LDAP-UX Client Services B.04.15 Administrator's Guide

5.3.10.6 Directory Server Security Policies...............................................................................108
5.4 Adding One or More Users...........................................................................................................110
5.5 Adding a Directory Replica...........................................................................................................111
5.6 User and Group Management.......................................................................................................112
5.6.1 LDAP User and Group Command-Line Tools......................................................................112
5.6.2 Listing Users..........................................................................................................................114
5.6.3 Listing Groups.......................................................................................................................115
5.6.4 Adding a User or a Group.....................................................................................................115
5.6.4.1 Examples of Adding a User ..........................................................................................116
5.6.4.2 Examples of Adding a Group........................................................................................118
5.6.4.3 Modifying Defaults in /etc/opt/ldapux/ldapug.conf ....................................................118
5.6.5 Modifying a User ..................................................................................................................119
5.6.6 Modifying a Group................................................................................................................120
5.6.7 Deleting a User or a Group....................................................................................................121
5.6.7.1 Examples.......................................................................................................................121
5.6.8 Checking LDAP-UX Configuration ......................................................................................122
5.6.8.1 Checking if LDAP-UX is Configured............................................................................122
5.6.8.2 Listing Available Templates..........................................................................................123
5.6.8.3 Discovering Required Attributes..................................................................................123
5.6.8.4 Displaying Configuration Defaults...............................................................................123
5.6.8.5 Displaying the LDAP-UX Profile's DN.........................................................................124
5.6.8.6 Displaying Default Search Base....................................................................................124
5.6.8.7 Displaying Recommended Attributes...........................................................................124
5.6.8.8 Displaying Attribute Mapping for a Specific Name Service.........................................124
5.7 Displaying the Proxy User's DN...................................................................................................126
5.8 Verifying the Proxy User...............................................................................................................126
5.9 Creating a New Proxy User...........................................................................................................126
5.9.1 Example.................................................................................................................................126
5.10 Displaying the Current Profile....................................................................................................126
5.11 Creating a New Profile................................................................................................................127
5.12 Modifying a Profile......................................................................................................................127
5.13 Changing Which Profile a Client Is Using...................................................................................127
5.14 Changing from Anonymous Access to Proxy Access.................................................................127
5.15 Changing from Proxy Access to Anonymous Access.................................................................128
5.16 Performance Considerations........................................................................................................129
5.16.1 Minimizing Enumeration Requests.....................................................................................129
5.17 Client Daemon Performance........................................................................................................129
5.17.1 ldapclientd Caching.............................................................................................................129
5.17.2 ldapclientd Persistent Connections.....................................................................................131
5.18 Troubleshooting...........................................................................................................................132
5.18.1 Enabling and Disabling LDAP-UX Logging.......................................................................132
5.18.2 Enabling and Disabling PAM Logging................................................................................132
5.18.3 Directory Server Log Files...................................................................................................133
5.18.4 User Cannot Log on to Client System.................................................................................133
6 Command and Tool Reference.................................................................................137
6.1 The LDAP-UX Client Services Components.................................................................................137
6.2 Client Management Tools..............................................................................................................140
6.2.1 The create_profile_entry Tool................................................................................................140
6.2.1.1 Syntax............................................................................................................................140
6.2.2 The create_profile_cache Tool...............................................................................................140
6.2.2.1 Syntax............................................................................................................................140
6.2.2.2 Examples.......................................................................................................................140
6.2.3 The create_profile_schema Tool............................................................................................141
6 Table of Contents