Solaris Trusted Extensions Installation and Configuration for Solaris 10 11/06 and Solaris 10 8/07 Releases

ProcedureAdd an NIS User to the LDAP Server

Before You Begin

You must be superuser, in the root role, or in the Primary Administrator role.

  1. From the NIS database, gather the information that you need.

    1. Create a file from the user's entry in the aliases database.


      % ypcat -k aliases | grep login-name > aliases.name
      
    2. Create a file from the user's entry in the passwd database.


      % ypcat -k passwd | grep "Full Name" > passwd.name
      
    3. Create a file from the user's entry in the auto_home_ database.


      % ypcat -k auto_home | grep login-name > auto_home_label
      
  2. Reformat the information for LDAP and Trusted Extensions.

    1. Use the sed command to reformat the aliases entry.


      % sed 's/ /:/g' aliases.login-name > aliases
    2. Use the nawk command to reformat the passwd entry.


      % nawk -F: '{print $1":x:"$3":"$4":"$5":"$6":"$7}' passwd.name > passwd
    3. Use the nawk command to create a shadow entry.


      % nawk -F: '{print $1":"$2":6445::::::"}' passwd.name > shadow
    4. Use the nawk command to create a user_attr entry.


      % nawk -F: '{print $1"::::lock_after_retries=yes-or-no;profiles=user-profile, ...;
      labelview=int-or-ext,show-or-hide;min_label=min-label;
      clearance=max-label;type=normal;roles=role-name,...;
      auths=auth-name,..."}' passwd.name > user_attr
  3. Copy the modified files to the /tmp directory on the LDAP server.


    # cp aliases auto_home_internal passwd shadow user_attr /tmp/name
    
  4. Add the entries in the files in Step 3 to the databases on the LDAP server.


    # /usr/sbin/ldapaddent -D "cn=directory manager" -w DM-password \
    -a simple -f /tmp/name/aliases aliases
    # /usr/sbin/ldapaddent -D "cn=directory manager" -w DM-password \
    -a simple -f /tmp/name/auto_home_internal auto_home_internal
    # /usr/sbin/ldapaddent -D "cn=directory manager" -w DM-password \
    -a simple -f /tmp/name/passwd passwd
    # /usr/sbin/ldapaddent -D "cn=directory manager" -w DM-password \
    -a simple -f /tmp/name/shadow shadow
    # /usr/sbin/ldapaddent -D "cn=directory manager" -w DM-password \
    -a simple -f /tmp/name/user_attr user_attr

Example 4–6 Adding a User From an NIS Database to the LDAP Server

In the following example, the administrator adds a new user to the trusted network. The user's information is stored originally in an NIS database. To protect the LDAP server password, the administrator runs the ldapaddent commands on the server.

In Trusted Extensions, the new user can allocate devices and assume the Operator role. Because the user can assume a role, the user account does not get locked out. The user's minimum label is PUBLIC. The label at which the user works is INTERNAL, so jan is added to the auto_home_internal database. The auto_home_internal database automounts jan's home directory with read-write permissions .