Movatterモバイル変換


[0]ホーム

URL:


Skip Navigation Links
Exit Print View
Link to oracle.comman pages section 1M: System Administration Commands    Oracle Solaris 11 Information Library
Oracle Technology Network
Library
PDF
Print View
Feedback
search filter icon
search icon
 Search Scope:

Document Information

Preface

Introduction

System Administration Commands - Part 1

6to4relay(1M)

acct(1M)

acctadm(1M)

acctcms(1M)

acctcon1(1M)

acctcon(1M)

acctcon2(1M)

acctdisk(1M)

acctdusg(1M)

acctmerg(1M)

accton(1M)

acctprc1(1M)

acctprc(1M)

acctprc2(1M)

acctsh(1M)

acctwtmp(1M)

acpihpd(1M)

adbgen(1M)

add_allocatable(1M)

addbadsec(1M)

add_drv(1M)

arp(1M)

asradm(1M)

asr-notify(1M)

atohexlabel(1M)

audit(1M)

auditconfig(1M)

auditd(1M)

auditrecord(1M)

auditreduce(1M)

auditstat(1M)

audit_warn(1M)

automount(1M)

automountd(1M)

autopush(1M)

bart(1M)

beadm(1M)

boot(1M)

bootadm(1M)

bootconfchk(1M)

bootparamd(1M)

busstat(1M)

captoinfo(1M)

catman(1M)

cfgadm(1M)

cfgadm_ac(1M)

cfgadm_cardbus(1M)

cfgadm_fp(1M)

cfgadm_ib(1M)

cfgadm_pci(1M)

cfgadm_sata(1M)

cfgadm_sbd(1M)

cfgadm_scsi(1M)

cfgadm_sdcard(1M)

cfgadm_shp(1M)

cfgadm_sysctrl(1M)

cfgadm_usb(1M)

chargefee(1M)

chat(1M)

check-hostname(1M)

check-permissions(1M)

chk_encodings(1M)

chroot(1M)

cimworkshop(1M)

ckpacct(1M)

clear_locks(1M)

clinfo(1M)

closewtmp(1M)

clri(1M)

comsat(1M)

consadm(1m)

console-reset(1M)

conv_lp(1M)

conv_lpd(1M)

coreadm(1M)

cpustat(1M)

croinfo(1M)

cron(1M)

cryptoadm(1M)

cvcd(1M)

datadm(1M)

dcopy(1M)

dcs(1M)

dd(1M)

ddu(1M)

ddu-text(1M)

devchassisd(1M)

devfsadm(1M)

devfsadmd(1M)

device_allocate(1M)

device_remap(1M)

devinfo(1M)

devlinks(1M)

devnm(1M)

devprop(1M)

df(1M)

dfmounts(1M)

dfmounts_nfs(1M)

dfshares(1M)

dfshares_nfs(1M)

df_ufs(1M)

dhcpagent(1M)

dhcpconfig(1M)

dhcpmgr(1M)

dhtadm(1M)

dig(1M)

directoryserver(1M)

diskinfo(1M)

disks(1M)

diskscan(1M)

dispadmin(1M)

dladm(1M)

dlmgmtd(1M)

dlstat(1M)

dmesg(1M)

dminfo(1M)

dns-sd(1M)

dnssec-dsfromkey(1M)

dnssec-keyfromlabel(1M)

dnssec-keygen(1M)

dnssec-makekeyset(1M)

dnssec-signkey(1M)

dnssec-signzone(1M)

dodisk(1M)

domainname(1M)

drd(1M)

drvconfig(1M)

dsbitmap(1M)

dscfg(1M)

dscfgadm(1M)

dscfglockd(1M)

dsstat(1M)

dsvclockd(1M)

dtrace(1M)

dumpadm(1M)

editmap(1M)

edquota(1M)

eeprom(1M)

efdaemon(1M)

embedded_su(1M)

etrn(1M)

fbconfig(1M)

fbconf_xorg(1M)

fcadm(1M)

fcinfo(1M)

fdetach(1M)

fdisk(1M)

ff(1M)

ff_ufs(1M)

fingerd(1M)

fiocompress(1M)

flowadm(1M)

flowstat(1M)

fmadm(1M)

fmd(1M)

fmdump(1M)

fmstat(1M)

fmthard(1M)

format(1M)

fpsd(1M)

fruadm(1M)

fsck(1M)

fsck_pcfs(1M)

fsck_udfs(1M)

fsck_ufs(1M)

fsdb(1M)

fsdb_udfs(1M)

fsdb_ufs(1M)

fsirand(1M)

fssnap(1M)

fssnap_ufs(1M)

fsstat(1M)

fstyp(1M)

fuser(1M)

fwflash(1M)

fwtmp(1M)

getdevpolicy(1M)

getent(1M)

gettable(1M)

getty(1M)

gkadmin(1M)

groupadd(1M)

groupdel(1M)

groupmod(1M)

growfs(1M)

grpck(1M)

gsscred(1M)

gssd(1M)

hald(1M)

hal-device(1M)

hal-fdi-validate(1M)

hal-find(1M)

hal-find-by-capability(1M)

hal-find-by-property(1M)

hal-get-property(1M)

hal-set-property(1M)

halt(1M)

hextoalabel(1M)

host(1M)

hostconfig(1M)

hotplug(1M)

hotplugd(1M)

htable(1M)

ickey(1M)

id(1M)

idmap(1M)

idmapd(1M)

idsconfig(1M)

ifconfig(1M)

if_mpadm(1M)

ifparse(1M)

iiadm(1M)

iicpbmp(1M)

iicpshd(1M)

ikeadm(1M)

ikecert(1M)

ilbadm(1M)

ilbd(1M)

ilomconfig(1M)

imqadmin(1M)

imqbrokerd(1M)

imqcmd(1M)

imqdbmgr(1M)

imqkeytool(1M)

imqobjmgr(1M)

imqusermgr(1M)

in.chargend(1M)

in.comsat(1M)

in.daytimed(1M)

in.dhcpd(1M)

in.discardd(1M)

in.echod(1M)

inetadm(1M)

inetconv(1M)

inetd(1M)

in.fingerd(1M)

infocmp(1M)

in.iked(1M)

init(1M)

init.sma(1M)

init.wbem(1M)

inityp2l(1M)

in.lpd(1M)

in.mpathd(1M)

in.named(1M)

in.ndpd(1M)

in.rarpd(1M)

in.rdisc(1M)

in.rexecd(1M)

in.ripngd(1M)

in.rlogind(1M)

in.routed(1M)

in.rshd(1M)

in.rwhod(1M)

install(1M)

installboot(1M)

installf(1M)

installgrub(1M)

in.stdiscover(1M)

in.stlisten(1M)

in.talkd(1M)

in.telnetd(1M)

in.tftpd(1M)

in.timed(1M)

intrd(1M)

intrstat(1M)

in.uucpd(1M)

iostat(1M)

ipaddrsel(1M)

ipadm(1M)

ipf(1M)

ipfs(1M)

ipfstat(1M)

ipmgmtd(1M)

ipmon(1M)

ipmpstat(1M)

ipnat(1M)

ippool(1M)

ipqosconf(1M)

ipsecalgs(1M)

ipsecconf(1M)

ipseckey(1M)

iscsiadm(1M)

isns(1M)

isnsadm(1M)

itadm(1M)

itu(1M)

k5srvutil(1M)

kadb(1M)

kadmin(1M)

kadmind(1M)

kadmin.local(1M)

kcfd(1M)

kclient(1M)

kdb5_ldap_util(1M)

kdb5_util(1M)

kdcmgr(1M)

kernel(1M)

keyserv(1M)

killall(1M)

kmscfg(1M)

kprop(1M)

kpropd(1M)

kproplog(1M)

krb5kdc(1M)

ksslcfg(1M)

kstat(1M)

ktkt_warnd(1M)

labeld(1M)

labelit(1M)

labelit_hsfs(1M)

labelit_udfs(1M)

labelit_ufs(1M)

lastlogin(1M)

latencytop(1M)

ldapaddent(1M)

ldap_cachemgr(1M)

ldapclient(1M)

ldmad(1M)

link(1M)

llc2_loop(1M)

lldpadm(1M)

lldpd(1M)

lms(1M)

localectr(1M)

locator(1M)

lockd(1M)

lockfs(1M)

lockstat(1M)

lofiadm(1M)

logadm(1M)

logins(1M)

lpget(1M)

lpset(1M)

luxadm(1M)

System Administration Commands - Part 2

System Administration Commands - Part 3

ldapaddent

- create LDAP entries from corresponding /etc files

Synopsis

ldapaddent [-cpv] [-aauthenticationMethod] [-bbaseDN]-DbindDN [-wbind_password] [-jpasswdFile] [-ffilename]database
ldapaddent [-cpv]-a sasl/GSSAPI [-bbaseDN] [-ffilename]database
ldapaddent-d [-v] [-aauthenticationMethod] [-DbindDN]     [-wbind_password] [-jpasswdFile]database
ldapaddent [-cpv]-hLDAP_server[:serverPort] [-MdomainName]     [-NprofileName]  [-PcertifPath] [-aauthenticationMethod]     [-bbaseDN]-DbindDN [-wbind_password] [-ffilename]     [-jpasswdFile]database
ldapaddent [-cpv]-hLDAP_server[:serverPort] [-MdomainName]     [-NprofileName]  [-PcertifPath] [-aauthenticationMethod]     [-bbaseDN] [-ffilename]database
ldapaddent-d [-v]-hLDAP_server[:serverPort] [-MdomainName]     [-NprofileName]  [-PcertifPath] [-aauthenticationMethod]     [-bbaseDN]-DbindDN [-wbind_password] [-jpasswdFile]database

Description

ldapaddent creates entries in LDAP containers from their corresponding/etc files. Thisoperation is customized for each of the standard containers that are usedin the administration of Solaris systems. Thedatabase argument specifies the type ofthe data being processed. Legal values for this type are one ofaliases,auto_*,bootparams,ethers,group,hosts (including both IPv4 and IPv6 addresses),ipnodes (alias forhosts),netgroup,netmasks,networks,passwd,shadow,protocols,publickey,rpc,andservices. In addition to the preceding, thedatabase argument can beone of the RBAC-related files (seerbac(5)):

By default,ldapaddent reads from the standard input and adds this datato the LDAP container associated with the database specified on the commandline. An input file from which data can be read is specifiedusing the-f option.

If you specify the-h option,ldapaddent establishes a connection to theserver indicated by the option in order to obtain aDUAProfile specifiedby the-N option. The entries will be stored in the directorydescribed by the configuration obtained.

By default (if the-h option is not specified), entries will bestored in the directory based on the client's configuration. To use theutility in the default mode, the Solaris LDAP client must be setup in advance.

The location where entries are to be written can be overridden byusing the-b option.

If the entry to be added exists in the directory, the commanddisplays an error and exits, unless the-c option is used.

Although, there is ashadow database type, there is no correspondingshadowcontainer. Both theshadow and thepasswd data is stored in thepeople container itself. Similarly, data fromnetworks andnetmasks databases are storedin thenetworks container.

Theuser_attr data is stored by default in thepeople container. Theprof_attr andexec_attr data is stored by default in theSolarisProfAttr container.

You must add entries from thepasswd database before you attempt toadd entries from theshadow database. The addition of ashadow entrythat does not have a correspondingpasswd entry will fail.

Thepasswd database must precede theuser_attr database.

For better performance, the recommended order in which the databases should beloaded is as follows:

Only the first entry of a given type that is encountered willbe added to the LDAP server. Theldapaddent command skips any duplicateentries.

Options

Theldapaddent command supports the following options:

-aauthenticationMethod

Specify authentication method. The default value is what has been configured in the profile. The supported authentication methods are:

  • simple

  • sasl/CRAM-MD5

  • sasl/DIGEST-MD5

  • sasl/GSSAPI

  • tls:simple

  • tls:sasl/CRAM-MD5

  • tls:sasl/DIGEST-MD5

Selectingsimple causes passwords to be sent over the network in clear text. Its use is strongly discouraged. Additionally, if the client is configured with a profile which uses no authentication, that is, either thecredentialLevel attribute is set toanonymous orauthenticationMethod is set tonone, the user must use this option to provide an authentication method. If the authentication method issasl/GSSAPI,bindDN andbindPassword is not required and thehosts andipnodes fields of/etc/nsswitch.conf must be configured as:

hosts: dns filesipnodes: dns files

Seensswitch.conf(4).

-b baseDN

Create entries in thebaseDN directory.baseDN is not relative to the client's default search base, but rather. it is the actual location where the entries will be created. If this parameter is not specified, the first search descriptor defined for the service or the default container will be used.

-c

Continue adding entries to the directory even after an error. Entries will not be added if the directory server is not responding or if there is an authentication problem.

-D bindDN

Create an entry which has write permission to thebaseDN. When used with-d option, this entry only needs read permission.

-d

Dump the LDAP container to the standard output in the appropriate format for the given database.

-ffilename

Indicates input file to read in an/etc/ file format.

-hLDAP_server[:serverPort]

Specify an address (or a name) and an optional port of the LDAP server in which the entries will be stored. The current naming service specified in thensswitch.conf file is used. The default value for the port is389, except when TLS is specified as the authentication method. In this case, the default LDAP server port number is636.

The format to specify the address and port number for an IPv6 address is:

[ipv6_addr]:port

To specify the address and port number for an IPv4 address, use the following format:

ipv4_addr:port

If the host name is specified, use the format:

host_name:port
-j passwdFile

Specify a file containing the password for the bind DN or the password for the SSL client's key database. To protect the password, use this option in scripts and place the password in a secure file. This option is mutually exclusive of the-w option.

-M domainName

The name of a domain served by the specified server. If not specified, the default domain name will be used.

-N profileName

Specify theDUAProfile name. A profile with such a name is supposed to exist on the server specified by-h option. Otherwise, a defaultDUAProfile will be used. The default value isdefault.

-P certifPath

The certificate path for the location of the certificate database. The value is the path where security database files reside. This is used for TLS support, which is specified in theauthenticationMethod andserviceAuthenticationMethod attributes. The default is/var/ldap.

-p

Process thepassword field when loading password information from a file. By default, thepassword field is ignored because it is usually not valid, as the actual password appears in ashadow file.

-w bindPassword

Password to be used for authenticating thebindDN. If this parameter is missing, the command will prompt for a password.NULL passwords are not supported in LDAP.

When you use-w bindPassword to specify the password to be used for authentication, the password is visible to other users of the system by means of theps command, in script files or in shell history.

If you supply “-” (hyphen) as a password, you will be prompted to enter a password.

-v

Verbose.

Operands

The following operands are supported:

database

The name of the database or service name. Supported values are:aliases,auto_*,bootparams,ethers,group,hosts (including IPv6 addresses),netgroup,netmasks,networks,passwd,shadow,protocols,publickey,rpc, andservices. Also supported areauth_attr,prof_attr,exec_attr,user_attr, andprojects.

Examples

Example 1 Adding Password Entries to the Directory Server

The following example shows how to add password entries to the directoryserver:

example#ldapaddent -D "cn=directory manager" -w secret \ -f /etc/passwd passwd

Example 2 Adding Group Entries

The following example shows how to addgroup entries to the directoryserver usingsasl/CRAM-MD5 as the authentication method:

example#ldapaddent -D "cn=directory manager" -w secret \ -a "sasl/CRAM-MD5" -f /etc/group group

Example 3 Addingauto_master Entries

The following example shows how to addauto_master entries to the directoryserver:

example#ldapaddent -D "cn=directory manager" -w secret \ -f /etc/auto_master auto_master

Example 4 Dumpingpasswd Entries from the Directory to File

The following example shows how to dumppassword entries from the directoryto a filefoo:

example#ldapaddent -d passwd > foo

Example 5 Adding Password Entries to a Specific Directory Server

The following example shows how to add password entries to a directoryserver that you specify:

example#ldapaddent -h 10.10.10.10:3890 \ -M another.domain.name -N special_duaprofile \ -D "cn=directory manager" -w secret \ -f /etc/passwd passwd

Exit Status

The following exit values are returned:

0

Successful completion.

>0

An error occurred.

Files

/var/ldap/ldap_client_file
/var/ldap/ldap_client_cred

Files containing the LDAP configuration of the client. These files are not to be modified manually. Their content is not guaranteed to be human readable. Useldapclient(1M) to update these files.

Attributes

Seeattributes(5) for descriptions of the following attributes:

ATTRIBUTE TYPE
ATTRIBUTE VALUE
Availability
system/network/nis
Interface Stability
Committed

See Also

ldaplist(1),ldapmodify(1),ldapmodrdn(1),ldapsearch(1),idsconfig(1M),ldapclient(1M),nsswitch.conf(4),attributes(5)

Oracle Solaris Administration: Security Services

Caution

Currently StartTLS is not supported bylibldap.so.5, therefore the port number providedrefers to the port used during a TLS open, rather than theport used as part of a StartTLS sequence. For example:

-h foo:1000 -a tls:simple

The preceding refers to a raw TLS open on hostfoo port1000, not an open, StartTLS sequence on an unsecured port 1000. Ifport 1000 is unsecured the connection will not be made.

Copyright © 2011, Oracle and/or its affiliates. All rights reserved.Legal Notices
PreviousNext

[8]ページ先頭

©2009-2025 Movatter.jp