LDAPADDENT(8) Maintenance Procedures LDAPADDENT(8)
NAME
ldapaddent - create LDAP entries from corresponding /etc files
SYNOPSIS
ldapaddent [
-cpv] [
-a authenticationMethod] [
-b baseDN]
-D bindDN [
-w bind_password] [
-j passwdFile] [
-f filename]
database ldapaddent [
-cpv]
-a sasl/GSSAPI [
-b baseDN] [
-f filename]
database ldapaddent -d [
-v] [
-a authenticationMethod] [
-D bindDN]
[
-w bind_password] [
-j passwdFile]
database ldapaddent [
-cpv]
-h LDAP_server[:
serverPort] [
-M domainName]
[
-N profileName] [
-P certifPath] [
-a authenticationMethod]
[
-b baseDN]
-D bindDN [
-w bind_password] [
-f filename]
[
-j passwdFile]
database ldapaddent [
-cpv]
-h LDAP_server[:
serverPort] [
-M domainName]
[
-N profileName] [
-P certifPath] [
-a authenticationMethod]
[
-b baseDN] [
-f filename]
database ldapaddent -d [
-v]
-h LDAP_server[:
serverPort] [
-M domainName]
[
-N profileName] [
-P certifPath] [
-a authenticationMethod]
[
-b baseDN]
-D bindDN [
-w bind_password] [
-j passwdFile]
databaseDESCRIPTION
ldapaddent creates entries in LDAP containers from their corresponding
/etc files. This operation is customized for each of the standard
containers that are used in the administration of Solaris systems. The
database argument specifies the type of the data being processed. Legal
values for this type are one of
aliases,
auto_*,
bootparams,
ethers,
group,
hosts (including both IPv4 and IPv6 addresses),
ipnodes (alias for
hosts),
netgroup,
netmasks,
networks,
passwd,
shadow,
protocols,
publickey,
rpc, and
services. In addition to the preceding, the
database argument can be one of the RBAC-related files (see
rbac(7)):
o
/etc/user_attr o
/etc/security/auth_attr o
/etc/security/prof_attr o
/etc/security/exec_attr By default,
ldapaddent reads from the standard input and adds this data
to the LDAP container associated with the database specified on the
command line. An input file from which data can be read is specified
using the
-f option.
If you specify the
-h option,
ldapaddent establishes a connection to the
server indicated by the option in order to obtain a
DUAProfile specified
by the
-N option. The entries will be stored in the directory described
by the configuration obtained.
By default (if the
-h option is not specified), entries will be stored in
the directory based on the client's configuration. To use the utility in
the default mode, the Solaris LDAP client must be set up in advance.
The location where entries are to be written can be overridden by using
the
-b option.
If the entry to be added exists in the directory, the command displays an
error and exits, unless the
-c option is used.
Although, there is a
shadow database type, there is no corresponding
shadow container. Both the
shadow and the
passwd data is stored in the
people container itself. Similarly, data from
networks and
netmasks databases are stored in the
networks container.
The
user_attr data is stored by default in the
people container. The
prof_attr and
exec_attr data is stored by default in the
SolarisProfAttr container.
You must add entries from the
passwd database before you attempt to add
entries from the
shadow database. The addition of a
shadow entry that
does not have a corresponding
passwd entry will fail.
The
passwd database must precede the
user_attr database.
For better performance, the recommended order in which the databases
should be loaded is as follows:
o
passwd database followed by
shadow database
o
networks database followed by
netmasks database
o
bootparams database followed by
ethers database
Only the first entry of a given type that is encountered will be added to
the LDAP server. The
ldapaddent command skips any duplicate entries.
OPTIONS
The
ldapaddent command supports the following options:
-a authenticationMethod Specify authentication method. The default value is what has been
configured in the profile. The supported authentication methods are:
o
simple o
sasl/CRAM-MD5 o
sasl/DIGEST-MD5 o
sasl/GSSAPI o
tls:simple o
tls:sasl/CRAM-MD5 o
tls:sasl/DIGEST-MD5 Selecting
simple causes passwords to be sent over the network in
clear text. Its use is strongly discouraged. Additionally, if the
client is configured with a profile which uses no authentication,
that is, either the
credentialLevel attribute is set to
anonymous or
authenticationMethod is set to
none, the user must use this option to
provide an authentication method. If the authentication method is
sasl/GSSAPI,
bindDN and
bindPassword is not required and the
hosts and
ipnodes fields of
/etc/nsswitch.conf must be configured as:
hosts: dns files
ipnodes: dns files
See
nsswitch.conf(5).
-b baseDN Create entries in the
baseDN directory.
baseDN is not relative to the
client's default search base, but rather. it is the actual location
where the entries will be created. If this parameter is not
specified, the first search descriptor defined for the service or the
default container will be used.
-c Continue adding entries to the directory even after an error. Entries
will not be added if the directory server is not responding or if
there is an authentication problem.
-D bindDN Create an entry which has write permission to the
baseDN. When used
with
-d option, this entry only needs read permission.
-d Dump the LDAP container to the standard output in the appropriate
format for the given database.
-f filename Indicates input file to read in an
/etc/ file format.
-h LDAP_server[:
serverPort]
Specify an address (or a name) and an optional port of the LDAP
server in which the entries will be stored. The current naming
service specified in the
nsswitch.conf file is used. The default
value for the port is
389, except when TLS is specified as the
authentication method. In this case, the default LDAP server port
number is
636.
-j passwdFile Specify a file containing the password for the bind DN or the
password for the SSL client's key database. To protect the password,
use this option in scripts and place the password in a secure file.
This option is mutually exclusive of the
-w option.
-M domainName The name of a domain served by the specified server. If not
specified, the default domain name will be used.
-N profileName Specify the
DUAProfile name. A profile with such a name is supposed
to exist on the server specified by
-h option. Otherwise, a default
DUAProfile will be used. The default value is
default.
-P certifPath The certificate path for the location of the certificate database.
The value is the path where security database files reside. This is
used for TLS support, which is specified in the
authenticationMethod and
serviceAuthenticationMethod attributes. The default is
/var/ldap.
-p Process the
password field when loading password information from a
file. By default, the
password field is ignored because it is
usually not valid, as the actual password appears in a
shadow file.
-w bindPassword Password to be used for authenticating the
bindDN. If this parameter
is missing, the command will prompt for a password.
NULL passwords
are not supported in LDAP.
When you use
-w bindPassword to specify the password to be used for
authentication, the password is visible to other users of the system
by means of the
ps command, in script files or in shell history.
If you supply "
-" (hyphen) as a password, you will be prompted to
enter a password.
-v Verbose.
OPERANDS
The following operands are supported:
database The name of the database or service name. Supported values are:
aliases,
auto_*,
bootparams,
ethers,
group,
hosts (including IPv6
addresses),
netgroup,
netmasks,
networks,
passwd,
shadow,
protocols,
publickey,
rpc, and
services. Also supported are
auth_attr,
prof_attr,
exec_attr,
user_attr, and
projects.
EXAMPLES
Example 1: Adding Password Entries to the Directory Server
The following example shows how to add password entries to the directory
server:
example#
ldapaddent -D "cn=directory manager" -w secret \ -f /etc/passwd passwd Example 2: Adding Group Entries
The following example shows how to add
group entries to the directory
server using
sasl/CRAM-MD5 as the authentication method:
example#
ldapaddent -D "cn=directory manager" -w secret \ -a "sasl/CRAM-MD5" -f /etc/group group Example 3: Adding auto_master Entries
The following example shows how to add
auto_master entries to the
directory server:
example#
ldapaddent -D "cn=directory manager" -w secret \ -f /etc/auto_master auto_master Example 4: Dumping passwd Entries from the Directory to File
The following example shows how to dump
password entries from the
directory to a file
foo:
example#
ldapaddent -d passwd > foo Example 5: Adding Password Entries to a Specific Directory Server
The following example shows how to add password entries to a directory
server that you specify:
example#
ldapaddent -h 10.10.10.10:3890 \ -M another.domain.name -N special_duaprofile \ -D "cn=directory manager" -w secret \ -f /etc/passwd passwdEXIT STATUS
The following exit values are returned:
0 Successful completion.
>0 An error occurred.
FILES
/var/ldap/ldap_client_file /var/ldap/ldap_client_cred Files containing the LDAP configuration of the client. These files
are not to be modified manually. Their content is not guaranteed to
be human readable. Use
ldapclient(8) to update these files.
ATTRIBUTES
See
attributes(7) for descriptions of the following attributes:
+--------------------+-----------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+--------------------+-----------------+
|Interface Stability | Committed |
+--------------------+-----------------+
SEE ALSO
ldap(1),
ldaplist(1),
ldapmodify(1),
ldapmodrdn(1),
ldapsearch(1),
nsswitch.conf(5),
attributes(7),
idsconfig(8),
ldapclient(8)CAUTION
Currently StartTLS is not supported by
libldap.so.5, therefore the port
number provided refers to the port used during a TLS open, rather than
the port used as part of a StartTLS sequence. For example:
-h foo:1000 -a tls:simple
The preceding refers to a raw TLS open on host
foo port 1000, not an
open, StartTLS sequence on an unsecured port 1000. If port 1000 is
unsecured the connection will not be made.
May 13, 2017
LDAPADDENT(8)