16.4 Configuring LDAP Objects

An eDirectory installation creates an LDAP server object and an LDAP Group object. The default configuration for LDAP Services is located in the directory on these two objects. You can modify the default configuration by using either the ConsoleOne LDAP snap-in or the LDAP Management task in NetIQ iManager.

The LDAP server object represents server-specific configuration data.

The LDAP Group object contains configuration information that can be conveniently shared among multiple LDAP servers. This object provides common configuration data and represents a group of LDAP servers. The servers have common data.

You can associate multiple LDAP server objects with one LDAP Group object. All the associated LDAP servers then get their server-specific configuration from their LDAP server object but get common or shared information from the LDAP Group object.

By default, the eDirectory installation program installs a single LDAP Group object and a single LDAP server object for each nldap.nlm or nldap.dlm. Later, you can associate multiple LDAP server objects with a single LDAP Group object.

IMPORTANT:Although it is possible to associate newer versions of an LDAP server object with older versions of LDAP Group objects, we recommend that you don't mix versions. For example, avoid associating an LDAP Group object in eDirectory 8.7.3 SP9 with an LDAP server object in eDirectory 8.8 SP5.

The amount of common information held in an LDAP Group object is limited. LDAP doesn’t need to read many attributes because the data contained in the attributes is incredibly common. Many LDAP servers will need to use the same data. Without a common or shared Group object, you would have to replicate that data across each LDAP server.

The LDAP server object allows more server-specific configuration options and data than the LDAP Group object allows.

Both objects have DN-syntax attributes that point to each other.

An additional association must be made so that the LDAP server can find its configuration data. This association is through the NCP™ server, which holds the customary eDirectory configuration data. The eDirectory installation program automatically makes the association.

Every eDirectory server has an NCP Server object. In the following figure, server Lundi illustrates this object as displayed in iManager:

An example icon for an NCP Server object

This object has an LDAP Server attribute, which points to the LDAP server object for a particular host eDirectory server. The following figure illustrates this attribute:

LDAP Server attribute

Typically, the LDAP server object, the LDAP Group object, and the NCP Server object are located in the same container. You name this container during the eDirectory installation, when you name the server and Admin context.

If you move the LDAP server object, you must place it in a writable replica.

16.4.1 Configuring LDAP Server and LDAP Group Objects on Linux

The LDAP configuration utility is ldapconfig. You can use ldapconfig on Linux, systems to modify, view, and refresh the attributes of LDAP server and LDAP Group objects.

Use the following syntax to view LDAP attribute values on Linux, systems:

ldapconfig get [...] | set attribute-value-list  [-t treename | -p hostname[:port]] [-w password] [-a user FDN] [-f]
ldapconfig [-t tree_name | -p host_name[:port]] [-w password] [-a user FDN] [-V] [-R] [-H] [-f] -v attribute,attribute2...

Use the following syntax to modify values of LDAP attributes on Linux:

ldapconfig [-t tree_name | -p host_name[:port]] [-w password] [-a admin_FDN] -s attribute=value,... 

Parameter

Description

-t treename

Name of the eDirectory tree where the component will be installed.

-p hostname

The name of the host. You could specify the DNS name or IP address also.

-w

The password of the user having administration rights.

-a

The fully distinguished name of the user having administration rights. For example:

cn=user.o=org1

get | -V

Lets you view all LDAP server/group attributes.

get | -v attribute list

Displays the current values of the attributes in the attribute list.

set | -s attribute-value pairs

Sets the attributes to the specified values.

-v

Lets you view the value of the LDAP attribute.

-s

Sets a value for an attribute of the installed components.

-R

Refreshes the LDAP server.

-V

Lets you view the current LDAP configuration settings.

-H

Lets you view the usage and help strings.

-f

Allows operations on a filtered replica.

attribute

A configurable LDAP server or group attribute name. For more information, see Attributes on the LDAP Server Object and Attributes on the LDAP Group Object.

Examples

To view the value of the attribute in the attribute list, enter the following command:

ldapconfig [-t tree_name | -p host_name[:port]] 
[-w password] [-a user_FDN] -v “Require TLS for simple binds with password”,”searchTimeLimit”

To configure the LDAP TCP port number and search size limit to 1000, enter the following command:

ldapconfig [-t tree_name | -p host_name[:port]] 
[-w password] [-a admin_FDN] -s “LDAP TCP Port=389”,“searchSizeLimit=1000”

Attributes on the LDAP Server Object

Use the LDAP server object to set up and manage the NetIQ LDAP server properties.

The following table provides a description of the LDAP server attributes:

Attribute

Description

LDAP Server

The fully distinguished name of the LDAP server object in eDirectory.

LDAP Host Server

The fully distinguished name of the host eDirectory server that the LDAP server runs on.

LDAP Group

The LDAP Group object in eDirectory that this LDAP server is a member of.

LDAP Server Bind Limit

The number of clients that can simultaneously bind to the LDAP server. A value of 0 (zero) indicates no limit.

LDAP Server Idle Timeout

The period of inactivity from a client after which LDAP server terminates the connection with this client. A value of 0 (zero) indicates no limit.

LDAP Enable TCP

This option is deprecated in the eDirectory 8.8 SP8 release. It is available through ldapInterfaces.

For more information, see ldapInterfaces.

LDAP Enable TLS

This option has been deprecated in eDirectory 8.8 SP8. However, it is available through ldapInterfaces.

For more information, see ldapInterfaces.

LDAP TCP Port

This option has been deprecated in eDirectory 8.8 SP8. However, it is available through ldapInterfaces.

For more information, see ldapInterfaces.

LDAP TLS Port

This option has been deprecated in eDirectory 8.8 SP8. However, it is available through ldapInterfaces.

For more information, see ldapInterfaces.

keyMaterialName

The name of the Certificate object in eDirectory that is associated with this LDAP server and will be used for SSL LDAP connections.

searchSizeLimit

The maximum number of entries that the LDAP server will return to an LDAP client in response to a search. A value of 0 (zero) indicates no limit.

If the user has the administrator rights on the LDAP server object, the searchSizeLimit value is not considered.

searchTimeLimit

The maximum number of seconds after which an LDAP search will be timed out by the LDAP server. A value of 0 (zero) indicates no limit.

If the user has the administrator rights on the LDAP server object, the searchTimeLimit value is not considered.

filteredReplicaUsage

Specifies whether the LDAP server should use a filtered replica for an LDAP search.

Values=1 (use filtered replica), 0 (do not use filtered replica)

sslEnableMutualAuthentication

Specifies whether SSL-based mutual authentication (Certificate-based client authentication) is enabled on the LDAP server.

ldapTLSVerifyClientCertificate

Enables or disables verification of the client certificate for a TLS operation through LDAP.

ldapNonStdAllUserAttrsMode

Enables or disables the non standard, all user, and operational attributes.

ldapBindRestrictions

Enables LDAP bind restrictions and cipher level on LDAP client connections.This attribute can be used to control client connections. You can set any of the following four LDAP bind restrictions using iManager:

  • NONE - This is enabled by default. This option will enable both anonymous simple bind and non-anonymous simple bind. The value of this option is 0.

  • Disallows anonymous simple bind - Setting this value will disable the anonymous simple bind. Non-anonymous simple bind will be enabled. Value 1.

  • Disallows non-anonymous simple bind - This option will disable non-anonymous simple bind. Value 2.

  • Disallows anonymous simple bind and non-anonymous simple bind - This option will disable anonymous simple bind and non-anonymous simple bind. Value 3.

    NOTE:Disabling non-anonymous simple bind will enforce appropriate grace login limits.

In addition to the above options, you can set an additional cipher level also using the same attribute.

Using iManager you can choose the following options:

  • Use Cipher High - This will use a cipher level larger than 128-bit encryption, and some cipher suites with 128-bit keys. Value 48.

  • Use Medium Cipher - This will use a cipher level of 128-bit encryption. Value 32.

  • Use Low Cipher - This will use 64 or 56-bit encryption, but excluding export cipher suites. Value 16.

The default is Export with a Cipher level including 40 and 56-bit encryption.

For more information on the combination values of ldapbindrestrictions and cipher levels that can be used, refer to Table 16-1.

ldapChainSecureRequired

This is a boolean attribute. If enabled, chaining to other eDirectory will be over secure NCP.

By default, the attribute is disabled.

ldapInterfaces

A multi-valued SYN_CI_STRING attribute used to store LDAP URLs on which LDAP server listens (on both cleartext and secure ports). This attribute is useful in configuring multiple instances that require each instance of the eDirectory server to listen on a specific interface. It can be configured with the IP addresses and port numbers in the LDAP URL format.The LDAP server listens on these IP addresses and ports.

The following are examples for IPv4 and IPv6 listeners.

ldap://192.168.1.1:389 - To specify for IPv4 specific address on clear text port
ldaps://192.168.2.1:636 - To specify for IPv4 specific address on secure port
ldap://[2015::3]:389 - To specify for IPv6 specific address on clear text port
ldaps://[2015::3]:636 - To specify for IPv6 specific address on secure port
ldap://[::]:389 - To specify for IPv6 unspecified address on clear text port
ldaps://[::]:636 - To specify for IPv6 unspecified address on secure port

The LDAP Enable TCP, LDAP Enable TLS, LDAP TCP Port, and LDAP TLS Port attributes are not populated if a new server is configured from eDirectory 8.8 SP8. The ldapInterface atrribute values corresponding to the ports selected for ldap and ldaps during configuration are populated. For example, ldap://:389, ldaps://:636. By default, only IPv4 interface values are added to the ldapInterfaces attribute.

During upgrade, eDirectory is triggered to delete the LDAP Enable TCP, LDAP Enable TLS, LDAP TCP Port, LDAP TLS Port attributes. It populates corresponding values of these attributes in ldapInterface. The ldapconfig set command takes comma separated values and replaces all the existing values with the new values.

ldapStdCompliance

eDirectory LDAP server by default does not return the sub-ordinate referrals for ONE level search. To enable this, you need to turn on ldapStdCompliance with a value 1. Setting this value will make the LDAP server return the sub-ordinate referrals for ONE level search.

ldapChainSecureRequired

This is a boolean attribute. If this is enabled, the chaining to other eDirectory will be over secure NCP. By default, the attribute will be disabled.

ldapEnablePSearch

Specifies whether or not the persistent search feature is enabled on the LDAP server.

Values= yes, no

ldapMaximumPSearchOperations

An integer value that limits the number of concurrent persistent search operations possible. A value of 0 specifies unlimited search operations.

ldapIgnorePSearchLimitsForEvents

Indicates whether size and time limits should be ignored after the persistent search request has sent the initial result set.

Values= yes, no

If this attribute is set to false, the entire persistent search operation is subject to the search limits. If either limit is reached, the search fails with the appropriate error message.

ldapGeneralizedTime

Enable Generalized Time to display time in the YYYYMMDDHHmmSS.0Z format.

Values= yes, no

ldapPermissiveModify

Enable Permissive Modify Control to extend the LDAP modify operation. If an attempt is made to delete an attribute that does not exist or to add any value to an attribute that already exists, the operation goes through without displaying any error message

Values= yes, no

Table 16-1 Combination Values of ldapbindrestrictions and Cipher Levels

ldapbindrestriction

Cipher Level

Combination Value

None

None

0

High

48

Medium

32

Low

16

Disallows anonymous simple bind

None

1

High

49

Medium

33

Low

17

Disallow local bind

None

2

High

50

Medium

34

Low

18

Disallow anonymous simple bind and unbind

None

3

High

51

Medium

35

Low

19

Attributes on the LDAP Group Object

Use the LDAP Group object to set up and manage the way LDAP clients access and use the information on the NetIQ LDAP server.

To require TLS for simple binds, see Requiring TLS for Simple Binds with Passwords. This attribute specifies whether the LDAP server allows transmission of passwords in clear text from an LDAP client. Values=0 (no) or 1 (yes).

To specify a default referral, referralIncludeFilter, referralExludeFilter as well as how LDAP servers process LDAP referrals, see Using Referrals.