HP 3PAR StoreServ 7400 2-node HP 3PAR Command Line Interface Administrator& - Page 34

Configuring Connection Parameters, setauthparam ldap-ssl 1

Page 34 highlights

◦ setauthparam group-name-attr ◦ setauthparam member-attr • Configure group-to-role mapping parameters using the following commands: ◦ setauthparam ◦ checkpassword Different schemas can be used for user and group information with OpenLDAP. The instructions and example that follow describe configuration of the system using Posix users and groups. Configuring Connection Parameters 1. To configure connection parameters, issue the setauthparam ldap-server command, where is the OpenLDAP server's IP address. 2. Issue the setauthparam ldap-ssl 1 command. Example: system1 cli% setauthparam -f ldap-server 192.168.10.13 system1 cli% setauthparam -f ldap-ssl 1 In the example above: • The OpenLDAP server's IP address is 192.168.10.13. • SSL security is activated using the 1 parameter. Configuring Binding Parameters After you have configured the connection parameters to your LDAP server, you must configure the binding (authentication) parameters for users. To configure binding parameters: 1. Issue the setauthparam binding command. 2. Issue the setauthparam user-dn-base command, where is the base of the subtree where user information is kept in the OpenLDAP server directory information tree. 34 Managing User Accounts and Connections

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204

setauthparam group-name-attr <attribute>
setauthparam member-attr <member_attribute>
Configure group-to-role mapping parameters using the following commands:
setauthparam <map_param> <map_value>
checkpassword <user_name>
Different schemas can be used for user and group information with OpenLDAP. The instructions
and example that follow describe configuration of the system using Posix users and groups.
Configuring Connection Parameters
1.
To configure connection parameters, issue the
setauthparam ldap-server
<IP_address>
command, where
<IP_address>
is the OpenLDAP server’s IP address.
2.
Issue the
setauthparam ldap-ssl 1
command.
Example
:
system1 cli% setauthparam -f ldap-server 192.168.10.13
system1 cli% setauthparam -f ldap-ssl 1
In the example above:
The OpenLDAP server’s IP address is
192.168.10.13
.
SSL security is activated using the
1
parameter.
Configuring Binding Parameters
After you have configured the connection parameters to your LDAP server, you must configure the
binding (authentication) parameters for users.
To configure binding parameters:
1.
Issue the
setauthparam binding <binding_type>
command.
2.
Issue the
setauthparam user-dn-base <value>
command, where
<value>
is the
base of the subtree where user information is kept in the OpenLDAP server directory information
tree.
34
Managing User Accounts and Connections