13.07.2015 Views

Naming and Directory Services (DNS, NIS, and LDAP)

Naming and Directory Services (DNS, NIS, and LDAP)

Naming and Directory Services (DNS, NIS, and LDAP)

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

information will be searched for a given domain. This node is specified with thedefaultSearchBase attribute. Additionally, you might want to set thedefaultSearchScope attribute to tell the clients the scope of search a namingservice lookup should perform. Is it just searching one level under the DN (one), orthe entire subtree under the DN (sub)?There are times, however, that more flexibility is needed for the <strong>LDAP</strong> naming serviceto either work with an existing DIT or h<strong>and</strong>le a more complicated DIT with namingservice data scattered around the directory tree. For example, user account entries mayexist in different part of the tree. The serviceSearchDescriptor, attributeMap,<strong>and</strong> objectclassMap attributes in the client profile are designed to h<strong>and</strong>le thesesituations.A service search descriptor can be used to override the default search base, searchscope, <strong>and</strong> search filter for a particular service. See “Service Search Descriptors (SSDs)<strong>and</strong> Schema Mapping” on page 134.The AttributeMap <strong>and</strong> ObjectclassMap attributes provide a way for schemamapping. They make it possible for the <strong>LDAP</strong> naming services to work with anexisting DIT. You can map the posixAccount object class to an existing object class,myAccount, for example. You can map an attribute in the posixAccount object classto an attribute in the myAccount object class.Multiple <strong>Directory</strong> ServersMultiple <strong>LDAP</strong> servers can serve one DIT. For example, some subtrees of the DITreside on other <strong>LDAP</strong> servers. In this case, an <strong>LDAP</strong> server may refer the <strong>LDAP</strong> clientto a different server for the naming data it knows about but is not in its own database.If you plan such a DIT configuration, you should set the clients’ profile attributefollowReferrals to indicate to the <strong>LDAP</strong> naming service to follow server referralsto continue naming service lookups. However, it is best to have all naming data for agiven domain reside on a single directory server, if at all possible.Referrals can be useful if you want to have clients access read-only replicas most of thetime <strong>and</strong> follow referrals to a read/write master server only when necessary. In thisway, the master server does not get overloaded with requests that could be h<strong>and</strong>led byreplicas.Data Sharing With Other ApplicationsTo make best use of <strong>LDAP</strong>, you should have a single <strong>LDAP</strong> entry for each logicalentry. For example, for a user you can have not only company white-page information,but also Solaris account information, <strong>and</strong> possibly application-specific data. SinceposixAccount <strong>and</strong> shadowAccount are auxiliary object classes, they can be addedto any entry in the directory. This will require careful planning, setup, <strong>and</strong>administration.Chapter 10 • Planning Requirements for <strong>LDAP</strong> <strong>Naming</strong> <strong>Services</strong> (Tasks) 155

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!