By default, Solaris LDAP clients access the information assuming that the DIT has a given structure. For each domain supported by the LDAP server, there is a subtree with an assumed structure. This default structure, however, can be overridden by specifying Service Search Descriptors (SSDs). For a given domain, the default DIT will have a base container that holds a number of well known containers that hold entries for a specific information type. See the following table for the names of these subtrees. (This information can be found in RFC 2307 and others.)
Table 13–1 DIT Default Locations| 
 Default Container  | 
 Information Type  | 
|---|---|
| 
 ou=Ethers  | 
 bootparams(4), ethers(4)  | 
| 
 ou=Group  | 
 group(4)  | 
| 
 ou=Hosts  | 
 hosts(4), ipnodes(4), publickey for hosts  | 
| 
 ou=Aliases  | 
 aliases(4)  | 
| 
 ou=Netgroup  | 
 netgroup(4)  | 
| 
 ou=Networks  | 
 networks(4), netmasks(4)  | 
| 
 ou=People  | 
 passwd(1), shadow(4), user_attr(4), audit_user(4), publickey for users  | 
| 
 ou=printers  | 
 printers(4)  | 
| 
 ou=Protocols  | 
 protocols(4)  | 
| 
 ou=Rpc  | 
 rpc(4)  | 
| 
 ou=Services  | 
 services(4)  | 
| 
 ou=SolarisAuthAttr  | 
 auth_attr(4)  | 
| 
 ou=SolarisProfAttr  | 
 prof_attr(4), exec_attr(4)  | 
| 
 ou=projects  | 
 project  | 
| 
 automountMap=auto_*  | 
 auto_*  |