JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Working With Naming and Directory Services in Oracle Solaris 11.1     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

Part I About Naming and Directory Services

1.  Naming and Directory Services (Overview)

2.  Name Service Switch (Overview)

3.  Managing DNS (Tasks)

4.  Setting Up Oracle Solaris Active Directory Clients (Tasks)

Part II NIS Setup and Administration

5.  Network Information Service (Overview)

6.  Setting Up and Configuring NIS (Tasks)

7.  Administering NIS (Tasks)

8.  NIS Troubleshooting

Part III LDAP Naming Services

9.  Introduction to LDAP Naming Services (Overview)

Audience Assumptions

Suggested Background Reading

Additional Prerequisite

LDAP Naming Services Compared to Other Naming Services

Advantages of LDAP Naming Services

Restrictions of LDAP Naming Services

LDAP Naming Services Setup (Task Map)

LDAP Data Interchange Format

Using Fully Qualified Domain Names With LDAP

Default Directory Information Tree

Default LDAP Schema

Service Search Descriptors and Schema Mapping

Description of SSDs

attributeMap Attributes

objectclassMap Attribute

LDAP Client Profiles

LDAP Client Profile Attributes

Local LDAP Client Attributes

ldap_cachemgr Daemon

LDAP Naming Services Security Model

Transport Layer Security

Assigning Client Credential Levels

LDAP anonymous Credential Level

LDAP proxy Credential Level

LDAP proxy anonymous Credential Level

LDAP per-user Authentication

enableShadowUpdate Switch

Credential Storage for LDAP Clients

Choosing Authentication Methods for the LDAP Naming Service

Specifying Authentication Methods for Specific Services in LDAP

Pluggable Authentication Methods

pam_unix_* Service Modules

Kerberos Service Module

LDAP Service Module

PAM and Changing Passwords

LDAP Account Management

LDAP Account Management With the pam_unix_* Modules

10.  Planning Requirements for LDAP Naming Services (Tasks)

11.  Setting Up Oracle Directory Server Enterprise Edition With LDAP Clients (Tasks)

12.  Setting Up LDAP Clients (Tasks)

13.  LDAP Troubleshooting (Reference)

14.  LDAP Naming Service (Reference)

15.  Transitioning From NIS to LDAP (Tasks)

Glossary

Index

Default Directory Information Tree

By default, LDAP clients access the information assuming that the directory information tree (DIT) has a given structure. For each domain supported by the LDAP server, there is a subtree with an assumed structure. This default structure, however, can be overridden by specifying Service Search Descriptors (SSDs). For a given domain, the default DIT will have a base container that holds a number of well known containers that hold entries for a specific information type. See the following table for the names of these subtrees. This information can be found in RFC 2307 and others.

Table 9-1 DIT Default Locations

Default Container
Information Type
ou=Ethers
bootparams, ethers
ou=Group
group
ou=Hosts
hosts, ipnodes, publickey for hosts
ou=Aliases
aliases
ou=Netgroup
netgroup
ou=Networks
networks, netmasks
ou=People
passwd, shadow, user_attr, audit_user, publickey for users
ou=Protocols
protocols
ou=Rpc
rpc
ou=Services
services
ou=SolarisAuthAttr
auth_attr
ou=SolarisProfAttr
prof_attr, exec_attr
ou=projects
project
automountMap=auto_*
auto_*