For Digest authentication using an LDAP-based directory service, you must install the Digest authentication plug-in. This plug-in computes a digest value on the server side, and compares this value against the digest value provided by the client. If the digest values match, the user is authenticated.
If you are using a file-based authentication database, you do not need to install the Digest authentication plug-in.
The Digest authentication plug-in consists of a shared library and a ldif file:
Make sure this shared library resides on the same server computer on which the Sun Java System Directory Server is installed.
Make sure you know the Directory Manager password.
Modify the libdigest-plugin.ldif file changing all references to /path/to to the location where you installed the digest plug-in shared library.
To install the plug-in, type the command:
% ldapmodify -D "cn=Directory Manager" -w password -a < libdigest-plugin.ldif
You must copy several .dll files from the Proxy Server installation to your Sun Java System Directory Server server computer for the Directory Server to start properly with the Digest plug-in.
Access the shared libraries in Proxy Server in server-root\bin\proxy\bin.
Copy the files nsldap32v50.dll, libspnr4.dll, and libplds4.dll onto the appropriate directory:
Paste them into either:
The DES algorithm is needed to encrypt the attribute where the digest password is stored.
Launch the Sun Java System Directory Server Console.
Open your Sun ONE Directory Server 5.1 SP1 (or later version) instance.
Select the Configuration tab.
Click the + sign next to plug-ins.
Select the DES plug-in.
Choose Add to add a new attribute.
Type iplanetReversiblePassword.
Click Save.
Set a Digest authentication password.
The server uses the iplanetReversiblePassword attribute which is in the object class iplanetReversiblePassword. To use a Digest authentication password in the iplanetReversiblePassword attribute for a user, your entry must include the iplanetReversiblePasswordobject object.
This can be done using ldapmodify or using the Directory Server administration interface.
Using ldapmodify —
Create a file digest.ldif to store the LDAP commands. Adding the password is a two-step process.
Add the object class to the digest.ldif.
The file looks similar to the following (you can have more ldif files based on the Directory Server users and the ACL):
dn:uid=user1,dc=india,dc=sun,dc=com changetype:modify add:objectclass objectclass:iplanetReversiblePasswordobject dn:uid=user1,dc=india,dc=india,dc=sun,dc=com changetype:modify add:iplanetReversiblePassword iplanetReversiblePassword:user1 |
# ldapmodify -D “cn={CN_Value}” -w <password> -a <ldif_file_name>
Restart your Sun Java System Directory Server instance and verify that the user attributes are added to the Directory Server database.