:lab2
You can use the /opt/ldapux/bin/ldapmodify tool to import the LDIF
file nisp_automap.ldif that you just created above into the LDAP
directory. For example, the following command imports the
nisp_automap.ldif file to the LDAP base DN “dc=nishpbnd” in the
LDAP directory server LDAPSERV1:
This section describes some simple ways you can verify the installation
and configuration of your LDAP-UX Client Services. You may need to do
more elaborate and detailed testing, especially if you have a large
environment.
If any of the following tests fail, see “Troubleshooting” on page 131.
Step 1. Use the nsquery(1)1 command to test the name service:
nsquery lookup_type lookup_query [lookup_policy]
For example, to test the name service switch to resolve a username
lookup, enter:
nsquery passwd
where
username
username
ldap
is the login name of a valid user whose posix account
information is in the directory. You should see output something like the
following depending on how you have configured /etc/nsswitch.conf:
1. nsquery(1) is a contributed tool included with the ONC/NFS product.
Chapter 268
Installing And Configuring LDAP-UX Client Services
Verify the LDAP-UX Client Services
Using "ldap" for the passwd policy.
Searching ldap for jbloggs
User name: jbloggs
user Id: 10000
Group Id: 2000
Gecos:
Home Directory: /home/jbloggs
Shell: /bin/sh
Switch configuration: Terminates Search
This tests the Name Service Switch configuration in /etc/nsswitch.conf. If
you do not see output like that above, check /etc/nsswitch.conf for proper
configuration.
Step 2. Use other commands to display information about users in the directory,
making sure the output is as expected:
pwget -n
nsquery hosts
grget -n
ls -l
username
host_to_find
groupname
NOTEWhile you can use the following commands to verify your configuration,
these commands enumerate the entire passwd or group database, which
may reduce network and directory server performance for large
databases:
pwget (with no options)
grget (with no options)
listusers
logins
Step 3. Use the beq search utility to search for the following services: pwd
(password), grp (group), shd (shadow password), srv (service), prt
(protocol), rpc (RPC), hst (host), net (network), ngp (netgroup), and grm
(group membership). An example beq command using name as the
search key, grp as the service, and ldap as the library is shown below.
./beq -k n -s grp -l /usr/lib/libnss_ldap.1 nss_status........
NSS_SUCCESS
pw_name...........(iuser1)
pw_passwd.........(*)
pw_uid............(101)
pw_gid............(21)
pw_age............()
Chapter 269
Installing And Configuring LDAP-UX Client Services
Verify the LDAP-UX Client Services
pw_comment........()
pw_gecos..........(gecos data in files)
pw_dir............(/home/iuser1)
pw_shell..........(/usr/bin/sh)
pw_audid..........(0)
pw_audflg.........(0)
Refer to “beq Search Tool” in Chapter 4 for command syntax and
examples.
Step 4. Log in to the client system from another system using rlogin or telnet.
Log in as a user in the directory and as a user in /etc/passwd to make
sure both work.
Step 5. Optionally, test your pam_authz authorization configuration:
If the pam_authz is configured without the pam_authz.policy file,
verify the followings:
•logging into the client system from another system using rlogin or
telnet with a user name that is a member of a +@netgroup in the
directory to make sure the user will be allowed to log in.
•logging in as a user that is a member of a -@netgroup to be sure that
the user will not be allowed to login.
If the pam_authz is configured with the pam_authz.policy file, verify
the followings:
•logging into the client system with a user name that is covered by an
allow access rule in the policy file. Make sure the user will be
allowed to log in.
•logging in as a user that is covered by a deny access rule in the
policy file. Make sure the user can not login to the client system.
Step 6. Open a new hpterm(1X) window and log in to the client system as a user
whose account information is in the directory. It is important you open a
new hpterm window or log in from another system because if login
doesn’t work, you could be locked out of the system and would have to
reboot to single-user mode.
This tests the Pluggable Authentication Module (PAM) configuration in
/etc/pam.conf. If you cannot log in, check /etc/pam.conf for proper
configuration. Also check your directory to make sure the user’s account
information is accessible by the proxy user or anonymously, as
appropriate. Check your profile to make sure it looks correct. See also
Troubleshooting in this chapter for more information.
Chapter 270
Installing And Configuring LDAP-UX Client Services
Verify the LDAP-UX Client Services
Step 7. Use the ls(1) or ll(1) command to examine files belonging to a user whose
account information is in the directory. Make sure the owner and group
of each file are accurate:
ll /tmp
ls -l
If any owner or group shows up as a number instead of a user or group
name, the name service switch is not functioning properly. Check the file
/etc/nsswitch.conf, your directory, and your profile.
If you want to verify that you set up X.500 group membership correctly,
follow these steps:
1. Create a valid posix user and group. Add this user as a member of
this group using the attribute “member” instead of “memberuid”.
Here is an example ldif file specifying xuser2 as a member of the
group xgrpup1:
2. Make sure that the file /etc/nsswitch.conf specifies ldap for group
service:
#cat /etc/nsswitch.conf
:
Chapter 271
Installing And Configuring LDAP-UX Client Services
Configure Subsequent Client Systems
:
group: files ldap
:
:
3. Verify:
#grget -n xgroup1
xgroup1:*:999: xuser2
If xuser2 shows up as a member of xgroup1, then your setup is
correct.
Configure Subsequent Client Systems
Once you have configured your directory and one client system, you can
configure subsequent client systems using the following steps. Modify
any of these files as needed.
Step 1. Use swinstall to install LDAP-UX Client Services on the client system.
This does not require rebooting the client system.
Step 2. Copy the following files from a configured client to the client being
configured:
•/etc/opt/ldapux/ldapux_client.conf
•/etc/opt/ldapux/pcred only if you have configured a proxy user, not if
you are using only anonymous access
•/etc/pam.conf
•/etc/nsswitch.conf
•/etc/opt/ldapux/acred if the /etc/opt/ldapux/acred file exists
•cert7.db or cert8.bd and key3.db flles if SSL is enabled
Set all file access mode permission to be the same as those of the first
client being configured.
Step 3. Download the profile by running get_profile_entry as follows:
cd /opt/ldapux/config
./get_profile_entry -s nss
Chapter 272
Installing And Configuring LDAP-UX Client Services
Configure Subsequent Client Systems
Alternatively you could interactively run the setup program to download
the profile from the directory and respond “no” when asked if you want to
change the current configuration:
cd /opt/ldapux/config
./setup
Step 4. If you are using a proxy user, configure the proxy user by calling
ldap_proxy_config as follows:
cd /opt/ldapux/config
./ldap_proxy_config
Step 5. “Verify the LDAP-UX Client Services” on page 68.
Chapter 273
Installing And Configuring LDAP-UX Client Services
Download the Profile Periodically
Download the Profile Periodically
Setup allows you to define a time interval after which the current profile
is being automatically refreshed. The start time for this periodic refresh
is defined by the time the setup program was run and the value defined
for ProfileTTL. Therefore, it does not allow you to define a specific time of
day when the profile should be downloaded (refreshed). For more
detailed information, refer to the ldapclientd(1) man page.
If you would like to manually control when you want to download the
profile, you can use the following steps:
Step 1. When creating your profile entry using setup, set the ProfileTTL value to
0.
Step 2. Using the command get_profile_entry -s nss, write a shell script
that downloads the profile. Below is an example that downloads the
profile from the directory. Modify this example for your environment. It
also compares the new and old profiles and emails a status message:
Step 3. Create a crontab(1) file (or edit your existing crontab file) and specify
how frequently you want the profile to be downloaded. For example,
assuming the script above is in the file /ldapux/download_ldap_profile,
the following crontab specification specifies that
/ldapux/download_ldap_profile be executed nightly at midnight:
0 0 * * * /ldapux/download_ldap_profile
Step 4. Log in as root and schedule the job with the crontab(1) command. For
example, assuming the crontab entry above is in the file crontab.profile,
the following schedules the profile downloading:
Chapter 274
crontab crontab.profile
Installing And Configuring LDAP-UX Client Services
Download the Profile Periodically
Chapter 275
Installing And Configuring LDAP-UX Client Services
Use r-command for PAM_LDAP
Use r-command for PAM_LDAP
An enhancement has been implemented to the LDAP-UX Client Services
B.03.20, so that r-commands can work with LDAP account users whose
password is hidden, or not in clear text or crypt syntax.
If you want to use this new fearture, use the following steps:
1. Uncomment out the following line in the
/etc/opt/ldapux/ldapux_client.conf file:
#password_as = “x”
2. On the HP-UX 11.0 or 11i v1 client system, modify account
management session in /etc/pam.conf file for pam_ldap to add
“rcommand” option as shown below:
CAUTIONSetting user password to be returned as any string for the hidden
password, and turning on the “rcommand” option for pam_ldap
account management could allow users with active accounts on a
remote host to rlogin to the local host on to a disabled account.
Chapter 277
Installing And Configuring LDAP-UX Client Services
Use r-command for PAM_LDAP
Chapter 278
3LDAP Printer Configurator
Support
This chapter contains information describing how LDAP-UX supports
the printer configurator, how to set up the printer schema, and how to
configure the printer configurator to control its behaviors.
This chapter contains the following sections:
•“Overview” on page 80.
•“How the LDAP Printer Configurator works” on page 82.
•“Printer Configuration Parameters” on page 85.
•“Printer Schema” on page 86.
•“Managing the LP printer configuration” on page 88.
•“Limitations of Printer Configurator” on page 91.
Chapter 379
LDAP Printer Configurator Support
Overview
Overview
Management of network printing is complex, and printers themselves
are more complicated. Instead of having printer configuration and
information scattered over client systems and printer servers, they can
be stored and managed from a single repository. LDAP is suited to build
a backend printer configuration database. LDAP-UX enables the
centralized management of printers, and the printer entries can easily be
distributed to clients to reduce concerns about synchronization of
configuration information. LDAP-UX comes with a printer configurator
to consolidate printer configuration and control of printer devices into
the LDAP Directory Server for a central location of printer management.
Definitions
Printer Services
HP-UX provides LP spooler system with the LP subsystem to manage
printers and print services requests. The LP subsystem is a collection of
18 programs that operate on the resources (files and subdirectories) in
LP spool directory to perform their functions, such as lpadmin,rlpdaemon programs, and lp command.
Printing Protocol
The LP spooler system has built-in support for sending jobs to other
hosts that running rlpdaemon. rlpdaemon is a line printer daemon
(LPD) for handling remote spool requests. This feaure enables the user to
install a printer on one host and make it accessible from other hosts. It
also works with printers/printservers that have network interfaces that
support the LDP protocol. The LPD network printing protocol is the
widely used network printing protocol in the UNIX world.
LP Printer types
The LP spooler supports the following three types of printers:
•A network printer which is a printer connected to a network
interface or printserver.
•A remote printer is a printer configured on a system other than the
one you are logged into when you submit a print request.
Chapter 380
LDAP Printer Configurator Support
Overview
•A local printer which is a printer that is directly connected to your
system.
NOTEThe LDAP printer configurator only supports the HP LP spooler system,
remote printers, network printers and printerservers that support Line
Printer Daemon (LPD) protocol. It does not support local printers.
Chapter 381
LDAP Printer Configurator Support
How the LDAP Printer Configurator works
How the LDAP Printer Configurator works
The Printer Configurator is a service daemon which provides the
following functions:
•Periodically searches the existing printer entries stored in LDAP
Directory Server
•Compares the search result with the master printer record file on
each scheduled ldapsearch
•Adds the print configuration to client system for each new printer
•Deletes the printer from the client system for each removed printer
•Updates master printer record file
When ldapclientd is initialized, it will enable the printer configurator
sevices at the same time. Once the printer configurator is up, it
periodically searches for any existing printer entries in the LDAP
Direcotry Server based on a predefined search filters. If there are any
printer entries in the LDAP Directory Server, the printer configurator
will extract the LP printer configuration from each printer entry.
Then, the printer configurator compares the printer configuration with
the current LP printer configuration in the client system. The result of
comparison will generate a list of new or removed printers. For a new
printer, the printer configurator adds this printer to the LP printer spool
of the client which is running the printer configurator. For a removed
printer, the printer configurator deletes this printer from the LP printer
spool of the client.
With the printer configurator, if a printer administrator attempts to
remove or add a printer, all the administrator has to do is to add or delete
the printer entry in the LDAP Directory Server. The printer
configuration will be updated automatically without manually setting
the printers on each client system.
Chapter 382
LDAP Printer Configurator Support
How the LDAP Printer Configurator works
NOTEThe system administrator manually adds or removes printers to the
HP-UX system. The LDAP Printer Configurator will only add or remove
printers that it has discovered in the LDAP directory according to the
search filter defined for the printer.
Chapter 383
LDAP Printer Configurator Support
How the LDAP Printer Configurator works
Figure 3-1Printer Configurator Architecture
Chapter 384
LDAP Printer Configurator Support
Printer Configuration Parameters
Printer Configuration Parameters
The LDAP-UX Client Services provides four printer configuration
parameters, start, search_interval , max_printers and
lpadmin_option available for you to customize and control the
behaviors of the printer configurator. These parameters are defined in
the ldapclientd.conf file. For detailed information on these new
parameters, refer to Chapter 4, “Administering LDAP-UX Client
Services,” on page 93.
Chapter 385
LDAP Printer Configurator Support
Printer Schema
Printer Schema
The new printer schema,
IETF<draft-fleming-ldap-printer-schema-02.txt>, is used to create the
printer objects that are relevant to the printer configurator services. The
draft printer schema can be obtained from IETF web site at
http://www.ietf.org. For the detailed structure information of the new
printer schema, see Appendix C. You must import the new printer
schema into the LDAP Directory Server to create new printer objects.
NOTEThe LDAP printer configurator supports any Directory Servers that
support the LDAP printer schema based on
IETF<draft-fleming-ldap-printer-schema-02.txt>.
An Example
The following shows a typical printer object entry:
dn: printer-name=printer1,ou=printers,dc=cup,dc=hp,dc=com
objectclass: top
objectclass: printerabstract
objectclass: printerservice
objectclass: printerlpd
printer-name: lj81003
printer-uri: lpd://hostA.hp.com/lj81003
printer-location: 47L
printer-make-model: hp laser jet 81003
printer-service-person: John Louie
With the new printer schema, you are able to create printer objects for
the LP printer configuration.The minimum information for a printer
object entry is the local printer name, remote hostname, and the remote
printer name. The remote hostname is the system or device that the
remote printer is connected to. The remote hostname must be the fully
qualified name.
Chapter 386
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.