[ Previous | Next | Table of Contents | Index | Library Home | Legal | Search ]

Commands Reference, Volume 3


mksecldap Command

Purpose

Sets up an AIX cluster to use LDAP for security authentication and data management.

Syntax

To Set Up an LDAP Security Information Server

mksecldap -s [ -a AdminDN] [ -p Adminpasswd] [ -d Suffix ] [ -k SSLkey] [ -w SSLkeypasswd ] [ -U ]

To Set Up an LDAP Client

mksecldap -c [ -a AdminDN] [ -p Adminpasswd] [ -h Serverlist] [ -d Suffix] [ -u ALL|userlist] [ -k SSLkeyfilepath] [ -w SSLkeypasswd] [ -t Cachetimeout] [ -C CacheSize ] [ -P NumberofThreads ][ -m ]

Note: This command can be run by root user only.

Description

The mksecldap command sets up an AIX cluster consisting of a server(s), and one or more clients to use LDAP for security authentication and data management. This command must be run on the server and all the clients.

Note: The client (-c flag) and the server (-s flag) options cannot be run at the same time. When setting up a server, the mksecldap command should be run twice on that machine. Once to set up the server, and again to set up the client.

For server setup, using the -s flag, the mksecldap command:

Note: All the LDAP configuration are saved into the /etc/slapd.conf (SecureWay Directory version 3.1) or /etc/slapd32.conf (SecureWay Directory version 3.2) LDAP server configuration file.

For client setup, using the -c flag, the mksecldap command:

Note: The client configuration data is saved to the /etc/security/ldap/ldap.cfg file.

AIX user/group management commands can be used to do LDAP user/group management, by supplying a -R LDAP flag following the command.

Flags

On the server side:

-a AdminDN Specifies the LDAP server administrator DN.
-d Suffix Specifies the suffix of the AIX subtree.
-k SSLkey Specifies the full path to the SSL key database of the server.
-p Adminpasswd Specifies the clear text password for the administrator DN.
-s Indicates that the command is being run to setup the server.
-w SSLkeyfilepath Specifies the password for the SSL key.
-U Specifies to undo the previous server setup to the LDAP configuration file.

On the client side:

-a AdminDN Specifies the LDAP server administrator DN. It must match the one used for the server setup.
-c Indicates the command is being run to setup the client.
-C Cachsize Specifies the maximum number of user or group entries used in the client side daemon cache. The default is 1000 (1000 for user entries and 1000 for group entries).
-d TreeDN Specifies the suffix of the AIX subtree of the LDAP server. It must match the one used for the server setup.
-h Serverlist Specifies a comma separated list of hostnames (server and backup server).
-k SSLkeyfilepath Specifies the full path to the client SSL key.
-m Sets the client daemon to always talk to the master server when it is available.
-p Adminpasswd Specifies the clear text password for the administrator DN of the LDAP server. It must match the one used for the server setup.
-P NumberofTreads Specifies the number of threads the client side daemon uses. The default is 10. This is for advanced users to adjust the system performance.
-t Cachetimeout Specifies the maximum time length that a cache entry expires. The default is 300 seconds.
-u ALL|userlist Specifies the comma separated list of usernames. Specify ALL to enable all users on the client.
-w SSLkeyfilepath Specifies the password for the client SSL key.

Files Accessed:


Mode File
r /etc/passwd
r /etc/group
r /etc/security/passwd
r /etc/security/limits
r /etc/security/user (on the server)
rw /etc/security/user (on the clients)
r /etc/security/environ
r /etc/security/user.roles
r /etc/security/lastlog
r /etc/security/smitacl.user
r /etc/security/mac_user
r /etc/security/group
r /etc/security/smitacl.group
r /etc/security/roles
rw /etc/security/login.cfg (on the server)
rw /etc/slapd.conf (on the server)
rw /etc/aix.slapd.conf (on the server)

Examples

  1. To setup the server with the administrator DN as cn=admin,o=ibm,c=us and the password as adminpwd, type:
    mksecldap -s -a  cn=admin,o=ibm,c=us -p adminpwd 
    

    The AIX tree DN (suffix) is set to default: cn=aixsecdb.

  2. To setup the server using suffix cn=aixsecdb,o=mycompany,c=us, type:
    mksecldap -s -a cn=admin,o=ibm,c=us -p adminpwd -d \
    o=mycompany,c=us -k /usr/ldap/serverkey.kdb -w keypwd
    

    The mksecldap command automatically converts the o=mycompany,c=us suffix to cn=aixsecdb,o=mycompany,c=us. It also sets the server to use the key stored at /usr/ldap/serverkey.kdb for SSL connections.

  3. To setup the client to use server1.ibm.com and server2.ibm.com as its ldap server, type:
    mksecldap  -c  -a cn=admin,o=ibm,c=us -p adminpwd -h \
    server1.ibm.com,server2.ibm.com
    

    The administrator DN and password of the server must be supplied for this client to authenticate to the server.

    Note: The server must be set up to use the default AIX suffix in order for this to work, otherwise the explicit server AIX suffix must be supplied with the -d flag for the client setup.
  4. To setup the client to use server1.ibm.com as its ldap server and to tell the client that the AIX tree suffix is cn=aixsecdb,o=mycompany,c=us, type:
    mksecldap  -c  -a cn=admin,o=ibm,c=us -p adminpwd -h server1.ibm.com -d \
    o=mycompany,c=us -k /usr/ldap/serverkey.kdb -w keypwd -u user1, user2, ....
    

    The mksecldap command automatically converts the o=mycompany,c=us suffix to cn=aixsecdb,o=mycompany,c=us. The suffix supplied with the -d flag must match that used for the server setup. This also sets the client to use the key stored at /usr/ldap/serverkey.kdb for SSL connections. Users in the user1, user2, ...list are set up to authenticate through ldap.

  5. To set all users on the local host so that they authenticate through ldap, type:
    mksecldap -c -u ALL
    

Related Information

The secldapclntd Daemon.

The /etc/security/ldap/ldap.cfg File.

The /etc/sldap.conf and /etc/sldap32.conf File.

LDAP Exploitation of the Security Subsystem in the AIX 5L Version 5.1 System Management Guide: Operating System and Devices.


[ Previous | Next | Table of Contents | Index | Library Home | Legal | Search ]