OpenLDAP

centos 6.4 openldap 2.4 版本 系统认证无法更改密码

大城市里の小女人 提交于 2019-12-06 01:07:40
centos 6.4 openldap 2.4 版本 系统认证无法更改密码,错误提示: openldap: LDAP password information update failed: Insufficient access tail /var/log/securce passwd: pam_unix(passwd:chauthtok): user "test" does not exist in /etc/passwd 解决方案: 在 sldap.conf 中加入: access to attrs=userPassword by self write by anonymous auth by dn.base="cn=Manager,dc=mycompany,dc=com" write by * none access to * by self write by dn.base="cn=Manager,dc=mycompany,dc=com" write by * read 上面行最主要的加在database config 前面,否则不生效。 然后执行 rm -rf /etc/openldap/slapd.d/* slaptest -f /etc/openldap/slapd.conf -F /etc/openldap/slapd.d chown -R ldap:ldap

Ldap error code 32

心已入冬 提交于 2019-12-05 17:33:29
问题 I'm trying to synchronize OpenLDAP and Active directory together. To do so I'm using a program called LSC-Project which is specified to do this sort of thing. I have configured the program the best I can however I can't find a way to shake off the following error: javax.naming.NameNotFoundException: [LDAP: error code 32 - 0000208D: NameErr: DSID- 031001CD, problem 2001 (NO_OBJECT), data 0, best match of: 'DC=domname,DC=com' ]; remaining name 'uid=user1,ou=Users' May 09 15:19:25 - ERROR -

Calling system commands from Perl

断了今生、忘了曾经 提交于 2019-12-05 15:43:40
In an older version of our code, we called out from Perl to do an LDAP search as follows: # Pass the base DN in via the ldapsearch-specific environment variable # (rather than as the "-b" paramater) to avoid problems of shell # interpretation of special characters in the DN. $ENV{LDAP_BASEDN} = $ldn; $lcmd = "ldapsearch -x -T -1 -h $gLdapServer" . <snip> " > $lworkfile 2>&1"; system($lcmd); if (($? != 0) || (! -e "$lworkfile")) { # Handle the error } The code above would result in a successful LDAP search, and the output of that search would be in the file $lworkfile . Unfortunately, we

Openldap + dynlist + posixGroup

放肆的年华 提交于 2019-12-05 07:15:04
问题 I have problem with OpenLdap and permission to file. First - I set this in my slapd.conf: overlay dynlist dynlist-attrset labeledURIObject labeledURI Second - I make cn=test,ou=Projects,dc=example,dc=com with: dn: cn=test,ou=Projects,dc=example,dc=com gidNumber: 6789 objectClass: posixGroup objectClass: top objectClass: labeledURIObject labeledURI: ldap:///cn=testgroup,ou=Groups,dc=example,dc=com?memberUid?sub? (objectClass=posixGroup) memberUid: user1 (dynamic) memberUid: user2 (dynamic) in

Django集成OpenLDAP认证

删除回忆录丶 提交于 2019-12-05 04:40:09
本文详细介绍了django-auth-ldap的使用方法,参数含义,并提供了示例代码 版本说明 Django==2.2 django-auth-ldap==1.7.0 集成过程 Django集成LDAP认证有现成的 django-auth-ldap 模块可以使用,本文也主要以这个模块的使用为主,先安装模块 pip install django-auth-ldap 然后在setting.py全局配置文件中添加如下内容就可以正常使用了: import ldap from django_auth_ldap.config import LDAPSearch, GroupOfNamesType # Baseline configuration. AUTH_LDAP_SERVER_URI = 'ldap://ldap.ops-coffee.cn' AUTH_LDAP_BIND_DN = 'uid=authz,ou=Public,dc=ops-coffee,dc=cn' AUTH_LDAP_BIND_PASSWORD = 'CzfdX629K7' AUTH_LDAP_USER_SEARCH = LDAPSearch( 'ou=People,dc=ops-coffee,dc=cn', ldap.SCOPE_SUBTREE, '(uid=%(user)s)', ) # Or: # AUTH_LDAP

Shell学习成果之一键自动安装LAMP自动安装脚本

守給你的承諾、 提交于 2019-12-05 03:09:01
一键自动安装LAMP环境,网速好的可以一键安装完成,网速不好的提前下载mysql安装包 系统版本:CentOS7.7.1908 MySQL版本:mysql-8.0.18 Apache版本:httpd-2.4.41 PHP版本:php-7.3.9 ###############################################START######################################################## #!/bin/bash #auto install LAMP #By kangjian 2019-11-18 #Httpd define path varible H_FILES=httpd-2.4.41.tar.bz2 H_FILES_DIR=httpd-2.4.41 H_URL=https://mirrors.aliyun.com/apache/httpd/ H_PREFIX=/usr/local/apache H_APR_URL=https://mirrors.aliyun.com/apache/apr/apr-1.7.0.tar.bz2 H_APR-UTIL_URL=https://mirrors.aliyun.com/apache/apr/apr-util-1.6.1.tar.bz2 #PHP define path

Shell学习成果之一键自动安装PHP7.3

瘦欲@ 提交于 2019-12-05 02:33:14
系统:CentOS7.7.1908 PHP: *********************************************************************START**************************************************************************** #!/bin/bash #auto install php #by 网络虾米哥 2019-11-20 yum -y install gcc gcc-c++ make zlib zlib-devel pcre pcre-devel libjpeg libjpeg-devel libpng libpng-devel freetype freetype-devel libxml2 libxml2-devel glibc glibc-devel glib2 glib2-devel bzip2 bzip2-devel ncurses ncurses-devel curl curl-devel e2fsprogs e2fsprogs-devel krb5 krb5-devel openssl openssl-devel openldap openldap-devel nss_ldap openldap-clients openldap-servers

Can't get deleted items from OpenLDAP Server using Content Synchronization Operation (syncrepl)

亡梦爱人 提交于 2019-12-05 02:09:53
I set up my OpenLDAP server on a Ubuntu 19.04 VM and allowed replication (using this tutorial: https://help.ubuntu.com/lts/serverguide/openldap-server.html#openldap-server-replication ). Everything for replication seems ok. I don't have set up a consumer server as my code will act as one, pulling modified elements regularly. The modified/added entries are correctly retrieved BUT I want to get deleted items and I can't seem to get it to work. As described by the RFC https://tools.ietf.org/html/rfc4533#section-3.3.2 , I should receive a Sync Info Message Containing an attribute named "syncUUIDs"

OpenLDAP配置TLS加密传输

不想你离开。 提交于 2019-12-05 00:11:20
一.环境 Server:基于 CentOS -7-x86_64-1511 Server IP: 172.18.12.203 OpenLDAP:openldap-2.4.44已安装 二.准备工作 1. 依赖包 #理论上只需要openssl与openssl-devel yum install *openssl* -y openldap编译需要开启"--with-tls"选项,可通过"./configure --help"查看相关说明,请参考: http://www.linuxidc.com/Linux/2017-10/147559.htm ; openssl相关依赖包一定要安装在openldap安装之前,在openldap安装之后再yum安装openssl相关依赖包,运行ldaps命令时时报" 573d212b daemon: TLS not supported (ldaps://0.0.0.0:636/)"错(如下图),安装openssl相关包之后重新编译安装openldap解决。 可以使用" /usr/local/openldap-2.4.44/libexec/slapd"命令查看执行命令是否关联相应libraries,上面就是通过此方法定位故障点的: http://comments.gmane.org/gmane.network.openldap.technical/874 2.

红帽学习笔记[RHCE]OpenLDAP 服务端与客户端配置

◇◆丶佛笑我妖孽 提交于 2019-12-04 23:16:29
目录 OpenLDAP 服务端与客户端配置 关于 LDIF 一个LDIF基本结构 一个条目 属性 Object 的类型 服务端 安装 生成证书 生成默认数据 修改基本的配置 导入基础数据 关于 ldif 的格式 批量创建用户 批量导入用户到 LDAP 客户端 安装 配置 ldap [有问题] 不使用SSL进行客户端配置 NFS 共享用户家目录 不配置 家目录共享 用户无法正常使用 配置服务端的 NFS 配置客户端的 autofs 查看客户端挂载情况 OpenLDAP 服务端与客户端配置 OpenLDAP 是 轻型目录访问协议 ,利用它可以进行统一的认证服务。如果需求需要配置多个服务器,并且多账号的话,可以考虑用 OpenLDAP 进行统一配置,来完成一组计算机之间的认证。 关于 LDIF 一个LDIF基本结构 一个条目 注:解释的不完整。 dn: ou=People,dc=example,dc=com ou: People objectClass: top objectClass: organizationalUnit dn 就是数据库中的唯一主键,在 LDAP 中唯一标识一个条目 ou 就是 organizationalUnit 该条目需要有 organizationalUnit 而 ou 这一行就是设置具体值得 objectClass 表示属性,类似于代码中的类的属性 属性