By default, Solaris LDAP clients access the information assuming that the DIT has a given structure. For each domain supported by the LDAP server, there is a subtree with an assumed structure. This default structure, however, can be overridden by specifying Service Search Descriptors (SSDs). For a given domain, the default DIT will have a base container that holds a number of well known containers that hold entries for a specific information type. See the following table for the names of these subtrees. (This information can be found in RFC 2307 and others.)
Table 13–1 DIT Default Locations
Default Container |
Information Type |
---|---|
ou=Ethers |
bootparams(4), ethers(4) |
ou=Group |
group(4) |
ou=Hosts |
hosts(4), ipnodes(4), publickey for hosts |
ou=Aliases |
aliases(4) |
ou=Netgroup |
netgroup(4) |
ou=Networks |
networks(4), netmasks(4) |
ou=People |
passwd(1), shadow(4), user_attr(4), audit_user(4), publickey for users |
ou=printers |
printers(4) |
ou=Protocols |
protocols(4) |
ou=Rpc |
rpc(4) |
ou=Services |
services(4) |
ou=SolarisAuthAttr |
auth_attr(4) |
ou=SolarisProfAttr |
prof_attr(4), exec_attr(4) |
ou=projects |
project |
automountMap=auto_* |
auto_* |