Name | Synopsis | Description | Options | Operands | Examples | Exit Status | See Also
create-ldap-authdb <connect_options> [--echo|-e] [--no-prompt|-Q] [--verbose|-v] [--auth-expiring-url|-a url] [--vs|-s vs-name] [--bind-dn|-d binddn] [--bind-password|-b bindpw] [--group-search-filter|-o filter] [--search-filter|-f filter] [--group-search-attr|-t attr] [--dc-suffix|-x suffix] [--no-enabled|-n] --ldap-url|-l ldap://server:port/dc=acme,dc=com --config|-c config-name authdb-name
Use this command to create a new authentication database for a LDAP (Lightweight Directory Access Protocol) server. The LDAP database stores the user and group information.
For connect_options description, see help(1).
Specify this option to print this command on the standard output before executing. This option also prints the default value for all the non-mandatory options that you do not provide in the command.
If you specify this option, wadm will not prompt you for passwords while executing this command. Use this option if you have defined all passwords in a password file and specified the file using the --password-file connect_option.
Specify this option to display a verbose output.
Specify the URL to which the server redirects the request to in case the password is about to expire soon.
Specify the name of the virtual server that resides within the same physical location as the Sun Java System Web Server.
Specify the name that the Administration Server will use to initially bind (or log in) to the directory server, for example, cn=Directory Manager. Binding determines the permission level you are granted for the duration of a connection. The DN supplied in a bind request can be the DN of an alias entry.
Specify the password for authentication. You can also define the bind-password in the password file.
Specify the search filter to find group memberships for the user. The default value is uniquemember.
Specify the search filter to use to find the user. The default value is uid.
You can use the search options to interoperate with Microsoft Active Directory (MSAD). By default, MSAD does not store the user ids in the usual uid attribute. Instead, it stores the user ids in an attribute called samAccountName. Hence, when LDAP searches a MSAD directory to find a user, it will not be able to find a match as it attempts to match on the uid attribute. In Web server 7.0 or higher, you can set the search-filter option to override the MSAD default attribute. See example.
Specify the LDAP attribute name that contains group name entries. The default value is CN.
Specify a suffix for the LDAP database.
Specify this option to disable the authentication database at runtime.
Specify the URL of the LDAP authentication database. The type of authentication database is specified in the URL scheme.
Specify the name of the configuration for which you want to create the LDAP authentication database.
wadm create-ldap-authdb --user=admin --host=serverhost --password-file=../admin.passwd --port=8989 --ssl=true --no-prompt --rcfile=null --config=config1 --ldap-url=ldap://serverhost.com:3950/dc=xyz,dc=xyz,dc=xyz --bind-dn=cn="Directory Manager" LDAP1 |
wadm create-ldap-authdb --user admin --host=serverhost --password-file=./admin.passwd --port=8989 --ssl=true --ldap-url=ldap://serverhost:port/dc=acme,dc=com --bind-dn=cn="Directory Manager" --group-search-filter=member --search-filter=samAccountName --group-search-attr=cn --config=config1 authdb-name |
The following exit values are returned:
command executed successfully
error in executing the command
help(1), create-pam-authdb(1), create-file-authdb(1), create-authdb(1), set-authdb-prop(1), get-authdb-prop(1), delete-authdb(1), list-authdbs(1), create-authdb-userprop(1), delete-authdb-userprop(1), list-authdb-userprops(1)
Name | Synopsis | Description | Options | Operands | Examples | Exit Status | See Also