Installation guide

Chapter 4. Advanced Setup and Configuration
After the default Directory Server and Admin Server have been configured, there are tools available to
manage, create, and remove server instances. T hese include Admin Server configurations to allow
people to access the Directory Server files remotely, silent setup tools for installing instances from file
configuration, and instance setup and removal scripts.
4.1. Working with Admin Server Instances
There are two additional setup steps that can be done with the Admin Server. T his first allows the Admin
Server to be accessed by remote clients, so that users can install and launch the Directory Server
Console and still access the remote Directory Server file, such as help files. T he next allows proxy
HTTP servers to be used for the Admin Server.
NOTE
If you lock yourself out of the Console or Admin Server, you may have to edit the Admin Server
configuration directly via LDAP. See
http://directory.fedoraproject.org/wiki/Howto:AdminServerLDAPMgmt. for information on editing the
Admin Server configuration.
4.1.1. Configuring IP Authorization on the Admin Server
The Directory Server Console can be launched from remote machines to access an instance of
Directory Server. T he client running Directory Server Console needs access to the Admin Server to
access support files like the help content and documentation.
To configure the Admin Server to accept the client IP address:
1. On the same machine on which the Admin Server is running, launch the Console.
redhat-idm-console
2. In the Admin Server Console, click the Configuration tab, then click the Network tab.
3. In the Connection Restrictions Settings section, select IP Addresses to Allow
from the pull down menu.
4. Click Edit.
5. In the IP Addresses field, enter a wildcard to allow the Admin Server to allow all IP addresses to
access it. For example, for IPv4:
*.*.* .*
Both IPv4 and IPv6 addresses are supported.
6. Restart the Admin Server.
WARNING
Adding the client machine proxy IP address to the Admin Server creates a potential security hole.
Chapter 4. Advanced Setup and Configuration
4 3