openldap 2.4.11 and test018
by Francis Swasey
I have been driving myself nuts today. I'm attempting to move to using
DB 4.6.21 (plus the three patches) and have discovered (probably
re-discovered) that building the backends as modules and then attempting
to run "make tests" causes test018 to fail because bdb-mod can't
resolve ldap_modify_ext.
I can't find anything documented concerning this (README, INSTALL
documents, FAQ, google search). But if I remove "--enable-modules" from
the configure options, test018 runs just fine.
Am I really this unique or have I missed some prominent statement that
backend modules can not be tested?
If it matters, I'm compiling on Red Hat Enterprise Linux Server release
5.2 (Tikanga).
--
Frank Swasey | http://www.uvm.edu/~fcs
Sr Systems Administrator | Always remember: You are UNIQUE,
University of Vermont | just like everyone else.
"I am not young enough to know everything." - Oscar Wilde (1854-1900)
14 years, 12 months
Error while importing base ldif
by Arun NAIR
Hey everybody,
I'm trying to import the base ldif file to the OpenLDAP server
configured with back-sql using MySQL as backend. Everything is fine
except that I'm unable to import my ldif's into the database.
it gives an error:
slapadd: database doesn't support necessary operations.
When i try to shutdown slapd and add with ldapadd i get the error
message of
ldap_bind: Invalid credentials (49)
Can't figure it out at all.
Please badly in need of help.
Regards,
Arun Nair
My ldif file is below
dn: dc=abc,dc=corp
objectClass: top
objectClass: dcObject
objectClass: organization
dc: abc
o: ABC Corp
description: ABC Corporation
dn: cn=root,dc=abc,dc=corp
objectClass: organizationalRole
objectClass: sim[pleSecurityObject
cn: admin
description: LDAP Administrator
userPassword: {SSHA}Kv+99W65RwsYJQNxUuD90X5WZXyH+irl
14 years, 12 months
chaining and proxy
by Guillaume Rousse
Hello.
I successfully setup the chain overlay, so as to push changes from a
slave to a master, with something as:
overlay chain
chain-uri "ldap://ldap1.domain.tld"
chain-idassert-bind bindmethod="simple"
binddn="cn=chain,ou=roles,dc=domain,dc=tld"
credentials="s3cr3t"
mode="self"
chain-idassert-authzFrom "*"
chain-tls start
chain-return-error TRUE
I'm curious, tough, why the slave has to use a proxy identity to
authenticate on the master, instead of reusing original query
credentials. Is there something preventing it, or is just that all
examples I found sofar were using it ?
I was also curious to know if the slapauth tool was usable to test such
kind of proxy setup. Reading the man page, it seems rather adapted to
testing identity mapping through authz-regexp directives.
14 years, 12 months
Synchronizing with backend mysql
by kiran madala
Hi,
I was wondering if openLDAP has any connectors to synchronize the users, groups in the directory to an external database such as mysql.
Thank you.
_________________________________________________________________
14 years, 12 months