<?Pub UDT _bookmark _target?><chapter id="manageldap-1"><?Pub Tag atict:info tracking="off" ref="10"?><?Pub Tag
atict:user user="sharonr" fullname="Sharon Veach"?><title>Trusted Extensions and
LDAP (Overview)</title><indexterm><primary>administering</primary><secondary>LDAP</secondary>
</indexterm><indexterm><primary>naming services</primary><secondary>LDAP</secondary>
</indexterm><highlights><para>This chapter describes the use of the Sun <trademark>Java</trademark> System Directory Server (Directory Server) for
a system that is configured with Solaris Trusted Extensions.</para><itemizedlist><listitem><para><olink targetptr="manageldap-5" remap="internal">Using a Naming Service in
Trusted Extensions</olink></para>
</listitem><listitem><para><olink targetptr="managens-3" remap="internal">Using the LDAP Naming Service
in Trusted Extensions</olink></para>
</listitem>
</itemizedlist>
</highlights><sect1 id="manageldap-5"><title>Using a Naming Service in Trusted Extensions</title><indexterm><primary>LDAP</primary><secondary>naming service for Trusted Extensions</secondary>
</indexterm><para><indexterm><primary>LDAP</primary><secondary>Trusted Extensions databases</secondary></indexterm><indexterm><primary>databases</primary><secondary>in LDAP</secondary></indexterm><indexterm><primary>network databases</primary><secondary>in LDAP</secondary></indexterm><indexterm><primary>naming services</primary><secondary>databases unique to Trusted Extensions</secondary></indexterm>To achieve uniformity of user,
host, and network attributes within a security domain with multiple Trusted Extensions systems,
a naming service is used for distributing most configuration information.
LDAP is an example of a naming service. The <filename>nsswitch.conf</filename> file
determines which naming service is used. LDAP is the recommended naming service
for  Trusted Extensions.</para><para>The  Directory Server can provide the LDAP naming service for Trusted Extensions and Solaris clients.
The server must include Trusted Extensions network databases, and the Trusted Extensions clients
must connect to the server over a multilevel port. The security administrator
specifies the multilevel port when configuring Trusted Extensions.</para><itemizedlist><para>Trusted Extensions adds two trusted network databases to the LDAP server: <filename>tnrhdb</filename> and <filename>tnrhtp</filename>. These databases are administered
by using the Security Templates tool in the Solaris Management Console. A toolbox of <literal>Scope=LDAP, Policy=TSOL</literal> stores
configuration changes on the Directory Server.</para><listitem><para>For information about the use of the LDAP naming  service
in the Solaris OS, see <olink targetdoc="sysadv5" remap="external"><citetitle remap="book">System Administration Guide: Naming and Directory Services (DNS, NIS, and LDAP)</citetitle></olink>.</para>
</listitem><listitem><para>Setting up the Directory Server for Trusted Extensions clients
is described in <olink targetptr="txldap-1" remap="internal">Chapter&nbsp;5, Configuring LDAP for Trusted Extensions (Tasks)</olink>. Trusted Extensions systems
can be clients of a Solaris LDAP server by using an LDAP proxy server
that is configured with Trusted Extensions.</para>
</listitem>
</itemizedlist><note><para>Systems that are configured with Trusted Extensions cannot be clients
of NIS or NIS+ masters.</para>
</note><sect2 id="manageldap-2"><title>Non-Networked Trusted Extensions Systems</title><para>If a naming service is not used at a site, administrators must ensure
that configuration information for users, hosts, and networks is identical
on all hosts. A change that is made on one host must be made on all hosts.</para><para>On a non-networked Trusted Extensions system, configuration information
is maintained in the <filename>/etc</filename>, <filename>/etc/security</filename>,
and <filename>/etc/security/tsol</filename> directories. Actions in the Trusted_Extensions
folder enable you to modify some configuration information. The Security Templates
tool in the Solaris Management Console enables you to modify network database parameters. Users,
roles, and rights are modified in the User Accounts, Administrative Roles,
and Rights tools. A toolbox on This Computer with <literal>Scope=Files, Policy=TSOL</literal> stores configuration changes locally.</para>
</sect2><sect2 id="manageldap-8"><title>Trusted Extensions LDAP Databases</title><para>Trusted Extensions extends the Directory Server's schema to accommodate
the <filename>tnrhdb</filename> and <filename>tnrhtp</filename> databases. Trusted Extensions defines
two new attributes, <literal>ipTnetNumber</literal> and <literal>ipTnetTemplateName</literal>, and two new object classes, <literal>ipTnetTemplate</literal> and <literal>ipTnetHost</literal>.</para><para>The attribute definitions are as follows:</para><screen>ipTnetNumber
   ( 1.3.6.1.1.1.1.34 NAME 'ipTnetNumber'
     DESC 'Trusted network host or subnet address'
     EQUALITY caseExactIA5Match
     SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
     SINGLE-VALUE )</screen><screen>ipTnetTemplateName
   ( 1.3.6.1.1.1.1.35 NAME 'ipTnetTemplateName'
     DESC 'Trusted network template name'
     EQUALITY caseExactIA5Match
     SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
     SINGLE-VALUE )</screen><para>The object class definitions are as follows:</para><screen>ipTnetTemplate
   ( 1.3.6.1.1.1.2.18 NAME 'ipTnetTemplate' SUP top STRUCTURAL
     DESC 'Object class for Trusted network host templates'
     MUST ( ipTnetTemplateName )
     MAY ( SolarisAttrKeyValue ) )

ipTnetHost
   ( 1.3.6.1.1.1.2.19 NAME 'ipTnetHost' SUP top AUXILIARY
     DESC 'Object class for Trusted network host/subnet address
           to template mapping'
     MUST ( ipTnetNumber $ ipTnetTemplateName ) )</screen><para>The <literal>cipso</literal> template definition in LDAP is similar
to the following:</para><screen>ou=ipTnet,dc=example,dc=example1,dc=exampleco,dc=com
 objectClass=top
 objectClass=organizationalUnit
 ou=ipTnet

 ipTnetTemplateName=cipso,ou=ipTnet,dc=example,dc=example1,dc=exampleco,dc=com
 objectClass=top
 objectClass=ipTnetTemplate
 ipTnetTemplateName=cipso
 SolarisAttrKeyValue=host_type=cipso;doi=1;min_sl=ADMIN_LOW;max_sl=ADMIN_HIGH;

 ipTnetNumber=0.0.0.0,ou=ipTnet,dc=example,dc=example1,dc=exampleco,dc=com
 objectClass=top
 objectClass=ipTnetTemplate
 objectClass=ipTnetHost
 ipTnetNumber=0.0.0.0
 ipTnetTemplateName=internal</screen>
</sect2>
</sect1><sect1 id="managens-3"><title>Using the LDAP Naming Service in Trusted Extensions</title><indexterm><primary>naming services</primary><secondary>actions for managing</secondary>
</indexterm><indexterm><primary>administrative actions</primary><secondary>naming services</secondary>
</indexterm><itemizedlist><para>The LDAP naming service is managed in Trusted Extensions as it is managed
in the Solaris OS. The following is a sample of useful commands, and contains
references to more detailed information:</para><listitem><para>For strategies to solve LDAP configuration problems, see <olink targetdoc="group-sa" targetptr="setupproblems-1" remap="external">Chapter 13, <citetitle remap="chapter">LDAP Troubleshooting (Reference),</citetitle> in <citetitle remap="book">System Administration Guide: Naming and Directory Services (DNS, NIS, and LDAP)</citetitle></olink>.</para>
</listitem><listitem><para>To troubleshoot client-to-server LDAP connection problems
that are affected by labels, see <olink targetptr="manageldap-4" remap="internal">How to Debug
a Client Connection to the LDAP Server</olink>.</para>
</listitem><listitem><para>To troubleshoot other client-to-server LDAP connection problems,
see <olink targetdoc="group-sa" targetptr="setupproblems-1" remap="external">Chapter 13, <citetitle remap="chapter">LDAP Troubleshooting (Reference),</citetitle> in <citetitle remap="book">System Administration Guide: Naming and Directory Services (DNS, NIS, and LDAP)</citetitle></olink>.</para>
</listitem><listitem><para><indexterm><primary>LDAP</primary><secondary>displaying entries</secondary></indexterm>To display LDAP entries from an LDAP client, type:</para><screen>$ <userinput>ldaplist -l</userinput>
$ <userinput>ldap_cachemgr -g</userinput></screen>
</listitem><listitem><para>To display LDAP entries from an LDAP server, type:</para><screen>$ <userinput>ldap_cachemgr -g</userinput>
$ <userinput>idsconfig -v</userinput></screen>
</listitem><listitem><para>To list the hosts that LDAP manages, type:</para><screen>$ <userinput>ldaplist -l hosts</userinput> <lineannotation>Long listing</lineannotation>
$ <userinput>ldaplist hosts</userinput> <lineannotation>One-line listing</lineannotation></screen>
</listitem><listitem><para>To list information in the Directory Information Tree (DIT)
on LDAP, type:</para><screen>$ <userinput>ldaplist -l services | more</userinput>
dn: cn=apocd+ipServiceProtocol=udp,ou=Services,dc=exampleco,dc=com
  objectClass: ipService
  objectClass: top
  cn: apocd
  ipServicePort: 38900
  ipServiceProtocol: udp

...
$ <userinput>ldaplist services name</userinput>
dn=cn=name+ipServiceProtocol=udp,ou=Services,dc=exampleco,dc=com</screen>
</listitem><listitem><para>To display the status of the LDAP service on the client, type:</para><screen># <userinput>svcs -xv network/ldap/client</userinput>
svc:/network/ldap/client:default (LDAP client)
 State: online since <replaceable>date</replaceable>
   See: man -M /usr/share/man -s 1M ldap_cachemgr
   See: /var/svc/log/network-ldap-client:default.log
Impact: None.</screen>
</listitem><listitem><para><indexterm><primary>LDAP</primary><secondary>starting</secondary></indexterm><indexterm><primary>LDAP</primary><secondary>stopping</secondary></indexterm>To start and stop the LDAP client, type:</para><screen># <userinput>svcadm enable network/ldap/client</userinput></screen><screen># <userinput>svcadm disable network/ldap/client</userinput></screen>
</listitem><listitem><para>To start and stop the LDAP server in version 5.2 of Sun Java System Directory Server software,
type:</para><screen># <replaceable>installation-directory</replaceable>/slap-<replaceable>LDAP-server-hostname</replaceable>/start-slapd
# <replaceable>installation-directory</replaceable>/slap-<replaceable>LDAP-server-hostname</replaceable>/stop-slapd</screen>
</listitem><listitem><para>To start and stop the LDAP server in version 6 of Sun Java System Directory Server software,
type:</para><screen># dsadm start /export/home/ds/instances/<replaceable>your-instance</replaceable>
# dsadm stop /export/home/ds/instances/<replaceable>your-instance</replaceable></screen>
</listitem><listitem><para>To start and stop a proxy LDAP server in version 6 of Sun Java System Directory Server software,
type:</para><screen># dpadm start /export/home/ds/instances/<replaceable>your-instance</replaceable>
# dpadm stop /export/home/ds/instances/<replaceable>your-instance</replaceable></screen>
</listitem>
</itemizedlist>
</sect1>
</chapter><?Pub *0000011061 0?>