the LDIF format (LDAP data interchange format) for this. An LDIF file is a simple text
file that can contain an arbitrary number of attribute and value pairs. The LDIF file for
creating a rough framework for the example in
Figure 4.1, “Structure of an LDAP Di-
rectory”
(page 38) would look like that in
Example 4.2, “Example for an LDIF File”
(page 62).
IMPORTANT: Encoding of LDIF Files
LDAP works with UTF-8 (Unicode). Umlauts must be encoded correctly. Other-
wise, avoid umlauts and other special characters or use
recode
to recode the
input to UTF-8.
Example 4.2
Example for an LDIF File
# The Organization
dn: dc=example,dc=com
objectClass: dcObject
objectClass: organization
o: Example dc: example
# The organizational unit development (devel)
dn: ou=devel,dc=example,dc=com
objectClass: organizationalUnit
ou: devel
# The organizational unit documentation (doc)
dn: ou=doc,dc=example,dc=com
objectClass: organizationalUnit
ou: doc
# The organizational unit internal IT (it)
dn: ou=it,dc=example,dc=com
objectClass: organizationalUnit
ou: it
Save the file with the
.ldif
suffix then pass it to the server with the following com-
mand:
ldapadd -x -D <dn of the administrator> -W -f <file>.ldif
-x
switches off the authentication with SASL in this case.
-D
declares the user that
calls the operation. The valid DN of the administrator is entered here just like it has
been configured in
slapd.conf
. In the current example, this is
cn=Administrator,dc=example,dc=com
.
-W
circumvents entering the pass-
word on the command line (in clear text) and activates a separate password prompt.
62
Security Guide
Summary of Contents for LINUX ENTERPRISE DESKTOP 11
Page 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Page 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Page 10: ......
Page 29: ...Part I Authentication...
Page 30: ......
Page 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Page 126: ......
Page 127: ...Part II Local Security...
Page 128: ......
Page 158: ......
Page 173: ...Part III Network Security...
Page 174: ......
Page 194: ......
Page 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Page 210: ......
Page 228: ......
Page 229: ...Part IV Confining Privileges with Novell AppArmor...
Page 230: ......
Page 274: ......
Page 300: ......
Page 328: ......
Page 340: ......
Page 342: ......
Page 386: ......
Page 387: ...Part V The Linux Audit Framework...
Page 388: ......