Changes between Version 7 and Version 8 of ldapiam2018
- Timestamp:
- Sep 12, 2018, 11:00:43 AM (7 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
ldapiam2018
v7 v8 1 1 = Install the OpenLDAP Server on Ubuntu 18.04 LTS with eduPerson Schema = 2 2 3 It is assumed that you have already install your IDP Ubuntu server with a public IP address and a Domain Name (//idp. YOUR-DOMAIN//).3 It is assumed that you have already install your IDP Ubuntu server with a public IP address and a Domain Name (//idp.instXY.ac.lk//). 4 4 5 5 On your IDP server, … … 15 15 Answer the prompts appropriately, using the information below as a starting point: 16 16 * Omit OpenLDAP server configuration? '''No''' (we want an initial database and configuration) 17 * DNS domain name: ''' YOUR-DOMAIN''' (use the server's domain name, minus the hostname. This will be used to create the base entry for the information tree)17 * DNS domain name: '''instXY.ac.lk''' (use the server's domain name, minus the hostname. This will be used to create the base entry for the information tree) 18 18 * Organization name: '''Your Institute''' (This will simply be added to the base entry as the name of your institute) 19 19 * Administrator password: '''whatever you'd like''' … … 52 52 {{{ 53 53 organization = "Name of your institution" 54 cn = idp. YOUR-DOMAIN54 cn = idp.instXY.ac.lk 55 55 tls_www_server 56 56 encryption_key … … 117 117 dn:cn=config 118 118 changetype:modify 119 add:olcTLSCACertificateFile119 replace:olcTLSCACertificateFile 120 120 olcTLSCACertificateFile:/etc/ssl/certs/ca_server.pem 121 121 - 122 add:olcTLSCertificateFile122 replace:olcTLSCertificateFile 123 123 olcTLSCertificateFile:/etc/ssl/certs/ldap_server.pem 124 124 - 125 add:olcTLSCertificateKeyFile125 replace:olcTLSCertificateKeyFile 126 126 olcTLSCertificateKeyFile:/etc/ssl/private/ldap_server.key 127 127 }}} … … 141 141 sudo service slapd start 142 142 }}} 143 Your clients can now be configured to encrypt their connections to the server over the conventional 'ldap://ldap. YOUR-DOMAIN:389' port by using STARTTLS.143 Your clients can now be configured to encrypt their connections to the server over the conventional 'ldap://ldap.instXY.ac.lk:389' port by using STARTTLS. 144 144 145 145 == Setting up the Client Machines == … … 195 195 Depending on your Institutes's Requirement, you may create group as follows: 196 196 {{{ 197 dn: ou=People,dc= YOUR-DOMAIN,dc=ac,dc=lk197 dn: ou=People,dc=instXY,dc=ac,dc=lk 198 198 objectClass: organizationalUnit 199 199 objectClass: top 200 200 ou: People 201 201 202 dn: ou=Group,dc= YOUR-DOMAIN,dc=ac,dc=lk202 dn: ou=Group,dc=instXY,dc=ac,dc=lk 203 203 objectClass: organizationalUnit 204 204 objectClass: top … … 207 207 208 208 # System Admin Staff Group 209 dn:cn=adm,ou=Group,dc= YOUR-DOMAIN,dc=ac,dc=lk209 dn:cn=adm,ou=Group,dc=instXY,dc=ac,dc=lk 210 210 cn:adm 211 211 description:System Admin Staff … … 215 215 216 216 # Acadamic staff Group 217 dn:cn=acd,ou=Group,dc= YOUR-DOMAIN,dc=ac,dc=lk217 dn:cn=acd,ou=Group,dc=instXY,dc=ac,dc=lk 218 218 cn:acd 219 219 description:Acadamic Staff … … 223 223 224 224 # Students Group 225 dn:cn=student,ou=Group,dc= YOUR-DOMAIN,dc=ac,dc=lk225 dn:cn=student,ou=Group,dc=instXY,dc=ac,dc=lk 226 226 cn:student 227 227 description:Students … … 231 231 232 232 # servers OU 233 dn:ou=servers,dc= YOUR-DOMAIN,dc=ac,dc=lk233 dn:ou=servers,dc=instXY,dc=ac,dc=lk 234 234 description:servers 235 235 objectClass:top … … 238 238 239 239 # idp servers 240 dn:cn=idp,ou=servers,dc= YOUR-DOMAIN,dc=ac,dc=lk240 dn:cn=idp,ou=servers,dc=instXY,dc=ac,dc=lk 241 241 cn:idp 242 242 description:Identity Server … … 251 251 # test User 252 252 253 dn:uid=testme,ou=people,dc= YOUR-DOMAIN,dc=ac,dc=lk253 dn:uid=testme,ou=people,dc=instXY,dc=ac,dc=lk 254 254 cn:Test Me 255 255 uid:testme … … 275 275 Save the above as a ldif file and add it to your directory as 276 276 {{{ 277 ldapadd -H ldap:// -x -D "cn=admin,dc= YOUR-DOMAIN,dc=ac,dc=lk" -W -Z -f path_to_file.ldif278 }}} 277 ldapadd -H ldap:// -x -D "cn=admin,dc=instXY,dc=ac,dc=lk" -W -Z -f path_to_file.ldif 278 }}}