⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ldapsearch.1

📁 ldap服务器源码
💻 1
字号:
.TH LDAPSEARCH 1 "RELEASEDATE" "OpenLDAP LDVERSION".\" $OpenLDAP: pkg/ldap/doc/man/man1/ldapsearch.1,v 1.49.2.11 2007/01/02 21:43:44 kurt Exp $.\" Copyright 1998-2007 The OpenLDAP Foundation All Rights Reserved..\" Copying restrictions apply.  See COPYRIGHT/LICENSE..SH NAMEldapsearch \- LDAP search tool.SH SYNOPSIS.B ldapsearch[\c.BR \-n ][\c.BR \-u ][\c.BR \-v ][\c.BR \-t[t] ][\c.BI \-T \ path\fR][\c.BI \-F \ prefix\fR][\c.BR \-A ][\c.BR \-L[L[L]] ][\c.BR \-M[M] ][\c.BI \-S \ attribute\fR][\c.BI \-d \ debuglevel\fR][\c.BI \-f \ file\fR][\c.BR \-x ][\c.BI \-D \ binddn\fR][\c.BR \-W ][\c.BI \-w \ passwd\fR][\c.BI \-y \ passwdfile\fR][\c.BI \-H \ ldapuri\fR][\c.BI \-h \ ldaphost\fR][\c.BI \-p \ ldapport\fR][\c.BI \-b \ searchbase\fR][\c.BI \-s \ base\fR\||\|\fIone\fR\||\|\fIsub\fR\||\|\fIchildren\fR][\c.BI \-a \ never\fR\||\|\fIalways\fR\||\|\fIsearch\fR\||\|\fIfind\fR][\c.BI \-P \ 2\fR\||\|\fI3\fR][\c.BR \-e \ [!]ext[=extparam]][\c.BR \-E \ [!]ext[=extparam]][\c.BI \-l \ timelimit\fR][\c.BI \-z \ sizelimit\fR][\c.BR \-O \ security-properties ][\c.BR \-I ][\c.BR \-Q ][\c.BI \-U \ authcid\fR][\c.BI \-R \ realm\fR][\c.BI \-X \ authzid\fR][\c.BI \-Y \ mech\fR][\c.BR \-Z[Z] ].I filter[\c.IR attrs... ].SH DESCRIPTION.I ldapsearchis a shell-accessible interface to the.BR ldap_search_ext (3)library call..LP.B ldapsearchopens a connection to an LDAP server, binds, and performs a searchusing specified parameters.   The \fIfilter\fP should conform tothe string representation for search filters as defined in RFC 4515.If not provided, the default filter, (objectClass=*), is used..LPIf.B ldapsearchfinds one or more entries, the attributes specified by\fIattrs\fP are returned.  If * is listed, all user attributes arereturned.  If + is listed, all operational attributes are returned.If no \fIattrs\fP are listed, all user attributes are returned.  If only1.1 is listed, no attributes will be returned..SH OPTIONS.TP.B \-nShow what would be done, but don't actually perform the search.  Useful fordebugging in conjunction with -v..TP.B \-uInclude the User Friendly Name form of the Distinguished Name (DN)in the output..TP.B \-vRun in verbose mode, with many diagnostics written to standard output..TP.B \-t[t]A single -t writes retrieved non-printable values to a set of temporaryfiles.  This is useful for dealing with values containing non-characterdata such as jpegPhoto or audio. A second -t writes all retrieved values tofiles..TP.BI \-T \ pathWrite temporary files to directory specified by \fIpath\fP (default:/var/tmp/).TP.BI \-F \ prefixURL prefix for temporary files.  Default is file://\fIpath\fP/ where\fIpath\fP is /var/tmp/ or specified with -T..TP.B \-ARetrieve attributes only (no values).  This is useful when you just want tosee if an attribute is present in an entry and are not interested in thespecific values..TP.B \-LSearch results are display in LDAP Data Interchange Format detailed in.BR ldif (5).A single -L restricts the output to LDIFv1.A second -L disables comments.A third -L disables printing of the LDIF version.The default is to use an extended version of LDIF..TP.B \-M[M]Enable manage DSA IT control..B \-MMmakes control critical..TP.BI \-S \ attributeSort the entries returned based on \fIattribute\fP. The default is notto sort entries returned.  If \fIattribute\fP is a zero-length string (""),the entries are sorted by the components of their Distinguished Name.  See.BR ldap_sort (3)for more details. Note that.B ldapsearchnormally prints out entries as it receives them. The use of the.B \-Soption defeats this behavior, causing all entries to be retrieved,then sorted, then printed..TP.BI \-d \ debuglevelSet the LDAP debugging level to \fIdebuglevel\fP..B ldapsearchmust be compiled with LDAP_DEBUG defined for this option to have any effect..TP.BI \-f \ fileRead a series of lines from \fIfile\fP, performing one LDAP search foreach line.  In this case, the \fIfilter\fP given on the command lineis treated as a pattern where the first and only occurrence of \fB%s\fPis replaced with a line from \fIfile\fP.  Any other occurence of thethe \fB%\fP character in the pattern will be regarded as an error.Where it is desired that the search filter include a \fB%\fP character,the character should be encoded as \fB\\25\fP (see RFC 4515).If \fIfile\fP is a single\fI-\fP character, then the lines are read from standard input..TP.B \-x Use simple authentication instead of SASL..TP.BI \-D \ binddnUse the Distinguished Name \fIbinddn\fP to bind to the LDAP directory..TP.B \-WPrompt for simple authentication.This is used instead of specifying the password on the command line..TP.BI \-w \ passwdUse \fIpasswd\fP as the password for simple authentication..TP.BI \-y \ passwdfileUse complete contents of \fIpasswdfile\fP as the password forsimple authentication..TP.BI \-H \ ldapuriSpecify URI(s) referring to the ldap server(s); only the protocol/host/portfields are allowed; a list of URI, separated by whitespace or commasis expected..TP.BI \-h \ ldaphostSpecify an alternate host on which the ldap server is running.Deprecated in favor of -H..TP.BI \-p \ ldapportSpecify an alternate TCP port where the ldap server is listening.Deprecated in favor of -H..TP.BI \-b \ searchbaseUse \fIsearchbase\fP as the starting point for the search instead ofthe default..TP.BI \-s \ base\fR\||\|\fIone\fR\||\|\fIsub\fR\||\|\fIchildrenSpecify the scope of the search to be one of.IR base ,.IR one ,.IR sub ,or.I childrento specify a base object, one-level, subtree, or children search.The default is.IR sub .Note:.I childrenscope requires LDAPv3 subordinate feature extension..TP.BI \-a \ never\fR\||\|\fIalways\fR\||\|\fIsearch\fR\||\|\fIfindSpecify how aliases dereferencing is done.  Should be one of.IR never ,.IR always ,.IR search ,or.I findto specify that aliases are never dereferenced, always dereferenced,dereferenced when searching, or dereferenced only when locating thebase object for the search.  The default is to never dereference aliases..TP.BI \-P \ 2\fR\||\|\fI3Specify the LDAP protocol version to use..TP.B \-e \fI[!]ext[=extparam]\fP.TP.B \-E \fI[!]ext[=extparam]\fPSpecify general extensions with -e and search extensions with -E.\'!\' indicates criticality.General extensions:.nf  [!]assert=<filter>   (an RFC 4515 Filter)  [!]authzid=<authzid> ("dn:<dn>" or "u:<user>")  [!]manageDSAit  [!]noop  ppolicy  [!]postread[=<attrs>]        (a comma-separated attribute list)  [!]preread[=<attrs>] (a comma-separated attribute list)  abandon, cancel (SIGINT sends abandon/cancel; not really controls).fiSearch extensions:.nf  [!]domainScope                               (domain scope)  [!]mv=<filter>                               (matched values filter)  [!]pr=<size>[/prompt|noprompt]       (paged results/prompt)  [!]subentries[=true|false]           (subentries)  [!]sync=ro[/<cookie>]                        (LDAP Sync refreshOnly)          rp[/<cookie>][/<slimit>]     (LDAP Sync refreshAndPersist).fi.TP.BI \-l \ timelimitwait at most \fItimelimit\fP seconds for a search to complete.A timelimit of.I 0(zero) or.I nonemeans no limit.A timelimit of.I maxmeans the maximum integer allowable by the protocol.A server may impose a maximal timelimit which onlythe root user may override..TP.BI \-z \ sizelimitretrieve at most \fIsizelimit\fP entries for a search.A sizelimit of.I 0(zero) or.I nonemeans no limit.A sizelimit of.I maxmeans the maximum integer allowable by the protocol.A server may impose a maximal sizelimit which onlythe root user may override..TP.BI \-O \ security-propertiesSpecify SASL security properties..TP.B \-IEnable SASL Interactive mode.  Always prompt.  Default is to promptonly as needed..TP.B \-QEnable SASL Quiet mode.  Never prompt..TP.BI \-U \ authcidSpecify the authentication ID for SASL bind. The form of the IDdepends on the actual SASL mechanism used..TP.BI \-R \ realmSpecify the realm of authentication ID for SASL bind. The form of the realmdepends on the actual SASL mechanism used..TP.BI \-X \ authzidSpecify the requested authorization ID for SASL bind..I authzidmust be one of the following formats:.B dn:\c.I <distinguished name>or.B u:\c.I <username>.TP.BI \-Y \ mechSpecify the SASL mechanism to be used for authentication. If it's notspecified, the program will choose the best mechanism the server knows..TP.B \-Z[Z]Issue StartTLS (Transport Layer Security) extended operation. If you use.B \-ZZ\c, the command will require the operation to be successful..SH OUTPUT FORMATIf one or more entries are found, each entry is written to standardoutput in LDAP Data Interchange Format or.BR ldif (5):.LP.nf    version: 1    # bjensen, example, net    dn: uid=bjensen,dc=example,dc=net    objectClass: person    objectClass: dcObject    uid: bjensen    cn: Barbara Jensen    sn: Jensen    ....fi.LPIf the -t option is used, the URI of a temporary fileis used in place of the actual value.  If the -A optionis given, only the "attributename" part is written..SH EXAMPLEThe following command:.LP.nf    ldapsearch -LLL "(sn=smith)" cn sn telephoneNumber.fi.LPwill perform a subtree search (using the default search base andother parameters defined in.BR ldap.conf (5))for entries with a surname (sn) of smith.  The common name (cn), surname(sn) and telephoneNumber values will be retrieved and printed tostandard output.The output might look something like this if two entries are found:.LP.nf    dn: uid=jts,dc=example,dc=com    cn: John Smith    cn: John T. Smith    sn: Smith    sn;lang-en: Smith    sn;lang-de: Schmidt    telephoneNumber: 1 555 123-4567    dn: uid=sss,dc=example,dc=com    cn: Steve Smith    cn: Steve S. Smith    sn: Smith    sn;lang-en: Smith    sn;lang-de: Schmidt    telephoneNumber: 1 555 765-4321.fi.LPThe command:.LP.nf    ldapsearch -LLL -u -t "(uid=xyz)" jpegPhoto audio.fi.LPwill perform a subtree search using the default search base for entrieswith user id of "xyz".  The user friendly form of the entry's DN will beoutput after the line that contains the DN itself, and the jpegPhotoand audio values will be retrieved and written to temporary files.  Theoutput might look like this if one entry with one value for each of therequested attributes is found:.LP.nf    dn: uid=xyz,dc=example,dc=com    ufn: xyz, example, com    audio:< file:///tmp/ldapsearch-audio-a19924    jpegPhoto:< file:///tmp/ldapsearch-jpegPhoto-a19924.fi.LPThis command:.LP.nf    ldapsearch -LLL -s one -b "c=US" "(o=University*)" o description.fi.LPwill perform a one-level search at the c=US level for all entrieswhose organization name (o) begins begins with \fBUniversity\fP.The organization name and description attribute values will be retrievedand printed to standard output, resulting in output similar to this:.LP.nf    dn: o=University of Alaska Fairbanks,c=US    o: University of Alaska Fairbanks    description: Preparing Alaska for a brave new yesterday    description: leaf node only    dn: o=University of Colorado at Boulder,c=US    o: University of Colorado at Boulder    description: No personnel information    description: Institution of education and research    dn: o=University of Colorado at Denver,c=US    o: University of Colorado at Denver    o: UCD    o: CU/Denver    o: CU-Denver    description: Institute for Higher Learning and Research    dn: o=University of Florida,c=US    o: University of Florida    o: UFl    description: Warper of young minds    ....fi.SH DIAGNOSTICSExit status is zero if no errors occur.Errors result in a non-zero exit status anda diagnostic message being written to standard error..SH "SEE ALSO".BR ldapadd (1),.BR ldapdelete (1),.BR ldapmodify (1),.BR ldapmodrdn (1),.BR ldap.conf (5),.BR ldif (5),.BR ldap (3),.BR ldap_search_ext (3),.BR ldap_sort (3).SH AUTHORThe OpenLDAP Project <http://www.openldap.org/>.SH ACKNOWLEDGEMENTS.B OpenLDAPis developed and maintained by The OpenLDAP Project (http://www.openldap.org/)..B OpenLDAPis derived from University of Michigan LDAP 3.3 Release.  

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -