OK, I've narrowed one of my LDAP problems to something that might be
more of a bug in SuSE's installation than anything else.
Unfortunately it doesn't cover everything.
First, from the openldap pages it's generally considered a "good idea"
not to use LDAP v2 protocols as they are being phased out for v3.
Because of this I did not select v2 as the LDAP client/server
configuration in ldapd.conf or theYAST client tool.
This created a consistent error and, after googling a bit, I added
"allow bind_v2" to /etc/slapd.conf.
After this I was able to eliminate one of the errors I was getting when
I attempted to add users to the LDAP database using the YAST tools.
Now I get messages like this:
I think "errno=11" is where I start getting into trouble.
----------------------------------
Oct 13 07:50:33 dmz slapd[4102]: daemon: read activity on 12
Oct 13 07:50:33 dmz slapd[4102]: connection_get(12)
Oct 13 07:50:33 dmz slapd[4102]: connection_get(12): got connid=9
Oct 13 07:50:33 dmz slapd[4102]: connection_read(12): checking for input
on id=9
Oct 13 07:50:33 dmz slapd[4102]: ber_get_next on fd 12 failed errno=11
(Resource temporarily unavailable)
Oct 13 07:50:33 dmz slapd[4148]: do_search
Oct 13 07:50:33 dmz slapd[4148]: >>> dnPrettyNormal:
I never knew YAST had tools to modify/edit users within an LDAP database. If it does, then I'd sure love to hear about it. Personally, I use Java LDAP Xplorer to view/edit/modify users and it gives me the power of adding any schema I like to the user, above the ones that are needed by the system. And of course, the migration tools, to migrate the user databases to ldap, then there's of course the smbldap perl utilities. On Monday 13 October 2003 13:51, Tom Allison wrote:
OK, I've narrowed one of my LDAP problems to something that might be more of a bug in SuSE's installation than anything else. Unfortunately it doesn't cover everything.
First, from the openldap pages it's generally considered a "good idea" not to use LDAP v2 protocols as they are being phased out for v3. Because of this I did not select v2 as the LDAP client/server configuration in ldapd.conf or theYAST client tool. This created a consistent error and, after googling a bit, I added "allow bind_v2" to /etc/slapd.conf. After this I was able to eliminate one of the errors I was getting when I attempted to add users to the LDAP database using the YAST tools.
Now I get messages like this:
I think "errno=11" is where I start getting into trouble. ----------------------------------
Oct 13 07:50:33 dmz slapd[4102]: daemon: read activity on 12 Oct 13 07:50:33 dmz slapd[4102]: connection_get(12) Oct 13 07:50:33 dmz slapd[4102]: connection_get(12): got connid=9 Oct 13 07:50:33 dmz slapd[4102]: connection_read(12): checking for input on id=9 Oct 13 07:50:33 dmz slapd[4102]: ber_get_next on fd 12 failed errno=11 (Resource temporarily unavailable) Oct 13 07:50:33 dmz slapd[4148]: do_search Oct 13 07:50:33 dmz slapd[4148]: >>> dnPrettyNormal:
Oct 13 07:50:33 dmz slapd[4148]: <<< dnPrettyNormal: , Oct 13 07:50:33 dmz slapd[4102]: daemon: select: listen=6 active_threads=1 tvp=NULL Oct 13 07:50:33 dmz slapd[4148]: SRCH "ou=Group,dc=tacocat,dc=net" 2 0 Oct 13 07:50:33 dmz slapd[4148]: 0 0 0 Oct 13 07:50:33 dmz slapd[4148]: begin get_filter Oct 13 07:50:33 dmz slapd[4148]: AND Oct 13 07:50:33 dmz slapd[4148]: begin get_filter_list Oct 13 07:50:33 dmz slapd[4148]: begin get_filter Oct 13 07:50:33 dmz slapd[4148]: EQUALITY Oct 13 07:50:33 dmz slapd[4148]: end get_filter 0 Oct 13 07:50:33 dmz slapd[4148]: begin get_filter Oct 13 07:50:33 dmz slapd[4148]: EQUALITY Oct 13 07:50:33 dmz slapd[4148]: end get_filter 0 Oct 13 07:50:33 dmz slapd[4148]: end get_filter_list Oct 13 07:50:33 dmz slapd[4148]: end get_filter 0 Oct 13 07:50:33 dmz slapd[4148]: filter: (&(objectClass=posixGroup)(?=undefined)) Oct 13 07:50:33 dmz slapd[4148]: attrs: Oct 13 07:50:33 dmz slapd[4148]: cn Oct 13 07:50:33 dmz slapd[4148]: userPassword Oct 13 07:50:33 dmz slapd[4148]: memberUid Oct 13 07:50:33 dmz slapd[4148]: uniqueMember Oct 13 07:50:33 dmz slapd[4148]: gidNumber Oct 13 07:50:33 dmz slapd[4148]: Oct 13 07:50:33 dmz slapd[4148]: conn=9 op=2 SRCH base="ou=Group,dc=tacocat,dc=net" scope=2 filter="(&(objectClass=posixGroup)(?=undefined)) " Oct 13 07:50:33 dmz slapd[4148]: => ldbm_back_search Oct 13 07:50:33 dmz slapd[4148]: dn2entry_r: dn: "ou=group,dc=tacocat,dc=net" Oct 13 07:50:33 dmz slapd[4148]: => dn2id( "ou=group,dc=tacocat,dc=net" ) Oct 13 07:50:33 dmz slapd[4148]: => ldbm_cache_open( "dn2id.dbb", 73, 600 ) Oct 13 07:50:33 dmz slapd[4148]: <= ldbm_cache_open (cache 0) Oct 13 07:50:33 dmz slapd[4148]: <= dn2id NOID Oct 13 07:50:33 dmz slapd[4148]: dn2entry_r: dn: "dc=tacocat,dc=net" Oct 13 07:50:33 dmz slapd[4148]: => dn2id( "dc=tacocat,dc=net" ) Oct 13 07:50:33 dmz slapd[4148]: => ldbm_cache_open( "dn2id.dbb", 73, 600 ) Oct 13 07:50:33 dmz slapd[4148]: <= ldbm_cache_open (cache 0) Oct 13 07:50:33 dmz slapd[4148]: <= dn2id NOID Oct 13 07:50:33 dmz slapd[4148]: send_ldap_result: conn=9 op=2 p=2 Oct 13 07:50:33 dmz slapd[4148]: send_ldap_result: err=10 matched="" text="" Oct 13 07:50:33 dmz slapd[4148]: send_ldap_response: msgid=3 tag=101 err=32 Oct 13 07:50:33 dmz slapd[4148]: conn=9 op=2 RESULT tag=101 err=32 text=
The 03.10.13 at 20:42, Örn Hansen wrote:
I never knew YAST had tools to modify/edit users within an LDAP database. If it does, then I'd sure love to hear about it.
Me too :-) I only see in yast a thing for configuring login with an external ldap server.
Personally, I use Java LDAP Xplorer to view/edit/modify users and it gives
Which program is that? I don't see xplorer in the distro. -- Cheers, Carlos Robinson
Which program is that? I don't see xplorer in the distro.
http://www.globus.org/mds/getmdsdata/cmdsdata.html Perhaps is Java ldap Browser, Xplorer uses php. -- -.Francisco Acosta.- chesco@idea.com.py
On Tuesday 14 October 2003 11:03, Carlos E. R. wrote:
Personally, I use Java LDAP Xplorer to view/edit/modify users and it gives
Which program is that? I don't see xplorer in the distro.
It can be found at: http://sourceforge.net/projects/jxplorer The best ldap tool I've come across yet. Örn
participants (4)
-
Carlos E. R.
-
Francisco Acosta
-
Tom Allison
-
Örn Hansen