40
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter LDAP server view.
ldap server
server-name
N/A
3.
Specify the administrator
DN.
login-dn
dn-string
By default, no administrator DN is
specified.
The administrator DN specified on the
device must be the same as
configured on the LDAP server.
4.
Configure the
administrator password.
login-password
{
cipher
|
simple
}
password
By default, no administrator
password is specified.
Configuring LDAP user attributes
To authenticate a user, an LDAP client must complete the following operations:
1.
Establish a connection to the LDAP server.
2.
Obtain the user DN from the LDAP server.
3.
Use the user DN and the user password to bind with the LDAP server.
LDAP provides a DN search mechanism for obtaining the user DN. According to the mechanism, an
LDAP client sends search requests to the server based on the search policy determined by the LDAP user
attributes of the LDAP client.
The LDAP user attributes include:
•
Search base DN.
•
Search scope.
•
Username attribute.
•
Username format.
•
User object class.
If the LDAP server contains many directory levels, a user DN search starting from the root directory can
take a long time. To improve efficiency, you can change the start point by specifying the search base DN.
To configure LDAP user attributes:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter LDAP server view.
ldap server
server-name
N/A
3.
Specify the user search base
DN.
search-base-dn
base-dn
By default, no user search base DN
is specified.
4.
(Optional.) Specify the user
search scope.
search-scope
{
all-level
|
single-level
}
By default, the user search scope is
all-level
.
5.
(Optional.) Specify the
username attribute.
user-parameters
user-name-attribute
{
name-attribute
|
cn
|
uid
}
By default, the username attribute
is
cn
.
6.
(Optional.) Specify the
username format.
user-parameters
user-name-format
{
with-domain
|
without-domain
}
By default, the username format is
without-domain
.