LDAP-UX Client Services B.04.15 with Microsoft Windows Active Directory Server Administrator's Guide (edition 8)

Table Of Contents
The setup program asks you a series of questions and usually provides default answers.
Press the Enter key to accept the default, or change the value and press the Enter key. At
any point during setup, press the Control-b keys to return to the previous screen or press
the Control-c keys to exit setup.
2. Choose Windows 2000, 2003 or 2003 R2 as your LDAP directory server (option 2).
3. Enter either the host name or IP address of the directory server where your profile exists,
or where you want to create a new profile.
4. Enter the port number of the previous specified directory server that you want to store the
profile, from Appendix A. The default port number is 389.
5. Setup will check the directory to see if the schema has been extended with the LDAP-UX
Client Services object class DUAConfigProfile, enter the DN (Distinguished Name) and
password of a user. This must be done once. See Appendix B for a detailed description of
these object classes.
If the schema has already been extended, setup skips this step. Otherwise, to extend the
schema, enter the DN and password of a directory user who can extend the directory schema
from Appendix A.
6. If the new automount schema has already been imported, setup skips this step.
Otherwise, you will be asked whether or not you want to install the new automount schema
which is based on RFC 2307-bis. Enter "yes" to extend the new automount schema into the
LDAP directory server. Enter "no" if you do not want to import new automount schema into
the LDAP directory server. Setup skips to step 7 if you enter "no".
7. For new profiles, the profile object must be created under the 'ConfigurationNamingContext'
container, which is usually CN=Configuration, <domain root>, or it can be created
under any path with an object class of 'Container'. These container entries must exist before
any new profile entries can be created.
8. Enter either the DN of a new profile, or the DN of an existing profile, from Appendix A.
To display all the profiles in the directory, use a command like the following:
ldapsearch -D <directory user> -w <credentials> -s sub
-b "CN=System, DC=cup, DC=hp, DC=com" -h <Active Directory host>
-p <Active Directory port> objectclass=DUAConfigProfile
If you are using an existing profile, setup configures your client, downloads the profile, and
exits. In this case, continue by going to the section “Step 2: Install the PAM Kerberos Product”
(page 44).
9. If you are creating a new profile, enter the DN and password of a directory user who can
create a new profile, from Appendix A.
10. Choose the attribute map set to be used with the directory server. You can select SFU 2.0
(option 1), SFU 3.0/SFU3.5 (option 2) or RFC2307 (option 3). By default, the SFU 3.0/SFU3.5
(option 2) is used as the attribute map set.
11. Setup now checks the value of the enable_starttls parameter. Setup also checks if the
certificate database files, cert7.db or cert8.db and key3.db, exist on your client system.
If these files do not exist, setup skips this step.
If the value of the enable_starttls parameter is 0 (disabled) or undefined, you will be
asked whether you want to use SSL or not. Enter "yes" if you want to use SSL for the secure
communication between LDAP clients and the Windows 2000, 2003 or 2003 R2 Active
Directory Server. Enter "no" if you don't want to use SSL. Continue to step 12.
Otherwise, if the value of the enable_starttls parameter is 1 (enabled), you will be
asked whether you want to use TLS or not. Enter "yes" if you want to use TLS for the secure
communication between LDAP clients and the Windows 2003 or 2003 R2 Active Directory
Server. Enter "no" if you don't want to use TLS. Continue to step 12.
Configuring LDAP-UX Client Services 37