<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAP-UX client in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ldap-ux-client/m-p/3936185#M288169</link>
    <description>I have at least one error in my above post.  The LDIF should have the following line for the group search:&lt;BR /&gt;&lt;BR /&gt;servicesearchdescriptor: group:OU=Group,DC=example,DC=com&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Thu, 26 Apr 2007 17:01:23 GMT</pubDate>
    <dc:creator>Joshua M. Miller</dc:creator>
    <dc:date>2007-04-26T17:01:23Z</dc:date>
    <item>
      <title>LDAP-UX client</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ldap-ux-client/m-p/3936183#M288167</link>
      <description>Hi, &lt;BR /&gt;&lt;BR /&gt;I create LDAP server on linux RHEL4 use openldap-2.3.32 the slapd.conf like the following. &lt;BR /&gt;&lt;BR /&gt;# &lt;BR /&gt;# See slapd.conf(5) for details on configuration options. &lt;BR /&gt;# This file should NOT be world readable. &lt;BR /&gt;# &lt;BR /&gt;include /usr/local/etc/openldap/schema/core.schema &lt;BR /&gt;include /usr/local/etc/openldap/schema/cosine.schema &lt;BR /&gt;include /usr/local/etc/openldap/schema/inetorgperson.schema &lt;BR /&gt;include /usr/local/etc/openldap/schema/corba.schema &lt;BR /&gt;include /usr/local/etc/openldap/schema/java.schema &lt;BR /&gt;include /usr/local/etc/openldap/schema/misc.schema &lt;BR /&gt;include /usr/local/etc/openldap/schema/nis.schema &lt;BR /&gt;include /usr/local/etc/openldap/schema/openldap.schema &lt;BR /&gt;# Define global ACLs to disable default read access. &lt;BR /&gt;&lt;BR /&gt;# Do not enable referrals until AFTER you have a working directory &lt;BR /&gt;# service AND an understanding of referrals. &lt;BR /&gt;#referral ldap://root.openldap.org &lt;BR /&gt;&lt;BR /&gt;pidfile /usr/local/var/run/slapd.pid &lt;BR /&gt;argsfile /usr/local/var/run/slapd.args &lt;BR /&gt;&lt;BR /&gt;# Load dynamic backend modules: &lt;BR /&gt;# modulepath /usr/local/libexec/openldap &lt;BR /&gt;# moduleload back_bdb.la &lt;BR /&gt;# moduleload back_ldap.la &lt;BR /&gt;# moduleload back_ldbm.la &lt;BR /&gt;# moduleload back_passwd.la &lt;BR /&gt;# moduleload back_shell.la &lt;BR /&gt;&lt;BR /&gt;# Sample security restrictions &lt;BR /&gt;# Require integrity protection (prevent hijacking) &lt;BR /&gt;# Require 112-bit (3DES or better) encryption for updates &lt;BR /&gt;# Require 63-bit encryption for simple bind &lt;BR /&gt;# security ssf=1 update_ssf=112 simple_bind=64 &lt;BR /&gt;&lt;BR /&gt;# Sample access control policy: &lt;BR /&gt;# Root DSE: allow anyone to read it &lt;BR /&gt;# Subschema (sub)entry DSE: allow anyone to read it &lt;BR /&gt;# Other DSEs: &lt;BR /&gt;# Allow self write access &lt;BR /&gt;# Allow authenticated users read access &lt;BR /&gt;# Allow anonymous users to authenticate &lt;BR /&gt;# Directives needed to implement policy: &lt;BR /&gt;# access to dn.base="" by * read &lt;BR /&gt;# access to dn.base="cn=Subschema" by * read &lt;BR /&gt;# access to * &lt;BR /&gt;# by self write &lt;BR /&gt;# by users read &lt;BR /&gt;# by anonymous auth &lt;BR /&gt;# &lt;BR /&gt;# if no access controls are present, the default policy &lt;BR /&gt;# allows anyone and everyone to read anything but restricts &lt;BR /&gt;# updates to rootdn. (e.g., "access to * by * read") &lt;BR /&gt;# &lt;BR /&gt;# rootdn can always read and write EVERYTHING! &lt;BR /&gt;&lt;BR /&gt;####################################################################### &lt;BR /&gt;# BDB database definitions &lt;BR /&gt;####################################################################### &lt;BR /&gt;&lt;BR /&gt;database bdb &lt;BR /&gt;suffix "dc=stooges,dc=com" &lt;BR /&gt;rootdn "cn=StoogeAdmin,dc=stooges,dc=com" &lt;BR /&gt;# Cleartext passwords, especially for the rootdn, should &lt;BR /&gt;# be avoid. See slappasswd(8) and slapd.conf(5) for details. &lt;BR /&gt;# Use of strong authentication encouraged. &lt;BR /&gt;rootpw {SSHA}P0J4pU+ZlF7V3U3bi66pnFLOPVGOR0n+ &lt;BR /&gt;# The database directory MUST exist prior to running slapd AND &lt;BR /&gt;# should only be accessible by the slapd and slap tools. &lt;BR /&gt;# Mode 700 recommended. &lt;BR /&gt;directory /usr/local/var/openldap-data &lt;BR /&gt;defaultaccess read &lt;BR /&gt;schemacheck on &lt;BR /&gt;lastmod on &lt;BR /&gt;# Indices to maintain &lt;BR /&gt;index cn,sn,st eq,sub &lt;BR /&gt;&lt;BR /&gt;access to attrs=userPassword &lt;BR /&gt;by self write &lt;BR /&gt;by anonymous auth &lt;BR /&gt;by * none &lt;BR /&gt;access to * &lt;BR /&gt;by * read &lt;BR /&gt;&lt;BR /&gt;############################################## &lt;BR /&gt;&lt;BR /&gt;I install LDAP-UX Client at HPUX11i and follow the step Quick Configuration on LDAP-UX Client Configuration. &lt;BR /&gt;When i see the following message I press Enter &lt;BR /&gt;&lt;BR /&gt;Would you like to extend the schema in this directory server? [Yes]: &lt;BR /&gt;&lt;BR /&gt;When i see the following message I insert the password as config at slapd.conf on LDAP server. &lt;BR /&gt;&lt;BR /&gt;Enter the distinguished name (DN) of the directory user allowed &lt;BR /&gt;to extend the schema. &lt;BR /&gt;&lt;BR /&gt;To accept the default shown in brackets, press the Return key. &lt;BR /&gt;&lt;BR /&gt;User DN [cn=Directory Manager]: cn=StoogeAdmin,dc=stooges,dc=com &lt;BR /&gt;&lt;BR /&gt;Password: &lt;BR /&gt;&lt;BR /&gt;Then it got the following error. &lt;BR /&gt;&lt;BR /&gt;PFMERR 43: Can't extend LDAP-UX Configuration profile schema on the Directory Server &lt;BR /&gt;nis.tha.hp.com = 16.151.232.191 &lt;BR /&gt;with user cn=StoogeAdmin,dc=stooges,dc=com &lt;BR /&gt;Please check the /tmp/ldapux_schema.log file for errors. &lt;BR /&gt;&lt;BR /&gt;I go to check the error log at /tmp/ldapux_schema.log file then it display the following message. &lt;BR /&gt;&lt;BR /&gt;ldap_modify: Invalid syntax &lt;BR /&gt;ldap_modify: additional info: objectclasses: value #0 invalid per syntax &lt;BR /&gt;modifying entry cn=Subschema &lt;BR /&gt;&lt;BR /&gt;How should me do to configuration LDAP Client? &lt;BR /&gt;Am I do something wrong? &lt;BR /&gt;If it wrong please guide me how to fix it. &lt;BR /&gt;&lt;BR /&gt;Thank you and Best Regards, &lt;BR /&gt;&lt;BR /&gt;Somsak</description>
      <pubDate>Wed, 31 Jan 2007 23:54:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ldap-ux-client/m-p/3936183#M288167</guid>
      <dc:creator>Sak</dc:creator>
      <dc:date>2007-01-31T23:54:06Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP-UX client</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ldap-ux-client/m-p/3936184#M288168</link>
      <description>I don't know if you have fixed this issue yet, but I'm working through it and have been able to get past this point by creating the schema manually that this operation is attempting to create.&lt;BR /&gt;&lt;BR /&gt;Download this schema and include it in your slapd.conf:&lt;BR /&gt;  &lt;A href="http://sapiens.wustl.edu/~sysmain/info/openldap/schemas/DUAConfig.schema" target="_blank"&gt;http://sapiens.wustl.edu/~sysmain/info/openldap/schemas/DUAConfig.schema&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Also, model the following LDIF and import it:&lt;BR /&gt;&lt;BR /&gt;dn: cn=uxprofile,ou=Profiles,dc=example,dc=com&lt;BR /&gt;cn: uxprofile&lt;BR /&gt;objectClass: DUAConfigProfile&lt;BR /&gt;defaultserverlist: &lt;IP or="" hostname=""&gt;&lt;BR /&gt;defaultsearchbase: dc=example,dc=com&lt;BR /&gt;defaultSearchScope: one&lt;BR /&gt;servicesearchdescriptor: passwd:OU=People,DC=example,DC=com&lt;BR /&gt;servicesearchdescriptor: group:OU=People,DC=example,DC=com&lt;BR /&gt;profilettl: 3600&lt;BR /&gt;credentiallevel: anonymous &lt;BR /&gt;&lt;BR /&gt;...and that should get you beyond the point you refer to above.&lt;BR /&gt;&lt;BR /&gt;I am able to get through the setup and have the client download the profile.  The client then works if I dont use SSL/TLS, but as soon as I enable SSL/TLS it breaks.&lt;BR /&gt;&lt;BR /&gt;Btw, I'm using OpenLDAP 2.3.34 and LDAP-UX 4.10.&lt;/IP&gt;</description>
      <pubDate>Thu, 26 Apr 2007 16:58:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ldap-ux-client/m-p/3936184#M288168</guid>
      <dc:creator>Joshua M. Miller</dc:creator>
      <dc:date>2007-04-26T16:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP-UX client</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ldap-ux-client/m-p/3936185#M288169</link>
      <description>I have at least one error in my above post.  The LDIF should have the following line for the group search:&lt;BR /&gt;&lt;BR /&gt;servicesearchdescriptor: group:OU=Group,DC=example,DC=com&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 26 Apr 2007 17:01:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ldap-ux-client/m-p/3936185#M288169</guid>
      <dc:creator>Joshua M. Miller</dc:creator>
      <dc:date>2007-04-26T17:01:23Z</dc:date>
    </item>
  </channel>
</rss>

