The information in this document is subject to change without notice.
Hewlett-Packard makes no warranty of any kind with regard to this
manual, including, but not limited to, the implied warranties of
merchantability and fitness for a particular purpose. Hewlett-Packard
shall not be held liable for errors contained herein or direct, indirect,
special, incidental or consequential damages in connection with the
furnishing, performance, or use of this material.
Warranty
A copy of the specific warranty terms applicable to your Hewlett-Packard
product and replacement parts can be obtained from your local Sales and
Service Office.
U.S. Government License
Proprietary computer software. Valid license from HP required for
possession, use or copying. Consistent with FAR 12.211 and 12.212,
Commercial Computer Software, Computer Software Documentation,
and Technical Data for Commercial Items are licensed to the U.S.
Government under vendor's standard commercial license.
Copyright Notices
Copyright 2006 Hewlett-Packard Company L.P. All rights reserved.
Reproduction, adaptation, or translation of this document without prior
written permission is prohibited, except as allowed under the copyright
laws.
Trademark Notices
UNIX is a registered trademark in the United States and other
countries, licensed exclusively throughThe Open Group.
NIS is a trademark of Sun Microsystems, Inc.
Netscape and Netscape Directory Server are registered trademarks of
Netscape Communications Corporation in the United States and other
countries. Other product and brand names are trademarks of their
respective owners.
Table 5-3. LDAP-UX Client Services Libraries on the HP-UX 11i v2 PA machine 141
Table 5-4. LDAP-UX Client Services Libraries on the HP-UX 11i v2 IA machine. 142
The latest version of this document can be found on line at:
http://www.docs.hp.com
This document describes how to install and configure LDAP-UX Client
Services product on HP-UX platforms.
The document printing date and part number indicate the document’s
current edition. The printing date will change when a new edition is
printed. Minor changes may be made at reprint without changing the
printing date. The document part number will change when extensive
changes are made.
Document updates may be issued between editions to correct errors or
document product changes. To ensure that you receive the updated or
new editions, you should subscribe to the appropriate product support
service. See your HP sales representative for details.
Intended Audience
This document is intended for system and network administrators
responsible for installing, configuring, and managing the LDAP-UX
Client Services. Administrators are expected to have knowledge of the
LDAP-UX Client Services Integration product.
New and Changed Documentation in This
Edition
This edition documents the following new information for the LDAP-UX
Client Services version B.04.00:
•Support the automount service under the AutoFS subsystem. This
new feature allows you to store and manage the automount maps in
the LDAP directory server.
•Support discovery and and management of publickeys in an LDAP
directory.
•Provide the pam_authz login authorization enhancements. This new
feature allows you to define access rules in the local policy file,
/etc/opt/ldapux/pam_authz.policy.
xi
•Support NIS+ migration scripts that can be used to migrate from an
NIS+ domain into an LDAP directory server.
•Support Mozilla LDAP C SDK 5.14.1 which contains a set of LDAP
Application Programming Interfaces (API) to allow you to build
LDAP-enabled clients.
Publishing History
Table 1Publishing History Details
Document
Manufacturing
Part Number
J4269-90016 11.0, 11iB.03.00September
J4269-90030 11.0, 11i v1
J4269-90038 11.0, 11i v1B.03.30July 2004
J4269-90040 11.0, 11i v1
J4269-90048 11i v1 and v2B.04.00July 2005
J4269-90051 11i v1 and v2B.04.00August 2005
J4269-90053 11i v1 and v2B.04.00June 2006
J4269-9007111i v1, v2 andv3B.04.00February
Operating
Systems
Supported
and v2
and v2
Supported
Product
Versions
B.03.20October
B.03.30September
Publicatio
n Date
2002
2003
2004
2007
What’s in This document
xii
This manual describes how to install, configure and administer the
LDAP-UX Client Services software product.
The manual is organized as follows:
Chapter 1Introduction Use this chapter to learn the LDAP-UX
Client Services product features, components and
client administration tools.
Chapter 2Installing And Configuring LDAP-UX Client
Services Use this chapter to learn how to install,
configure, and use the LDAP-UX Client Services
software.
Chapter 3LDAP Printer Configurator Support Use this
chapter to learn how to set up, configure, and use the
printer configurator.
Chapter 4Administering LDAP-UX Client Services Use this
chapter to understand how to administer your
LDAP-UX Clients to keep them running smoothly and
expand them as your computing environment expands.
Chapter 5Command and Tool Reference Use this chapter to
learn about the commands and tools associated with
the LDAP-UX Client Services product.
Chapter 6User Tasks Use this chapter to learn how to change
passwords and personal information.
Chapter 7Mozilla LDAP C SDK Use this chapter to learn the
Mozilla LDAP SDK software features and its major file
components.
xiii
Typographical Conventions
This document uses the following conventions.
Book TitleThe title of a book. On the web and on the Instant
Information CD, it may be a hot link to the book itself.
EmphasisText that is emphasized.
BoldText that is strongly emphasized.
BoldThe defined use of an important word or phrase.
ComputerOutText displayed by the computer.
UserInputCommands and other text that you type.
CommandA command name or qualified command phrase.
Variable
[]The contents are optional in formats and command
{}The contents are required in formats and command
\The continuous line symbol.
The name of a variable that you may replace in a
command or function or information in a display that
represents several possible values.
descriptions. If the contents are a list separated by |,
you must choose one of the items.
descriptions. If the contents are a list separated by |,
you must choose one of the items.
HP Encourages Your Comments
HP encourages your comments concerning this document. We are truly
committed to providing documentation that meets your needs.
Please send comments to: netinfo_feedback@cup.hp.com
Please include document title, manufacturing part number, and any
comment, error found, or suggestion for improvement you have
concerning this document. Also, please include what we did right so we
can incorporate it into other documents.
xiv
1Introduction
LDAP-UX Client Services simplifies HP-UX system administration by
consolidating account and configuration information into a central LDAP
directory. This LDAP directory could reside on an HP-UX system such as
Netscape Directory Server 6.x, or the account information could be
integrated in Windows 2000/2003 Active Directory.
Information provided in this manual outlines the installation and
administration tasks of LDAP-UX Client Services with HP-UX based
LDAP directories such as Netscape Directory Server 6.x.
For information on the integration of LDAP-UX Client Services with
Windows 2000/2003 Active Directory, see LDAP-UX with Microsoft
Windows 2000/2003 Active Directory Administrator’s Guide
(J4269-90041) at http://docs.hp.com/hpux/internet.
This chapter introduces LDAP-UX Client Services and briefly describes
how it works.
Overview of LDAP-UX Client Services
Traditionally, HP-UX account and configuration information is stored in
text files, for example, /etc/passwd and /etc/group. NIS was developed to
ease system administration by sharing this information across systems
Chapter 11
Introduction
Overview of LDAP-UX Client Services
on the network. With NIS, account and configuration information resides
on NIS servers. NIS client systems retrieve this shared configuration
information across the network from NIS servers, as shown below:
Figure 1-1A Simplified NIS Environment
NIS master server
Map transfers
NIS slave server
NIS Requests
NIS client
LDAP-UX Client Services improves on this configuration information
sharing. HP-UX account and configuration information is stored in an
LDAP directory, not on the local client system. Client systems retrieve
this shared configuration information across the network from the LDAP
NIS slave server
NIS clientNIS client
Chapter 12
Overview of LDAP-UX Client Services
directory, as shown below. LDAP adds greater scalability,
interoperability with other applications and platforms, and less network
traffic from replica updates.
LDAP-UX Client Services supports the following name service data:
passwd, groups, hosts, rpc, services, networks, protocols, publickeys,
automount, netgroup. See the LDAP-UX Integration B.04.00 ReleaseNotes for any additional supported services.
Updates
LDAP Requests
LDAP Directory
Server Replica
LDAP-UX client
How LDAP-UX Client Services Works
LDAP-UX Client Services works by leveraging the authentication
mechanism provided in the Pluggable Authentication Module, or PAM,
and the naming services provided by the Name Service Switch, or NSS.
See pam(3), pam.conf(4), and Managing Systems and Workgroups at
http://docs.hp.com/hpux/os for information on PAM. For information on
NSS, see switch(4) and “Configuring the Name Service Switch” in
Installing and Administering NFS Services at
http://docs.hp.com/hpux/communications/#NFS.
These extensible mechanisms allow new authentication methods and
new name services to be installed and used without changing the
underlying HP-UX commands. And, by supporting the PAM architecture,
the HP-UX client becomes truly integrated in the LDAP environment.
The PAM_LDAP library allows the HP-UX system to use the LDAP
directory as a trusted server for authentication. This means that
Chapter 13
Introduction
Overview of LDAP-UX Client Services
passwords may not only be stored in any syntax but also means that
passwords may remain hidden from view (preventing a decryption attack
on the hashed passwords). Because passwords may be stored in any
syntax, HP-UX will be able to share passwords with other LDAP-enabled
applications.
With LDAP-UX Client Services B.03.20 or later versions, the client
daemon, ldapclientd, becomes the center of the product. It supports
all NSS backend services for LDAP and data enumeration. It also
supports PAM_LDAP for authentication and password change.
With LDAP-UX Client Services, HP-UX commands and subsystems can
transparently access name service information from the LDAP directory
through ldapclientd. The following table shows some examples of
commands and subsystems that use PAM and NSS:
Table 1-1Examples of Commands and Subsystems
that use PAM and NSS
Commands that use
Commands that use PAM and
NSS
lslogin
nsquery
a
passwd
whoftp
whoamisu
finger
b
rlogin
idtelnet
lognamedtlogin
groups
b
newgrp
b
pwget
b
grget
listusers
b
b
remsh
NSS
Chapter 14
Introduction
Overview of LDAP-UX Client Services
Table 1-1Examples of Commands and Subsystems
that use PAM and NSS (Continued)
Commands that use
NSS
b
logins
Commands that use PAM and
NSS
nslookup
a. nsquery(1) is a contributed tool included with the
ONC/NFS product.
b. These commands enumerate the entire passwd or
group database, which may reduce network and
directory server performance for large databases.
In addition, the getpwent(3C) and getgrent(3C) family of system calls get
user and group information from the directory.
Chapter 15
Introduction
Overview of LDAP-UX Client Services
After you install and configure an LDAP directory and migrate your
name service data into it, HP-UX client systems locate the directory from
a “start-up file.” The start-up file tells the client system how to download
a “configuration profile” from the LDAP directory. The configuration
profile is a directory entry containing configuration information common
to many clients. Storing it in the directory lets you maintain it in one
place and share it among many clients rather than storing it
redundantly across the clients. Because the configuration information is
stored in the directory, all each client needs to know is where its profile
is, hence the start-up file. Each client downloads the configuration profile
from the directory.
The profile is an entry in the directory containing details on how clients
are to access the directory, such as:
•where and how clients should search the directory for user, group
and other name service information.
•how clients should bind to the directory: anonymously or as a proxy
user. Anonymous access is simplest. Configuring a proxy user adds
some security, but at the same time it adds the overhead of managing
the proxy user.
•other configuration parameters such as search time limits.
Chapter 16
Overview of LDAP-UX Client Services
Figure 1-4The Local Start-up File and the Configuration Profile
LDAP Directory
Introduction
The start-up file points
to the configuration
profile in the directory.
The following chapter describes in detail how to install, configure, and
verify LDAP-UX Client Services.
Configuration
profile
Start-up
file
LDAP-UX client
The shared configuration
profile is stored in the
directory and downloaded
to all LDAP-UX clients.
Configuration
profile
Chapter 17
Introduction
Overview of LDAP-UX Client Services
Chapter 18
2Installing And Configuring
LDAP-UX Client Services
This chapter describes the decisions you need to make and the steps to
install Netscape and configure LDAP-UX Client Services. This chapter
contains the following sections:
•“Before You Begin” on page 9.
•“Summary of Installing and Configuring” on page 10.
•“Plan Your Installation” on page 12.
•“Install LDAP-UX Client Services on a Client” on page 20.
•“Configure Your Directory” on page 21.
•“Import Name Service Data into Your Directory” on page 25.
•“Configure the LDAP-UX Client Services” on page 27.
•“Configure the LDAP-UX Client Serivces with SSL Support” on
page 41.
•“Configure LDAP-UX Client Services with Publickey Support” on
page 46.
•“AutoFS Support” on page 55.
•“Verify the LDAP-UX Client Services” on page 68.
•“Configure Subsequent Client Systems” on page 72.
•“Download the Profile Periodically” on page 74.
•“Use r-command for PAM_LDAP” on page 76.
Before You Begin
This section lists some things to keep in mind as you plan your
installation.
•Use the configuration worksheet to record your decisions and other
information you’ll need later for configuration in Appendix A,
“Configuration Worksheet,” on page 183.
•See the LDAP-UX Integration B.04.00 Release Notes (J4269-90042)
at http://docs.hp.com/hpux/internet for last-minute information.
•You must have an LDAP directory. You can obtain the Netscape
Directory Server for HP-UX version 6.x from your local HP sales
office or www.hp.com and view the documentation at
http://docs.hp.com/hpux/internet/#Netscape%20Directory%20Server.
Chapter 29
Installing And Configuring LDAP-UX Client Services
Summary of Installing and Configuring
•See the white paper Preparing Your Directory for HP-UX Integration
at http://docs.hp.com/hpux/internet for advice on how to set up and
configure your directory to work with HP-UX.
•Most examples here use the Netscape Directory Server for HP-UX
version 6.x and assume you have some knowledge of this directory
and its tools, such as the Directory Console and ldapsearch. If you
have another directory, consult your directory’s documentation for
specific information.
•For details on how to integrate LDAP-UX Client Services with
Windows 2000 Active Directory, please refer to LDAP-UX Client
Services with Microsoft Windows 2000/2003 Active Directory
Administrator’s Guide (J4269-90041) at
•The examples use a base DN of o=hp.com for illustrative purposes.
Summary of Installing and Configuring
The following summarizes the steps you take when installing and
configuring an LDAP-UX Client Services environment.
• See “Plan Your Installation” on page 12.
•Install LDAP-UX Client Services on each client system. See “Install
LDAP-UX Client Services on a Client” on page 20.
•Install and configure an LDAP directory, if not already done. See
“Configure Your Directory” on page 21.
•Configure your LDAP server to support SSL if you attempt to enable
SSL support with LDAP-UX.
•Migrate your name service data to the directory. See “Import Name
Service Data into Your Directory” on page 25.
•Install and set up the security database files on the LDAP-UX client
system if you want to enable SSL support with LDAP-UX. See
“Configure the LDAP-UX Client Serivces with SSL Support” on
page 41.
Chapter 210
Installing And Configuring LDAP-UX Client Services
Summary of Installing and Configuring
•Run the setup program to configure LDAP-UX Client Services on a
client system. Setup does the following for you:
— Extends your Netscape directory schema with the configuration
profile schema, if not already done.
— Imports the LP printer schema into your LDAP directory server
if you choose to start the LDAP printer configurator.
— Imports the publickey schema into your LDAP directory if you
choose to store the public keys of users and hosts in the LDAP
directory.
— Imports the automount schema into your LDAP directory server
if you choose to store the AutoFS maps in the LDAP directory.
— Creates a start-up file on the client. This enables each client to
download the configuration profile.
— Creates a configuration profile of directory access information in
the directory, to be shared by a group of (or possibly all) clients.
— Downloads the configuration profile from the directory to the
client.
— Start the product daemon, ldapclientd, if you choose to start it.
Starting with LDAP-UX Client B.03.20 or later, the client
daemon must be started for LDAP-UX functions to work. With
LDAP-UX Client B.03.10 or earlier, running the client daemon is
optional.
See “Configure the LDAP-UX Client Services” on page 27.
•Modify the files /etc/pam.conf and /etc/nsswitch.conf on the client to
specify LDAP authentication and name service, respectively. See
“Configure the LDAP-UX Client Services” on page 27.
•Optionally modify the disable_uid_range flag in the
/etc/opt/ldapux/ldapux_client.conf file to disable logins to the local
system from specific ldap users.
•Optionally modify the /etc/opt/ldapux/pam_authz.policy and
/etc/pam.conf files to verify the user access rights of a subset of
users in a large repository needing access, if appropriate. See the
pam_authz(5) man page for the command syntax.
•Verify each client is working properly. See “Verify the LDAP-UX
Client Services” on page 68.
•See also “Configure Subsequent Client Systems” on page 72 for some
shortcuts.
Chapter 211
Installing And Configuring LDAP-UX Client Services
Plan Your Installation
Plan Your Installation
Before beginning your installation, you should plan how you will set up
and verify your LDAP directory and your LDAP-UX Client Services
environment before putting them into production. Consider the following
questions. Record your decisions and other information you’ll need later
in Appendix A, “Configuration Worksheet,” on page 183.
•How many LDAP directory servers and replicas will you need?
Each client system binds to an LDAP directory server containing
your user, group, and other data. Multiple clients can bind to a single
directory server or replica server. The answer depends on your
environment, the size and configuration of your directory and how
many users and clients you have.Write your directory server host
and TCP port number in Appendix A, “Configuration Worksheet,” on
page 183. See the white paper Preparing Your Directory for HP-UXIntegration at: http://docs.hp.com/hpux/internet for more
information.
See the Netscape Directory Server Deployment Guide for more
information. You can add directory replicas to an existing LDAP-UX
Client Services environment as described under “Adding a Directory
Replica” on page 118. You may also want to review the LDAP-UX
performance white paper at http://docs.hp.com/hpux/internet.
•Where will you get your name service data from when migrating it to
the directory?
You can get it from your files in the /etc directory or, if you are using
NIS, from the same source files you create your NIS maps from, or
you can get it from your NIS maps themselves. Write this
information in Appendix A, “Configuration Worksheet,” on page 183.
See “Import Name Service Data into Your Directory” on page 25 for
how to import your information into the directory and “Name Service
Migration Scripts” on page 160 for details on the migration scripts.
To add an individual user entry or modify an existing user entry in
your directory, you can use the ldapmodify command or other
directory administration tools such as the Netscape Console. See also
the LDAP-UX Integration B.03.20 Release Notes for additional
contributed tools.
Chapter 212
Installing And Configuring LDAP-UX Client Services
Plan Your Installation
NOTEYou should keep a small subset of users in /etc/passwd, particularly
the root login. This allows administrative users to log in during
installation and testing. Also, if the directory is unavailable you can
still log in to the system.
•Where in your directory will you put your name service data?
Your directory architect needs to decide where in your directory to
place your name service information. LDAP-UX Client Services by
default expects user and group data to use the object classes and
attributes specified by RFC 2307. The migration scripts by default
create and populate a new subtree that conforms to RFC 2307.
Figure 2-1 on page 15 shows a base DN of ou=unix,o=hp.com. Write
the base DN of your name service data in Appendix A,
“Configuration Worksheet,” on page 183.
If you prefer to merge your name service data into an existing
directory structure, you can map the standard RFC 2307 attributes
to alternate attributes. See “LDAP-UX Client Services Object
Classes” on page 187 for more information.
•How will you put your user, group, and other data into your
directory?
LDAP supports group membership defined in the X.500 syntax
(using the member or uniquemember attribute), while still
supporting the RFC 2307 syntax (using the memberuid attribute).
This new group membership syntax increases LDAP-UX integration
with LDAP and other LDAP-based applications, and may reduce
administration overhead eliminating the need to manage the
memberuid attribute. In addition, a new performance improvement
has been made through the addition of a new caching daemon which
caches passwd, group and X.500 group membership information
retrieved from an LDAP server. This significantly reduces
LDAP-UX’s response time to applications. In addition, the daemon
re-uses connections for LDAP queries and maintains multiple
connections to an LDAP server to improve performance.
The migration scripts provided with LDAP-UX Client Services can
build and populate a new directory subtree for your user and group
data.
Chapter 213
Installing And Configuring LDAP-UX Client Services
Plan Your Installation
If you merge your data into an existing directory, for example to
share user names and passwords with other applications, the
migration scripts can create LDIF files of your user data, but you will
have to write your own scripts or use other tools to merge the data
into your directory. You can add the posixAccount object class to your
users already in the directory to leverage your existing directory
data.
See “Import Name Service Data into Your Directory” on page 25 for
how to import your information into the directory and “Name Service
Migration Scripts” on page 160 for details on the migration scripts.
CAUTIONIf you place a root login in the LDAP directory, that user and
password will be able to log in as root to any client using LDAP-UX
Client Services. Keeping the root user in /etc/passwd on each client
system allows the root user to be managed locally. This can be
especially useful if the network is down because it allows local access
to the system.
It is not recommended that you put the same users both in
/etc/passwd and in the directory. This could lead to conflicts and
unexpected behavior.
•How many profiles do you need?
A configuration profile is a directory entry that contains
configuration information shared by a group of clients. The profile
contains the information clients need to access user and group data
in the directory, for example:
— Your directory server hosts
— Where user, group, and other information is in the directory
— The method clients use to bind to the directory
— Other configuration parameters such as search time limits
If these parameters are the same for all your clients, you would need
only one profile. You will need at least one profile per directory server
or replica. In general, it is a good idea to have as few profiles as
necessary to simplify maintenance. Look at the posixNamingProfile
object class in Appendix B, “LDAP-UX Client Services Object
Classes,” on page 187 to see what is in a profile to decide how many
different profiles you need.
Chapter 214
If you are familiar with NIS, one example is to create a separate
profile for each NIS domain.
•Where in your directory will you put your profile?
The profile contains directory access information. It specifies how
and where clients can find user and group data in the directory. You
can put the profile anywhere you want as long as the client systems
can read it. For example, you might put it near your user data, or in a
separate administrative area. You should put the profile in the same
directory as your user and group data to simplify access permissions.
Clients must have access to both the profile and the user and group
data. The following example shows a configuration profile DN of
cn=profile1,ou=profiles,ou=devices,ou=unix,o=hp.com.
Figure 2-1Example Directory Structure
Installing And Configuring LDAP-UX Client Services
Plan Your Installation
o=hp.com
ou=unix
ou=peopleou=groupsou=profiles
user
data
Write your configuration profile DN on the worksheet in Appendix A,
“Configuration Worksheet,” on page 183.
•By what method will client systems bind to the directory?
Clients can bind to the directory anonymously. This is the default
and is simplest to administer. If you need to prevent access to your
data from anonymous users or your directory does not support
anonymous access, you can use a proxy user. If you configure a proxy
user, you can also configure anonymous access to be attempted in the
event the proxy user fails.
Write your client access method and proxy user DN, if needed, on the
worksheet in Appendix A, “Configuration Worksheet,” on page 183.
Chapter 215
data
profile1group
ou=hosts
host
data
Installing And Configuring LDAP-UX Client Services
Plan Your Installation
•How will you increase the security level of the product to prevent an
unwanted user from logging in to the system via LDAP? What is the
procedure to set up increased login security?
The default is to allow all users stored in the LDAP directory to
login. To disallow specific users to login to a local system, you will
have to configure the disable_uid_range flag in
/etc/opt/ldapux/ldapux_client.conf file. There are two sections in this
file, the [profile] section and the [NSS] section. HP recommends that
you do not edit the [profile] section. The [NSS] section contains the
disable_uid_range flag along with two logging flags. For example, the
flag might look like this: disable_uid_range=0-100, 300-450, 89.
Another common example would be to disable root access This flag
would look like this: disable_uid_range=0.
When the disable_uid_range is turned on, the disabled uid will not
be displayed when you run commands such as pwget, listusers,
logins, etc.
NOTEThe passwd command may still allow you to change a password for a
disabled user when alternative authentication methods, such as
PAM Kerberos, are used since LDAP does not control these
subsystems.
•What PAM authentication will you use? How will you set up
/etc/pam.conf? What other authentication do you want to use & in
what order?
PAM is the Pluggable Authentication Module, providing
authentication services. You can configure PAM to use ldap,
Kerberos, or other traditional UNIX locations (for example files, NIS,
NIS+) as controlled by NSS. See pam(3), pam.conf(4), and ManagingSystems and Workgroups at http://docs.hp.com/hpux/os for more
information on PAM.
It is recommended you use HP-UX file-based authentication first,
followed by LDAP or other authentication. /etc/pam.ldap is an
example of this configuration. With this configuration, PAM uses
traditional authentication first, searching /etc/passwd when any user
logs in, then attempts to authenticate to the directory if the user is
Chapter 216
Loading...
+ 184 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.