⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 slapo-chain.5

📁 ldap服务器源码
💻 5
字号:
.TH SLAPO-CHAIN 5 "RELEASEDATE" "OpenLDAP LDVERSION".\" Copyright 1998-2007 The OpenLDAP Foundation, All Rights Reserved..\" Copying restrictions apply.  See the COPYRIGHT file..\" $OpenLDAP: pkg/ldap/doc/man/man5/slapo-chain.5,v 1.1.2.7 2007/01/02 21:43:45 kurt Exp $.SH NAMEslapo-chain \- chain overlay.SH SYNOPSISETCDIR/slapd.conf.SH DESCRIPTIONThe.B chainoverlay to.BR slapd (8)allows automatic referral chasing.Any time a referral is returned (except for bind operations),it chased by using an instance of the ldap backend.If operations are performed with an identity (i.e. after a bind),that identity can be asserted while chasing the referrals by means of the \fIidentity assertion\fP feature of back-ldap(see.BR slapd-ldap (5)for details), which is essentially based on the.B proxyAuthzcontrol (see \fIdraft-weltman-ldapv3-proxy\fP for details.)Referral chasing can be controlled by the client by issuing the \fBchaining\fP control(see \fIdraft-sermersheim-ldap-chaining\fP for details.).LP The config directives that are specific to the.B chainoverlay are prefixed by.BR chain\- ,to avoid potential conflicts with directives specific to the underlying database or to other stacked overlays..LPThere are very few chain overlay specific directives; however, directives related to the instances of the \fIldap\fP backend that may be implicitly instantiated by the overlay may assume a special meaning when used in conjunction with this overlay.  They are described in.BR slapd-ldap (5),and they also need be prefixed by.BR chain\- ..TP.B overlay chainThis directive adds the chain overlay to the current backend.The chain overlay may be used with any backend, but it is mainly intended for use with local storage backends that may return referrals.It is useless in conjunction with the \fIslapd-ldap\fP and \fIslapd-meta\fPbackends because they already exploit the libldap specific referral chase feature.[Note: this may change in the future, as the \fBldap\fP(5) and \fBmeta\fP(5) backends might no longer chase referrals on their own.].TP.B chain-chaining [resolve=<r>] [continuation=<c>] [critical]This directive enables the \fIchaining\fP control(see \fIdraft-sermersheim-ldap-chaining\fP for details)with the desired resolve and continuation behaviors and criticality.The \fBresolve\fP parameter refers to the behavior while discoveringa resource, namely when accessing the object indicated by the request DN;the \fBcontinuation\fP parameter refers to the behavior while handlingintermediate responses, which is mostly significant for the search operation, but may affect extended operations that return intermediateresponses.The values \fBr\fP and \fBc\fP can be any of.BR chainingPreferred ,.BR chainingRequired ,.BR referralsPreferred ,.BR referralsRequired .If the \fBcritical\fP flag affects the control criticality if provided.[This control is experimental and its support may change in the future.].TP.B chain-cache-uri {FALSE|true}This directive instructs the \fIchain\fP overlay to cacheconnections to URIs parsed out of referrals that are not predefined,to be reused for later chaining.These URIs inherit the properties configured for the underlying \fBslapd-ldap\fP(5) before any occurrence of the \fBchain-uri\fPdirective; in detail, they are essentially chained anonymously..TP.B chain-uri <ldapuri>This directive instantiates a new underlying \fIldap\fP databaseand instructs it about which URI to contact to chase referrals.As opposed to what stated in \fBslapd-ldap\fP(5), only one URIcan appear after this directive; all subsequent \fBslapd-ldap\fP(5)directives prefixed by \fBchain-\fP refer to this specific instanceof a remote server..LPDirectives for configuring the underlying ldap database may also be required, as shown in this example:.LP.RS.nfoverlay                 chainchain-rebind-as-user    FALSEchain-uri               "ldap://ldap1.example.com"chain-rebind-as-user    TRUEchain-idassert-bind     bindmethod="simple"                        binddn="cn=Auth,dc=example,dc=com"                        credentials="secret"                        mode="self"chain-uri               "ldap://ldap2.example.com"chain-idassert-bind     bindmethod="simple"                        binddn="cn=Auth,dc=example,dc=com"                        credentials="secret"                        mode="none".fi.RE.LPAny valid directives for the ldap database may be used; see.BR slapd-ldap (5)for details.Multiple occurrences of the \fBchain-uri\fP directive may appear,to define multiple "trusted" URIs where operations with \fIidentity assertion\fP are chained.All URIs not listed in the configuration are chained anonymously.All \fBslapd-ldap\fP(5) directives appearing before the first occurrence of \fBchain-uri\fP are inherited by all URIs,unless specifically overridden inside each URI configuration..SH FILES.TPETCDIR/slapd.confdefault slapd configuration file.SH SEE ALSO.BR slapd.conf (5),.BR slapd\-ldap (5),.BR slapd (8)..SH AUTHOROriginally implemented by Howard Chu; extended by Pierangelo Masarati.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -