Red Hat Directory Server 8.0 Administrator's Guide

This will match any user ID and map to the result of the the subtree search with base
ou=People,dc=example,dc=com and filter cn=userId.
The Directory Server has pre-defined SASL mapping rules to handle some of the most common
cases:
Kerberos UID Mapping. This mapping matches a Kerberos principal using a two part realm,
such as user@example.com. The realm is then used to define the search base, and the
authid defines the filter. In this example, the search base would be dc=example,dc=com and
the filter of (uid=user).
RFC 2829 DN Syntax. This mapping matches an authid that is a valid DN (defined in RFC
2829) prefixed by dn:. The authid maps directly to the specified DN.
RFC 2829 U Syntax. This mapping matches an authid that is a UID prefixed by u:. The
value specified after the prefix defines a filter of (uid=value). The search base is hard-coded
to be the suffix of the default userRoot database.
uid Mapping. This mapping matches an authid that is any plain string that does not match
the other default mapping rules. It use this value to define a filter of (uid=value). The search
base is hard-coded to be the suffix of the default userRoot database.
3. Configuring SASL Identity Mapping from the Console
To create a new SASL identity mapping, do the following:
1. In the Directory Server Console, open the Configuration tab.
2. Select the SASL Mapping tab.
Chapter 12. Managing SASL
424