LDAPADDENT(8) Maintenance Commands and Procedures LDAPADDENT(8)

NAME


ldapaddent - create LDAP entries from corresponding /etc files

SYNOPSIS


ldapaddent [-cpv] [-a authenticationMethod] [-b baseDN]
-D bindDN [-w bind_password] [-j passwdFile] [-f filename]
database


ldapaddent [-cpv] -a sasl/GSSAPI [-b baseDN] [-f filename]
database


ldapaddent -d [-v] [-a authenticationMethod] [-D bindDN]
[-w bind_password] [-j passwdFile] database


ldapaddent [-cpv] -h LDAP_server[:serverPort] [-M domainName]
[-N profileName] [-P certifPath] [-a authenticationMethod]
[-b baseDN] -D bindDN [-w bind_password] [-f filename]
[-j passwdFile] database


ldapaddent [-cpv] -h LDAP_server[:serverPort] [-M domainName]
[-N profileName] [-P certifPath] [-a authenticationMethod]
[-b baseDN] [-f filename] database


ldapaddent -d [-v] -h LDAP_server[:serverPort] [-M domainName]
[-N profileName] [-P certifPath] [-a authenticationMethod]
[-b baseDN] -D bindDN [-w bind_password] [-j passwdFile]
database


DESCRIPTION


ldapaddent creates entries in LDAP containers from their
corresponding /etc files. This operation is customized for each of
the standard containers that are used in the administration of
Solaris systems. The database argument specifies the type of the data
being processed. Legal values for this type are one of aliases,
auto_*, bootparams, ethers, group, hosts (including both IPv4 and
IPv6 addresses), ipnodes (alias for hosts), netgroup, netmasks,
networks, passwd, shadow, protocols, publickey, rpc, and services. In
addition to the preceding, the database argument can be one of the
RBAC-related files (see rbac(7)):

o /etc/user_attr

o /etc/security/auth_attr

o /etc/security/prof_attr

o /etc/security/exec_attr


By default, ldapaddent reads from the standard input and adds this
data to the LDAP container associated with the database specified on
the command line. An input file from which data can be read is
specified using the -f option.


If you specify the -h option, ldapaddent establishes a connection to
the server indicated by the option in order to obtain a DUAProfile
specified by the -N option. The entries will be stored in the
directory described by the configuration obtained.


By default (if the -h option is not specified), entries will be
stored in the directory based on the client's configuration. To use
the utility in the default mode, the Solaris LDAP client must be set
up in advance.


The location where entries are to be written can be overridden by
using the -b option.


If the entry to be added exists in the directory, the command
displays an error and exits, unless the -c option is used.


Although, there is a shadow database type, there is no corresponding
shadow container. Both the shadow and the passwd data is stored in
the people container itself. Similarly, data from networks and
netmasks databases are stored in the networks container.


The user_attr data is stored by default in the people container. The
prof_attr and exec_attr data is stored by default in the
SolarisProfAttr container.


You must add entries from the passwd database before you attempt to
add entries from the shadow database. The addition of a shadow entry
that does not have a corresponding passwd entry will fail.


The passwd database must precede the user_attr database.


For better performance, the recommended order in which the databases
should be loaded is as follows:

o passwd database followed by shadow database

o networks database followed by netmasks database

o bootparams database followed by ethers database


Only the first entry of a given type that is encountered will be
added to the LDAP server. The ldapaddent command skips any duplicate
entries.

OPTIONS


The ldapaddent command supports the following options:

-a authenticationMethod

Specify authentication method. The default value is what has been
configured in the profile. The supported authentication methods
are:

o simple

o sasl/CRAM-MD5

o sasl/DIGEST-MD5

o sasl/GSSAPI

o tls:simple

o tls:sasl/CRAM-MD5

o tls:sasl/DIGEST-MD5
Selecting simple causes passwords to be sent over the network in
clear text. Its use is strongly discouraged. Additionally, if the
client is configured with a profile which uses no authentication,
that is, either the credentialLevel attribute is set to anonymous
or authenticationMethod is set to none, the user must use this
option to provide an authentication method. If the authentication
method is sasl/GSSAPI, bindDN and bindPassword is not required
and the hosts and ipnodes fields of /etc/nsswitch.conf must be
configured as:

hosts: dns files
ipnodes: dns files

See nsswitch.conf(5).


-b baseDN

Create entries in the baseDN directory. baseDN is not relative to
the client's default search base, but rather. it is the actual
location where the entries will be created. If this parameter is
not specified, the first search descriptor defined for the
service or the default container will be used.


-c

Continue adding entries to the directory even after an error.
Entries will not be added if the directory server is not
responding or if there is an authentication problem.


-D bindDN

Create an entry which has write permission to the baseDN. When
used with -d option, this entry only needs read permission.


-d

Dump the LDAP container to the standard output in the appropriate
format for the given database.


-f filename

Indicates input file to read in an /etc/ file format.


-h LDAP_server[:serverPort]

Specify an address (or a name) and an optional port of the LDAP
server in which the entries will be stored. The current naming
service specified in the nsswitch.conf file is used. The default
value for the port is 389, except when TLS is specified as the
authentication method. In this case, the default LDAP server port
number is 636.


-j passwdFile

Specify a file containing the password for the bind DN or the
password for the SSL client's key database. To protect the
password, use this option in scripts and place the password in a
secure file. This option is mutually exclusive of the -w option.


-M domainName

The name of a domain served by the specified server. If not
specified, the default domain name will be used.


-N profileName

Specify the DUAProfile name. A profile with such a name is
supposed to exist on the server specified by -h option.
Otherwise, a default DUAProfile will be used. The default value
is default.


-P certifPath

The certificate path for the location of the certificate
database. The value is the path where security database files
reside. This is used for TLS support, which is specified in the
authenticationMethod and serviceAuthenticationMethod attributes.
The default is /var/ldap.


-p

Process the password field when loading password information from
a file. By default, the password field is ignored because it is
usually not valid, as the actual password appears in a shadow
file.


-w bindPassword

Password to be used for authenticating the bindDN. If this
parameter is missing, the command will prompt for a password.
NULL passwords are not supported in LDAP.

When you use -w bindPassword to specify the password to be used
for authentication, the password is visible to other users of the
system by means of the ps command, in script files or in shell
history.

If you supply "-" (hyphen) as a password, you will be prompted to
enter a password.


-v

Verbose.


OPERANDS


The following operands are supported:

database

The name of the database or service name. Supported values are:
aliases, auto_*, bootparams, ethers, group, hosts (including IPv6
addresses), netgroup, netmasks, networks, passwd, shadow,
protocols, publickey, rpc, and services. Also supported are
auth_attr, prof_attr, exec_attr, user_attr, and projects.


EXAMPLES


Example 1: Adding Password Entries to the Directory Server




The following example shows how to add password entries to the
directory server:


example# ldapaddent -D "cn=directory manager" -w secret \
-f /etc/passwd passwd


Example 2: Adding Group Entries




The following example shows how to add group entries to the directory
server using sasl/CRAM-MD5 as the authentication method:


example# ldapaddent -D "cn=directory manager" -w secret \
-a "sasl/CRAM-MD5" -f /etc/group group


Example 3: Adding auto_master Entries




The following example shows how to add auto_master entries to the
directory server:


example# ldapaddent -D "cn=directory manager" -w secret \
-f /etc/auto_master auto_master


Example 4: Dumping passwd Entries from the Directory to File




The following example shows how to dump password entries from the
directory to a file foo:


example# ldapaddent -d passwd > foo


Example 5: Adding Password Entries to a Specific Directory Server




The following example shows how to add password entries to a
directory server that you specify:


example# ldapaddent -h 10.10.10.10:3890 \
-M another.domain.name -N special_duaprofile \
-D "cn=directory manager" -w secret \
-f /etc/passwd passwd


EXIT STATUS


The following exit values are returned:

0

Successful completion.


>0

An error occurred.


FILES


/var/ldap/ldap_client_file
/var/ldap/ldap_client_cred

Files containing the LDAP configuration of the client. These
files are not to be modified manually. Their content is not
guaranteed to be human readable. Use ldapclient(8) to update
these files.


ATTRIBUTES


See attributes(7) for descriptions of the following attributes:


+--------------------+-----------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+--------------------+-----------------+
|Interface Stability | Committed |
+--------------------+-----------------+

SEE ALSO


ldap(1), ldaplist(1), ldapmodify(1), ldapmodrdn(1), ldapsearch(1),
nsswitch.conf(5), attributes(7), idsconfig(8), ldapclient(8)


CAUTION


Currently StartTLS is not supported by libldap.so.5, therefore the
port number provided refers to the port used during a TLS open,
rather than the port used as part of a StartTLS sequence. For
example:

-h foo:1000 -a tls:simple


The preceding refers to a raw TLS open on host foo port 1000, not an
open, StartTLS sequence on an unsecured port 1000. If port 1000 is
unsecured the connection will not be made.

May 13, 2017 LDAPADDENT(8)

tribblix@gmail.com :: GitHub :: Privacy