HP 3PAR StoreServ 7400 2-node HP 3PAR Command Line Interface Administrator& - Page 35

Configuring Group Location Parameters, is the search base

Page 35 highlights

3. Issue the setauthparam user-attr command, where is the name of the attribute holding the user's . Example: system1 cli% setauthparam -f binding simple In the example above, simple binding is specified as the binding mechanism. system1 cli% setauthparam -f user-dn-base ou=people,dc=ldaptest,dc=3par,dc=com In the example above, the base of the user entries in the OpenLDAP server directory information tree is ou=people,dc=ldaptest,dc=3par,dc=com. system1 cli% setauthparam -f user-attr uid In the example above, uid is the attribute with the value of the user's user name of the posixAccount object class. Configuring Group Location Parameters To configure group location parameters, perform the following: 1. Issue the setauthparam groups-dn command, where is the basis of the search for objects holding group information in the subtree of the directory information tree. 2. Issue the setauthparam group-object command. 3. Issue the setauthparam group-name-attr command, where is the group object's attribute that holds the group name. 4. Issue the setauthparam member-attr command, where is attribute that holds the names of the users in the group. Example: system1 cli% setauthparam -f groups-dn ou=groups,dc=ldaptest,dc=3par,dc=com In the example above, ou=groups,dc=ldaptest,dc=3par,dc=com is the search base for objects holding group information in the directory information subtree. system1 cli% setauthparam -f group-obj posixGroup system1 cli% setauthparam -f group-name-attr cn system1 cli% setauthparam -f member-attr memberUid In the example above: • posixGroup is the group object class. • cn is the attribute of the posixGroup, which has a value of the group's name. • memberUid is the attribute with the value of the user's . Configuring Group-To-Role Mapping Parameters Once you have configured the group location parameters, you must now decide what role you wish to assign the users for a given group. To configure group-to-role mapping: Configuring LDAP Connections 35

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204

3.
Issue the
setauthparam user-attr <attribute>
command, where
<attribute>
is
the name of the attribute holding the user’s
<user_name>
.
Example
:
system1 cli% setauthparam -f binding simple
In the example above, simple binding is specified as the binding mechanism.
system1 cli% setauthparam -f user-dn-base ou=people,dc=ldaptest,dc=3par,dc=com
In the example above, the base of the user entries in the OpenLDAP server directory information
tree is
ou=people,dc=ldaptest,dc=3par,dc=com
.
system1 cli% setauthparam -f user-attr uid
In the example above,
uid
is the attribute with the value of the user’s user name of the
posixAccount
object class.
Configuring Group Location Parameters
To configure group location parameters, perform the following:
1.
Issue the
setauthparam groups-dn <value>
command, where
<value>
is the basis
of the search for objects holding group information in the subtree of the directory information
tree.
2.
Issue the
setauthparam group-object <group_object_class>
command.
3.
Issue the
setauthparam group-name-attr <attribute>
command, where
<attribute>
is the group object’s attribute that holds the group name.
4.
Issue the
setauthparam member-attr <member_attribute>
command, where
<member_attribute>
is attribute that holds the names of the users in the group.
Example
:
system1 cli% setauthparam -f groups-dn ou=groups,dc=ldaptest,dc=3par,dc=com
In the example above,
ou=groups,dc=ldaptest,dc=3par,dc=com
is the search base
for objects holding group information in the directory information subtree.
system1 cli% setauthparam -f group-obj posixGroup
system1 cli% setauthparam -f group-name-attr cn
system1 cli% setauthparam -f member-attr memberUid
In the example above:
posixGroup
is the group object class.
cn
is the attribute of the
posixGroup
, which has a value of the group’s name.
memberUid
is the attribute with the value of the user’s <user_name>.
Configuring Group-To-Role Mapping Parameters
Once you have configured the group location parameters, you must now decide what role you
wish to assign the users for a given group. To configure group-to-role mapping:
Configuring LDAP Connections
35