Oracle® Fusion Middleware Man Page Reference for Oracle Directory Server Enterprise Edition 11g Release 1 (11.1.1.7.0) Part Number E28967-01 |
|
|
PDF · Mobi · ePub |
change the password of an LDAP entry
Synopsis
install-path/dsrk/bin/ldappasswd [options] [auth-id]
Description
The ldappasswd
command changes the password of an LDAP entry, identified by an auth-id such as uid=bjensen,ou=people,dc=example,dc=com
, stored by a directory server.
The ldappasswd
command relies on the Password Modify Extended Operation (OID 1.3.6.1.4.1.4203.1.11.1
).
Options
The following options are supported:
-0
Ignore LDAP library version mismatches.
When this option is omitted, the default behavior is to assert that the revision number of the LDAP API be greater than or equal to that used to compile the tool. Also, if the library and the tool have the same vendor name, the tool will assert that the vendor version number of the API be greater than or equal to that used to compile the tool. Revision and version numbers are based on the contents of the LDAPAPIInfo
structure defined in <ldap.h
> or header files included by <ldap.h
>.
-3
Check host names in SSL certificates.
-A
Prompt for old password.
-D
bindDNUse the specified bind DN to authenticate to the directory server.
If the bind DN and its password are omitted, the ldappasswd
command binds anonymously.
-E
Request that the directory expose (report) the bind identity.
-H
-help
--help
-?
Display usage information.
-I
filenameRead SSL key password for the client key database specified using the -P
option from filename.
The default is key3.db
.
-J
controloid[:criticality[:value|::base64value|:<fileurl]]Use the specified control OID.
The criticality, a boolean, is false by default.
An LDAP control can be associated with a value. Proxy authorization takes a proxy authorization ID, for example, passed with the control OID, and criticality. If a value is necessary you specify it using value, base64value, or <fileurl.
-K
pathnameUse the SSL key database located in pathname, the full path to the key database file.
The default is to search for the key database file, key3.db
, in the directory specified by the -P
option.
-M
Manage referrals, modifying the entry containing the referral instead of the entry obtained by following the referral.
-N
certificateUse the specified certificate for certificate-based SSL client authentication, for example: -N "Client-Cert"
, where Client-Cert
is the subject name of the user certificate.
-O
limitFollow at maximum limit referral hops.
Default is 5
.
-P
pathnameUse the SSL certificate database located in the specified file system directory.
The default is to search for the certificate database file, cert8.db
, in the current directory.
-R
Do not follow referrals automatically.
-S
Prompt for the new password.
-T
filenameRead the new password from the specified file.
-V
nUse LDAP protocol version n, where n is 2
or 3
. Default is 3
.
-W
-Prompt for the password for the client key database specified using the -P
option.
The -W
option is required for certificate-based client authentication.
-W
passwordSpecify the password for the client key database specified using the -P
option.
The -W
option is required for certificate-based client authentication.
-Y
proxydnUse the rights of the entry having the specified DN for performing LDAP operations. When using this option, you must also specify how to bind before you assume the rights of the proxy. Thus, when using simple authentication, you would also use the -D
and -w
options with this option.
Before proxy authentication can work in Directory Server, you must set up the appropriate access control instructions.
-Z
Use SSL to provide certificate-based client authentication.
The -Z
option requires the -N
and -W
options and any other SSL options needed to identify the certificate and the key database.
-ZZ
Use start TLS when possible to connect to the directory.
-a
passwordUse the specified old password.
-h
hostContact the LDAP server on the specified host, which may be a host name or an IP address. Enclose IPv6 addresses in brackets ([]
) as described in RFC 2732.
For example, when mapping the IPv4 address 192.168.0.99
to IPv6, pass the -h
option with its argument as -h [::ffff:192.168.0.99]
. Notice the brackets.
When using GSSAPI with Directory Server, specify the host as a fully-qualified host name which matches the value of the nsslapd-localhost
attribute on the cn=config
entry. The GSSAPI authentication process requires that the host name provided by the client match the one provided by the server.
The default is localhost
.
-i
charsetUse the specified character set to override the value of the LANG
environment variable. This option is useful, as the command converts certain arguments you specify to UTF-8 before sending the request to the server. The following arguments are converted: base DN, bind DN, LDAP filter, and password.
You can prevent the command from converting passwords by using the -k
option.
Examples of charset values include ISO8859-1
, ISO8859-15
, ibm-1275
, and windows-1251
.
-j
filenameRead the bind password for simple authentication from the specified file.
-k
Do not convert the passwords to UTF-8.
-m
pathnameUse the security module database located in the specified file system directory.
Use the -m
option if the security module database is in a different directory from the certificate database itself.
-n
Show what would be done, but do not actually do it.
-o
attrname=attrvalueUse the specified attribute values when performing SASL authentication.
The following attrname arguments are supported:
Use the specified authentication identity.
Use the specified authorization identity.
Request the specified SASL mechanism for the bind.
Use the specified realm to complete the bind.
Use the specified security level.
The attrvalue is a valid value corresponding to the attrname you specify.
-p
portContact the LDAP server on the specified port.
The default is 389
(636
if SSL is used).
-s
passwordUse the specified new password.
-t
filenameRead the old password from the specified file.
-v
Run in verbose mode, displaying diagnostics on standard output.
-w
–Prompt for the bind password for simple authentication.
-w
passwordUse the specified bind password for simple authentication.
Examples
Examples in this section use the following conventions:
The directory server is located on a system named host
.
The directory server supports the Password Modify Extended Operation (OID 1.3.6.1.4.1.4203.1.11.1
)
The directory server listens on port number 389
, the default for non-SSL traffic.
The directory server listens on port number 636
, the default for SSL traffic. SSL is enabled.
The following command lets Barbara Jensen change her own user password, connecting over simple authentication:
$ ./ldappasswd -h host -D uid=bjensen,ou=people,dc=example,dc=com \ -j old.pwd -T new.pwd -t old.pwd uid=bjensen,ou=people,dc=example,dc=com ldappasswd: password successfully changed $
The following command lets Kirsten Vaughan change Barbara Jensen's password, connecting over simple authentication:
$ ./ldappasswd -h host -D uid=kvaughan,ou=people,dc=example,dc=com \ -w - -A -S uid=bjensen,ou=people,dc=example,dc=com Old Password: New Password: Re-enter new Password: Enter bind password: ldappasswd: password successfully changed $
The following command uses server authentication during the bind, where the server only accepts binds by clients with trusted certificates. Notice only the -P
option is used without other SSL-related options.
$ ./ldappasswd -h host -p 636 -P /home/bjensen/security \ -D "uid=bjensen,ou=People,dc=example,dc=com" -w - -A -S -Z \ uid=bjensen,ou=People,dc=example,dc=com Old Password: New Password: Re-enter new Password: Enter bind password: ldappasswd: password successfully changed $
The following command uses client authentication during the bind, where the server only accepts binds by clients with trusted certificates, and the client must sign the certificate with a password-protected private key. Notice the options used in this example.
$ ./ldappasswd -h host -p 636 -A -S -P /home/bjensen/security \ -N "bjscert" -W keypassword uid=bjensen,ou=People,dc=example,dc=com Old Password: New Password: Re-enter new Password: ldappasswd: password successfully changed $
Exit Status
The exit status returned reflects the return values of the underlying functions used, which may depend on return values sent by the server. Common exit status codes follow:
Successful completion; LDAP_SUCCESS; 0x00.
Server encountered errors while processing the request; LDAP_OPERATIONS_ERROR; 0x01.
Server encountered errors, such as a BER-decoding error, while processing the request; LDAP_PROTOCOL_ERROR; 0x02.
Entry to modify belongs to an entry handled by neither server, and the referral URL identifies another server that handles the entry; LDAP_REFERRAL; 0x0a.
Authentication ID belongs to an entry not handled by the server, and no referral URL is available for the entry; LDAP_NO_SUCH_OBJECT; 0x20.
Bind DN user does not have permission to read the entry from the directory; LDAP_INSUFFICIENT_ACCESS; 0x32.
Directory does not allow this user to perform this operation; LDAP_UNWILLING_TO_PERFORM; 0x35.
One of the directories did not respond to the request, or the connection was lost; LDAP_SERVER_DOWN; 0x51.
The request could not be BER-encoded; LDAP_ENCODING_ERROR; 0x53.
A result could not be decoded; LDAP_DECODING_ERROR; 0x54.
An option or argument is not valid; LDAP_PARAM_ERROR; 0x59.
A specified host name or port is not valid; LDAP_CONNECT_ERROR; 0x5b.
At least one server supports only LDAPv2, and the -V
2
option was not used, or the -V
2
option was used, but the server no longer supports LDAP v2; LDAP_NOT_SUPPORTED; 0x5c.
Attributes
See attributes
(5) for descriptions of the following attributes:
ATTRIBUTE TYPE | ATTRIBUTE VALUE |
---|---|
Availability |
SUNWldapcsdk-tools |
Stability Level |
Evolving |
See Also
ldapcmp(1), ldapcompare(1), ldapdelete(1), ldapmodify(1), ldapsearch(1)