<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ldap for cent os in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/ldap-for-cent-os/m-p/4760664#M43840</link>
    <description>i am a new user to LDAP.&lt;BR /&gt;i installed following ldap version on my centos server.&lt;BR /&gt;openldap-devel-2.3.43-12.el5_5.3&lt;BR /&gt;python-ldap-2.2.0-2.1&lt;BR /&gt;ldapjdk-4.18-2jpp.3.el5&lt;BR /&gt;openldap-clients-2.3.43-12.el5_5.3&lt;BR /&gt;php-ldap-5.1.6-27.el5&lt;BR /&gt;openldap-2.3.43-12.el5_5.3&lt;BR /&gt;openldap-servers-2.3.43-12.el5_5.3&lt;BR /&gt;nss_ldap-253-25.el5&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;i configured slapd.conf and below i am pasting details of the slapd.conf&lt;BR /&gt;#&lt;BR /&gt;# See slapd.conf(5) for details on configuration options.&lt;BR /&gt;# This file should NOT be world readable.&lt;BR /&gt;#&lt;BR /&gt;include /etc/openldap/schema/core.schema&lt;BR /&gt;include /etc/openldap/schema/cosine.schema&lt;BR /&gt;include /etc/openldap/schema/inetorgperson.schema&lt;BR /&gt;include /etc/openldap/schema/nis.schema&lt;BR /&gt;&lt;BR /&gt;# Allow LDAPv2 client connections.  This is NOT the default.&lt;BR /&gt;allow bind_v2&lt;BR /&gt;&lt;BR /&gt;# Do not enable referrals until AFTER you have a working directory&lt;BR /&gt;# service AND an understanding of referrals.&lt;BR /&gt;#referral       ldap://root.openldap.org&lt;BR /&gt;&lt;BR /&gt;pidfile         /var/run/openldap/slapd.pid&lt;BR /&gt;argsfile        /var/run/openldap/slapd.args&lt;BR /&gt;&lt;BR /&gt;# Load dynamic backend modules:&lt;BR /&gt;# modulepath    /usr/lib/openldap&lt;BR /&gt;&lt;BR /&gt;# Modules available in openldap-servers-overlays RPM package&lt;BR /&gt;# Module syncprov.la is now statically linked with slapd and there&lt;BR /&gt;# is no need to load it here&lt;BR /&gt;# moduleload accesslog.la&lt;BR /&gt;# moduleload auditlog.la&lt;BR /&gt;# moduleload denyop.la&lt;BR /&gt;# moduleload dyngroup.la&lt;BR /&gt;# moduleload dynlist.la&lt;BR /&gt;# moduleload lastmod.la&lt;BR /&gt;# moduleload pcache.la&lt;BR /&gt;# moduleload ppolicy.la&lt;BR /&gt;# moduleload refint.la&lt;BR /&gt;# moduleload retcode.la&lt;BR /&gt;# moduleload rwm.la&lt;BR /&gt;# moduleload smbk5pwd.la&lt;BR /&gt;# moduleload translucent.la&lt;BR /&gt;# moduleload unique.la&lt;BR /&gt;# moduleload valsort.la&lt;BR /&gt;&lt;BR /&gt;# modules available in openldap-servers-sql RPM package:&lt;BR /&gt;# moduleload back_sql.la&lt;BR /&gt;&lt;BR /&gt;# The next three lines allow use of TLS for encrypting connections using a&lt;BR /&gt;# dummy test certificate which you can generate by changing to&lt;BR /&gt;# /etc/pki/tls/certs, running "make slapd.pem", and fixing permissions on&lt;BR /&gt;# slapd.pem so that the ldap user or group can read it.  Your client software&lt;BR /&gt;# may balk at self-signed certificates, however.&lt;BR /&gt;# TLSCACertificateFile /etc/pki/tls/certs/ca-bundle.crt&lt;BR /&gt;# TLSCertificateFile /etc/pki/tls/certs/slapd.pem&lt;BR /&gt;# TLSCertificateKeyFile /etc/pki/tls/certs/slapd.pem&lt;BR /&gt;&lt;BR /&gt;# Sample security restrictions&lt;BR /&gt;#       Require integrity protection (prevent hijacking)&lt;BR /&gt;#       Require 112-bit (3DES or better) encryption for updates&lt;BR /&gt;#       Require 63-bit encryption for simple bind&lt;BR /&gt;# security ssf=1 update_ssf=112 simple_bind=64&lt;BR /&gt;&lt;BR /&gt;# Sample access control policy:&lt;BR /&gt;#       Root DSE: allow anyone to read it&lt;BR /&gt;#       Subschema (sub)entry DSE: allow anyone to read it&lt;BR /&gt;#       Other DSEs:&lt;BR /&gt;#               Allow self write access&lt;BR /&gt;#               Allow authenticated users read access&lt;BR /&gt;#               Allow anonymous users to authenticate&lt;BR /&gt;#       Directives needed to implement policy:&lt;BR /&gt;# access to dn.base="" by * read&lt;BR /&gt;# access to dn.base="cn=Subschema" by * read&lt;BR /&gt;# access to *&lt;BR /&gt;#       by self write&lt;BR /&gt;#       by users read&lt;BR /&gt;#       by anonymous auth&lt;BR /&gt;#&lt;BR /&gt;# if no access controls are present, the default policy&lt;BR /&gt;# allows anyone and everyone to read anything but restricts&lt;BR /&gt;# updates to rootdn.  (e.g., "access to * by * read")&lt;BR /&gt;#&lt;BR /&gt;# rootdn can always read and write EVERYTHING!&lt;BR /&gt;&lt;BR /&gt;#######################################################################&lt;BR /&gt;# ldbm and/or bdb database definitions&lt;BR /&gt;#######################################################################&lt;BR /&gt;&lt;BR /&gt;database        bdb&lt;BR /&gt;suffix dc=emoss,dc=world&lt;BR /&gt;rootdn cn=root,dc=emoss,dc=world&lt;BR /&gt;&lt;BR /&gt;# Cleartext passwords, especially for the rootdn, should&lt;BR /&gt;# be avoided.  See slappasswd(8) and slapd.conf(5) for details.&lt;BR /&gt;# Use of strong authentication encouraged.&lt;BR /&gt;#rootpw         secret&lt;BR /&gt;# rootpw                {crypt}ijFYNcSNctBYg&lt;BR /&gt;rootpw                  {SSHA}ZKkYc8k8J7pdP2DAUhtnfG8DDDjKVDFL&lt;BR /&gt;&lt;BR /&gt;# The database directory MUST exist prior to running slapd AND&lt;BR /&gt;# should only be accessible by the slapd and slap tools.&lt;BR /&gt;# Mode 700 recommended.&lt;BR /&gt;directory       /var/lib/ldap&lt;BR /&gt;&lt;BR /&gt;# Indices to maintain for this database&lt;BR /&gt;index objectClass                       eq,pres&lt;BR /&gt;index ou,cn,mail,surname,givenname      eq,pres,sub&lt;BR /&gt;index uidNumber,gidNumber,loginShell    eq,pres&lt;BR /&gt;index uid,memberUid                     eq,pres,sub&lt;BR /&gt;index nisMapName,nisMapEntry            eq,pres,sub&lt;BR /&gt;&lt;BR /&gt;# DB_CONFIG Settings - For SleepyCat Berkeley DB&lt;BR /&gt;dbconfig set_cachesize 0 10485760 0&lt;BR /&gt;dbconfig set_lg_regionmax 262144&lt;BR /&gt;dbconfig set_lg_bsize 2097152&lt;BR /&gt;&lt;BR /&gt;# Replicas of this database&lt;BR /&gt;#replogfile /var/lib/ldap/openldap-master-replog&lt;BR /&gt;#replica host=ldap-1.example.com:389 starttls=critical&lt;BR /&gt;#     bindmethod=sasl saslmech=GSSAPI&lt;BR /&gt;#     authcId=host/ldap-master.example.com@EXAMPLE.COM&lt;BR /&gt;&lt;BR /&gt;access to attrs=userPassword&lt;BR /&gt;    by self write&lt;BR /&gt;    by dn="cn=root,dc=emoss,dc=world" write&lt;BR /&gt;    by anonymous auth&lt;BR /&gt;    by * none&lt;BR /&gt;&lt;BR /&gt;access to *&lt;BR /&gt;    by dn="cn=root,dc=emoss,dc=world" write&lt;BR /&gt;    by self write&lt;BR /&gt;    by * read&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;i created  base.ldif file &lt;BR /&gt;&lt;BR /&gt;dn: dc=emoss,dc=world&lt;BR /&gt;objectclass: top&lt;BR /&gt;objectclass: organization&lt;BR /&gt;o: emoss company&lt;BR /&gt;dc: emoss&lt;BR /&gt;&lt;BR /&gt;dn: ou=Group,dc=emoss,dc=world&lt;BR /&gt;ou: Group&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;dn: ou=People,dc=emoss,dc=world&lt;BR /&gt;ou: People&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;dn: ou=Services,dc=emoss,dc=world&lt;BR /&gt;ou: Services&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;after creation of base.ldif file i typed bellow  command for creating entry &lt;BR /&gt;                            &lt;BR /&gt;ldapadd -a -W -x -D "cn=root,dc=emoss,dc=world" -f base.ldif&lt;BR /&gt;Enter LDAP Password: &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I try to add a entry using ldapadd ,but  it give  the&lt;BR /&gt;following error.&lt;BR /&gt;&lt;BR /&gt;adding new entry "dc=emoss,dc=world"&lt;BR /&gt;ldapadd: Object class violation (65)&lt;BR /&gt;additional info: attribute 'dc' not allowed&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Where am i going wrong?&lt;BR /&gt;could help pls.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Advance Thanks&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Thu, 03 Mar 2011 10:08:39 GMT</pubDate>
    <dc:creator>taksheel</dc:creator>
    <dc:date>2011-03-03T10:08:39Z</dc:date>
    <item>
      <title>ldap for cent os</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ldap-for-cent-os/m-p/4760664#M43840</link>
      <description>i am a new user to LDAP.&lt;BR /&gt;i installed following ldap version on my centos server.&lt;BR /&gt;openldap-devel-2.3.43-12.el5_5.3&lt;BR /&gt;python-ldap-2.2.0-2.1&lt;BR /&gt;ldapjdk-4.18-2jpp.3.el5&lt;BR /&gt;openldap-clients-2.3.43-12.el5_5.3&lt;BR /&gt;php-ldap-5.1.6-27.el5&lt;BR /&gt;openldap-2.3.43-12.el5_5.3&lt;BR /&gt;openldap-servers-2.3.43-12.el5_5.3&lt;BR /&gt;nss_ldap-253-25.el5&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;i configured slapd.conf and below i am pasting details of the slapd.conf&lt;BR /&gt;#&lt;BR /&gt;# See slapd.conf(5) for details on configuration options.&lt;BR /&gt;# This file should NOT be world readable.&lt;BR /&gt;#&lt;BR /&gt;include /etc/openldap/schema/core.schema&lt;BR /&gt;include /etc/openldap/schema/cosine.schema&lt;BR /&gt;include /etc/openldap/schema/inetorgperson.schema&lt;BR /&gt;include /etc/openldap/schema/nis.schema&lt;BR /&gt;&lt;BR /&gt;# Allow LDAPv2 client connections.  This is NOT the default.&lt;BR /&gt;allow bind_v2&lt;BR /&gt;&lt;BR /&gt;# Do not enable referrals until AFTER you have a working directory&lt;BR /&gt;# service AND an understanding of referrals.&lt;BR /&gt;#referral       ldap://root.openldap.org&lt;BR /&gt;&lt;BR /&gt;pidfile         /var/run/openldap/slapd.pid&lt;BR /&gt;argsfile        /var/run/openldap/slapd.args&lt;BR /&gt;&lt;BR /&gt;# Load dynamic backend modules:&lt;BR /&gt;# modulepath    /usr/lib/openldap&lt;BR /&gt;&lt;BR /&gt;# Modules available in openldap-servers-overlays RPM package&lt;BR /&gt;# Module syncprov.la is now statically linked with slapd and there&lt;BR /&gt;# is no need to load it here&lt;BR /&gt;# moduleload accesslog.la&lt;BR /&gt;# moduleload auditlog.la&lt;BR /&gt;# moduleload denyop.la&lt;BR /&gt;# moduleload dyngroup.la&lt;BR /&gt;# moduleload dynlist.la&lt;BR /&gt;# moduleload lastmod.la&lt;BR /&gt;# moduleload pcache.la&lt;BR /&gt;# moduleload ppolicy.la&lt;BR /&gt;# moduleload refint.la&lt;BR /&gt;# moduleload retcode.la&lt;BR /&gt;# moduleload rwm.la&lt;BR /&gt;# moduleload smbk5pwd.la&lt;BR /&gt;# moduleload translucent.la&lt;BR /&gt;# moduleload unique.la&lt;BR /&gt;# moduleload valsort.la&lt;BR /&gt;&lt;BR /&gt;# modules available in openldap-servers-sql RPM package:&lt;BR /&gt;# moduleload back_sql.la&lt;BR /&gt;&lt;BR /&gt;# The next three lines allow use of TLS for encrypting connections using a&lt;BR /&gt;# dummy test certificate which you can generate by changing to&lt;BR /&gt;# /etc/pki/tls/certs, running "make slapd.pem", and fixing permissions on&lt;BR /&gt;# slapd.pem so that the ldap user or group can read it.  Your client software&lt;BR /&gt;# may balk at self-signed certificates, however.&lt;BR /&gt;# TLSCACertificateFile /etc/pki/tls/certs/ca-bundle.crt&lt;BR /&gt;# TLSCertificateFile /etc/pki/tls/certs/slapd.pem&lt;BR /&gt;# TLSCertificateKeyFile /etc/pki/tls/certs/slapd.pem&lt;BR /&gt;&lt;BR /&gt;# Sample security restrictions&lt;BR /&gt;#       Require integrity protection (prevent hijacking)&lt;BR /&gt;#       Require 112-bit (3DES or better) encryption for updates&lt;BR /&gt;#       Require 63-bit encryption for simple bind&lt;BR /&gt;# security ssf=1 update_ssf=112 simple_bind=64&lt;BR /&gt;&lt;BR /&gt;# Sample access control policy:&lt;BR /&gt;#       Root DSE: allow anyone to read it&lt;BR /&gt;#       Subschema (sub)entry DSE: allow anyone to read it&lt;BR /&gt;#       Other DSEs:&lt;BR /&gt;#               Allow self write access&lt;BR /&gt;#               Allow authenticated users read access&lt;BR /&gt;#               Allow anonymous users to authenticate&lt;BR /&gt;#       Directives needed to implement policy:&lt;BR /&gt;# access to dn.base="" by * read&lt;BR /&gt;# access to dn.base="cn=Subschema" by * read&lt;BR /&gt;# access to *&lt;BR /&gt;#       by self write&lt;BR /&gt;#       by users read&lt;BR /&gt;#       by anonymous auth&lt;BR /&gt;#&lt;BR /&gt;# if no access controls are present, the default policy&lt;BR /&gt;# allows anyone and everyone to read anything but restricts&lt;BR /&gt;# updates to rootdn.  (e.g., "access to * by * read")&lt;BR /&gt;#&lt;BR /&gt;# rootdn can always read and write EVERYTHING!&lt;BR /&gt;&lt;BR /&gt;#######################################################################&lt;BR /&gt;# ldbm and/or bdb database definitions&lt;BR /&gt;#######################################################################&lt;BR /&gt;&lt;BR /&gt;database        bdb&lt;BR /&gt;suffix dc=emoss,dc=world&lt;BR /&gt;rootdn cn=root,dc=emoss,dc=world&lt;BR /&gt;&lt;BR /&gt;# Cleartext passwords, especially for the rootdn, should&lt;BR /&gt;# be avoided.  See slappasswd(8) and slapd.conf(5) for details.&lt;BR /&gt;# Use of strong authentication encouraged.&lt;BR /&gt;#rootpw         secret&lt;BR /&gt;# rootpw                {crypt}ijFYNcSNctBYg&lt;BR /&gt;rootpw                  {SSHA}ZKkYc8k8J7pdP2DAUhtnfG8DDDjKVDFL&lt;BR /&gt;&lt;BR /&gt;# The database directory MUST exist prior to running slapd AND&lt;BR /&gt;# should only be accessible by the slapd and slap tools.&lt;BR /&gt;# Mode 700 recommended.&lt;BR /&gt;directory       /var/lib/ldap&lt;BR /&gt;&lt;BR /&gt;# Indices to maintain for this database&lt;BR /&gt;index objectClass                       eq,pres&lt;BR /&gt;index ou,cn,mail,surname,givenname      eq,pres,sub&lt;BR /&gt;index uidNumber,gidNumber,loginShell    eq,pres&lt;BR /&gt;index uid,memberUid                     eq,pres,sub&lt;BR /&gt;index nisMapName,nisMapEntry            eq,pres,sub&lt;BR /&gt;&lt;BR /&gt;# DB_CONFIG Settings - For SleepyCat Berkeley DB&lt;BR /&gt;dbconfig set_cachesize 0 10485760 0&lt;BR /&gt;dbconfig set_lg_regionmax 262144&lt;BR /&gt;dbconfig set_lg_bsize 2097152&lt;BR /&gt;&lt;BR /&gt;# Replicas of this database&lt;BR /&gt;#replogfile /var/lib/ldap/openldap-master-replog&lt;BR /&gt;#replica host=ldap-1.example.com:389 starttls=critical&lt;BR /&gt;#     bindmethod=sasl saslmech=GSSAPI&lt;BR /&gt;#     authcId=host/ldap-master.example.com@EXAMPLE.COM&lt;BR /&gt;&lt;BR /&gt;access to attrs=userPassword&lt;BR /&gt;    by self write&lt;BR /&gt;    by dn="cn=root,dc=emoss,dc=world" write&lt;BR /&gt;    by anonymous auth&lt;BR /&gt;    by * none&lt;BR /&gt;&lt;BR /&gt;access to *&lt;BR /&gt;    by dn="cn=root,dc=emoss,dc=world" write&lt;BR /&gt;    by self write&lt;BR /&gt;    by * read&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;i created  base.ldif file &lt;BR /&gt;&lt;BR /&gt;dn: dc=emoss,dc=world&lt;BR /&gt;objectclass: top&lt;BR /&gt;objectclass: organization&lt;BR /&gt;o: emoss company&lt;BR /&gt;dc: emoss&lt;BR /&gt;&lt;BR /&gt;dn: ou=Group,dc=emoss,dc=world&lt;BR /&gt;ou: Group&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;dn: ou=People,dc=emoss,dc=world&lt;BR /&gt;ou: People&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;dn: ou=Services,dc=emoss,dc=world&lt;BR /&gt;ou: Services&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;after creation of base.ldif file i typed bellow  command for creating entry &lt;BR /&gt;                            &lt;BR /&gt;ldapadd -a -W -x -D "cn=root,dc=emoss,dc=world" -f base.ldif&lt;BR /&gt;Enter LDAP Password: &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I try to add a entry using ldapadd ,but  it give  the&lt;BR /&gt;following error.&lt;BR /&gt;&lt;BR /&gt;adding new entry "dc=emoss,dc=world"&lt;BR /&gt;ldapadd: Object class violation (65)&lt;BR /&gt;additional info: attribute 'dc' not allowed&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Where am i going wrong?&lt;BR /&gt;could help pls.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Advance Thanks&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 03 Mar 2011 10:08:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ldap-for-cent-os/m-p/4760664#M43840</guid>
      <dc:creator>taksheel</dc:creator>
      <dc:date>2011-03-03T10:08:39Z</dc:date>
    </item>
    <item>
      <title>Re: ldap for cent os</title>
      <link>https://community.hpe.com/t5/operating-system-linux/ldap-for-cent-os/m-p/4760665#M43841</link>
      <description>You are referencing the domain component emoss that is not declared as a domain in your base ldif.&lt;BR /&gt;&lt;BR /&gt;Here is a working base.ldif:&lt;BR /&gt;&lt;BR /&gt;# extended LDIF&lt;BR /&gt;#&lt;BR /&gt;# LDAPv3&lt;BR /&gt;# base &lt;DC&gt; (default) with scope subtree&lt;BR /&gt;# filter: (objectclass=*)&lt;BR /&gt;# requesting: ALL&lt;BR /&gt;#&lt;BR /&gt;&lt;BR /&gt;# test.example.com&lt;BR /&gt;dn: dc=test,dc=example,dc=com&lt;BR /&gt;dc: test&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: domain&lt;BR /&gt;&lt;BR /&gt;# Hosts, test.example.com&lt;BR /&gt;dn: ou=Hosts,dc=test,dc=example,dc=com&lt;BR /&gt;ou: Hosts&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;# Rpc, test.example.com&lt;BR /&gt;dn: ou=Rpc,dc=test,dc=example,dc=com&lt;BR /&gt;ou: Rpc&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;# Services, test.example.com&lt;BR /&gt;dn: ou=Services,dc=test,dc=example,dc=com&lt;BR /&gt;ou: Services&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;# netgroup.byuser, test.example.com&lt;BR /&gt;dn: nisMapName=netgroup.byuser,dc=test,dc=example,dc=com&lt;BR /&gt;nisMapName: netgroup.byuser&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: nisMap&lt;BR /&gt;&lt;BR /&gt;# Mounts, test.example.com&lt;BR /&gt;dn: ou=Mounts,dc=test,dc=example,dc=com&lt;BR /&gt;ou: Mounts&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;# Networks, test.example.com&lt;BR /&gt;dn: ou=Networks,dc=test,dc=example,dc=com&lt;BR /&gt;ou: Networks&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;# People, test.example.com&lt;BR /&gt;dn: ou=People,dc=test,dc=example,dc=com&lt;BR /&gt;ou: People&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;# Group, test.example.com&lt;BR /&gt;dn: ou=Group,dc=test,dc=example,dc=com&lt;BR /&gt;ou: Group&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;# Netgroup, test.example.com&lt;BR /&gt;dn: ou=Netgroup,dc=test,dc=example,dc=com&lt;BR /&gt;ou: Netgroup&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;# Protocols, test.example.com&lt;BR /&gt;dn: ou=Protocols,dc=test,dc=example,dc=com&lt;BR /&gt;ou: Protocols&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;# Aliases, test.example.com&lt;BR /&gt;dn: ou=Aliases,dc=test,dc=example,dc=com&lt;BR /&gt;ou: Aliases&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: organizationalUnit&lt;BR /&gt;&lt;BR /&gt;# netgroup.byhost, test.example.com&lt;BR /&gt;dn: nisMapName=netgroup.byhost,dc=test,dc=example,dc=com&lt;BR /&gt;nisMapName: netgroup.byhost&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: nisMap&lt;BR /&gt;&lt;BR /&gt;# jdoe, People, test.example.com&lt;BR /&gt;dn: uid=jdoe,ou=People,dc=test,dc=example,dc=com&lt;BR /&gt;uid: jdoe&lt;BR /&gt;cn: jdoe&lt;BR /&gt;givenName: John&lt;BR /&gt;sn: Doe&lt;BR /&gt;objectClass: inetOrgPerson&lt;BR /&gt;objectClass: posixAccount&lt;BR /&gt;objectClass: top&lt;BR /&gt;objectClass: shadowAccount&lt;BR /&gt;shadowLastChange: 14830&lt;BR /&gt;shadowMax: 99999&lt;BR /&gt;shadowWarning: 7&lt;BR /&gt;loginShell: /bin/bash&lt;BR /&gt;uidNumber: 49064&lt;BR /&gt;gidNumber: 49064&lt;BR /&gt;mail: email@example.com&lt;BR /&gt;homeDirectory: /home/jdoe&lt;BR /&gt;userPassword:: e1NTSEF9amNZaHBKdTVYTSswRVIvYmpnNDFnd0kweXJ1a2RJUkU=&lt;BR /&gt;&lt;/DC&gt;</description>
      <pubDate>Thu, 10 Mar 2011 10:32:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/ldap-for-cent-os/m-p/4760665#M43841</guid>
      <dc:creator>Reiner  Rottmann</dc:creator>
      <dc:date>2011-03-10T10:32:22Z</dc:date>
    </item>
  </channel>
</rss>

