From a85a26c56ac5b47052018c7378c1a786606ebc72 Mon Sep 17 00:00:00 2001 From: Kurt Zeilenga Date: Sat, 12 Aug 2000 06:35:08 +0000 Subject: [PATCH] Update running with additional slapd arguments Update slapdcofig with additional directives Add updated graphics and othe misc changes. --- doc/guide/admin/config.sdf | 7 +- doc/guide/admin/config_local.gif | Bin 1424 -> 1910 bytes doc/guide/admin/config_ref.gif | Bin 0 -> 3134 bytes doc/guide/admin/config_repl.gif | Bin 3298 -> 3511 bytes doc/guide/admin/install.sdf | 2 +- doc/guide/admin/replication.sdf | 24 ++++-- doc/guide/admin/runningslapd.sdf | 39 +++++++++ doc/guide/admin/slapdconfig.sdf | 134 +++++++++++-------------------- 8 files changed, 108 insertions(+), 98 deletions(-) create mode 100644 doc/guide/admin/config_ref.gif diff --git a/doc/guide/admin/config.sdf b/doc/guide/admin/config.sdf index b81412b698..6355de07bd 100644 --- a/doc/guide/admin/config.sdf +++ b/doc/guide/admin/config.sdf @@ -55,9 +55,10 @@ H2: Distributed Local Directory Service In this configuration, the local service is partitioned into smaller services, each which may be replicated, and {{glued}} together with -{{superior}} and {{subordinate}} referrals. An example of this -configuration is shown in Figure 3.4. +{{superior}} and {{subordinate}} referrals. +!if 0 +An example of this configuration is shown in Figure 3.4. !import "config_dist.gif"; align="center"; title="Distributed Local Directory Services" FT[align="Center"] Figure 3.4: Distributed Local Directory Services - +!endif diff --git a/doc/guide/admin/config_local.gif b/doc/guide/admin/config_local.gif index d518bca9195c81d0819443b70f7e1faa446aff54..6690d46fa0bf4ac445af364e46ff7435bfcfbb92 100644 GIT binary patch literal 1910 zcmW+#4LFur8a{QI%C*}zHIod=L4Ur<&g}Ffs_Bd*k!+cU5J%{Tov6s)(o=Rvea%QQ zEGj4R`6$*;(U+N=sr+Or%NjGr-zh~=qFGWV_PjmU^G?yc;$;thDiq zn&g6BP9PcZ_JOwt$bSG_MmyKk4-$+hMt~8+h+`x$LIh!g2tkw}Aczsf2@(V$iZDfl zB1#cZ#30)aqGATE#)2qA)%bqG~J2vb^#KtyhdF(H^xOaK#x3CBcWB5P$@1| zjj|9`){)2(M9u@LFQ&?tlmbv-6gUMzf&RMv4|95@HTL3)M-Naj>F3t$4c03iS=_d?Q>Zp$L+p|ndnqqvB%q6NjuM20!X zTwrOA^g$7b5(S1S@<=5VzcE!*qg26Wlyk}jm10QVlA>gzEX06wkjTo-z)aDXGG$A~ zIA>fi2`+KuNZBn5WsXmb4Kj8C0F=uN_? z%zlWU_MXbSuK4`Tgm*2R&N!B2SD!Fk8q_{*Ce)t9>(nM2OE26`UcB~z_wCYL=QKoO|J(Qu%gEyU1qm@d zR%cdPbk`)MIh4l?4h5)FKeE1eY5S7Sdsa5_Js(E@Z}V+Uyk@{VI-E8a&2Fd zTj@LHHE*J<{3|M#Pgz@U?B9C7`b5#T&hk>Xhu6OE+?*JN!#aOgIU# z)R1l3EqBcJy8U}`+?ui0yD=fAraP=7`$wPkR{6~GJJkM6=iYH(s3Wf{PTN@f1r*N> z-x@zzJ!}f=-t2OVn`We?NAGNYBI~Go63J`qy>lNu*S3dU)a4Jpl)uG^q=cottWN z!vE+H?wxFxU6Fm*-8SW?)SME1vrzB2sXZA7UwHU@-4s5*_w-)d-i5)Qb|ZPa!bb8f zSmp=n-0aUXRy_9kI{Ve*fMkdI+}zP^s>Pay{i<}$@#u{AwZ~_x3R3d=?ECyQszW|0 z+;h&zk3V zYsSF5fAwAW(qDbY%Gc%Z?KLw#wb*#t`tj5Bb8V|bp6)D|H#(f&aCg+>LG0*%{HsbE z2FE^*aV^QKc&Yn-Aj7mTcW}_UVd6)Fn_j~$Wrj~5J^$;Fv&UbT39Lf>+>-OPgN%X+=ewrw4?yEfeg-rahB zdS1f1C#@j~?vqxV^xv9t%Q!Lgn1$MJdiYh{0)xh5Cs*OVa~@WU%#*2?$#acUT=5&RNQWp)Bg1v@;}+y_~*a9|G7zm{dL=4XC4lDSU>k=-G)XzJ+$io DT3v~c literal 1424 zcmZ?wbhEHbJjh_i@PPpc{xkgluLEL$MA|_D|Nn!yqhK@yMqUVT{AXb1knz~C;9xU{ zuvW~84GRyq3n+Wd@z}WNXt#uM)}0d@7a#9eaPE>>DcEqbNiCSkU`Nq{Q_x|DijbB17_srQz*m$wvLE-K{?UVVE<#oB#$qNXiBzqgW^Th3?4hKGkc8sEj9 z*|9Nsy{x?Vyge3%UMK8BqpqxxC{CPTwNg*y?$6CJ9SinPVw-K1^SXKU%zbIP6{R_Q z3-VX{t&ldqb#Gs!-Iq7hi!ZG^lFjv&_s^>f&$9nIrE1HXdOqGGczdhfoL|8!%QyD@ zXPNWY;K#!a%jIq3=2m+gdnuehS7PtmJC8O`jbC;~eqZ_F&z>RoqigqWo$2wDiTE;~M$&G8R;Szv>$1CdfBkrdoz+x_p@Ir1VGeB0*OaJAdV}+;vsH7IwAk z>B8-jy<2o!ABQl8wcl-D@%F`?430w?_b0L_MF#d5tvdRo(R>qoWP|N0jg$h{#Oom) z9ziRYOr2&JakJV@Epyp)@k`}TLwF{2#?%)qYkNGUbnWw-o+e?DYQEj)+*9_$buCA(Q zZJBOc)Y@-_hIPDL5jgeLy}V^7Pbt-v%C)M;FZ<^72F3r} b!6A-8E}mfurg{dPj8B9a7%EwT8O$00X81dZ diff --git a/doc/guide/admin/config_ref.gif b/doc/guide/admin/config_ref.gif new file mode 100644 index 0000000000000000000000000000000000000000..9108d3a7d417c486dbb867f1e16f7c4700e5c6c9 GIT binary patch literal 3134 zcmW+#2{=`27ykOoR5!PhqN{thDRXHcD)mvBql_oxju4XM5QRQNDxpCfp=?76$&@+T zk<3IP6?P=i?UJ!n$G`Vo&$FNJoVC|l?|R?&+j<7N8k)xfm(+myML-Ao??L|^i2jEV zNymFKt9cS)0LK8r0D%D#0~7`T1Q-Mm0vrMa0RaIC0R;iT0fqyJ0~`kk2LujC98fr* z=V1sy1aL$T1_S~m0u+r!0E_^T05|~<0SE$+1fU22NPv+5k^mh0jHNq%JBjFT86eK7}Qjnq`VAQ3@A)Jv15e#WW0Ys~YVGK5o zA%r0ULnMYM3;~7>vk=a#LnG55^gKlCi{Z?cIF1mG2po|(qHua7-AxzLIVK2%NQ5Ya zXeTfN(R^?^MIeGeB!MUb(e_{@qDkU(9f=4MktCu>M0f+Pu&B4}_LhaO3H(}i@7T>Lpn5Sa)e z=CUt>#s3caq<_&N`D57hw9jP#U`9_bI zGM!1f*A(rWA1gf1G||(EF)YckOaYH>w&s-N_U5mv2>UJX|FEyvwIyApqBQT_1CK$c zXr;18{kJ(2X05qp`GW-)woI)wE?2F67P(%^r1ks6(2IkTM(V!;wmoZ3*nXit<#zF> z4ofZ5bt@}p%(|{0Np@Ii;pg1@(D_|NTVm-y?Ng8t z1$62!3~J7QZ(Qy6_vrp9exZdo+ zns9Ne&-f*I-5JR%Sfp5An7CqqQ`C-anf=--&53yQx~a0^Xf^&T8Jyh-`UAmYQbNvG zjMgZ8j1y}wNeR^r)gVGXA9QDhOlb@C$1nHMXR)2mW%ph_Hf7jj+>8@pa{ z=yuONdoRT`iOyjbAC4x3<;Z6r@+sSBQ%K!CJLg95 zr#FLEHR^g_Tr;LToNm_7xqB38sr($X5~*yIxuzLw=v7=Ob#-mL!ol2JQWJf44j{K(Vg zJD+bpHXmv8El=F~tX%^u-1t^wnpd=Rlk|m?Q!etX?jrLoT>nDXt=lbq-F8+<9IO9h zr;P%s_4A5ciT0mgfF0(s_4n~XfnZ16~Ijnb4 zLOWLGXxB%BTMApFEc({S8gaL}v}Ya_kugrzWDULUdo^lG>AlL?5&EC|Eaz(ixnC1&EF=;+$++(cYawva4AXL-<5YYK>A|`aq!yQd(D}# zhu03}he)t}9eVR68#dW!rm;IC4w-Z8UeAxcthANmH?dK-D{45q$=YPk$IkoeA_1-XR+ph43{(2G@KN1 z#!xZ$@sy!*@#`~2o2zD~j8yB^PHQVP?3gwd>a_4}yU~1n`jBdWgs+LprOauQJ)W(; zrn^QyPMb>qUdA~r#wR=TlK<-gPN(upmzmC9iHn@B8ku`DT?MM$YYmNd&hB_%vQO0V z{$V{ezbrFT%h_BDYrpO)>zmH;d6q{#?VGIZ`qI^`9e$6`_Gb9=`LmsTW+&Lk<1DS% zx?I1xKDX+O!oA<3E*?5El2a{cyRAa4=iPy4@zLh4-D|l`kDKk6v;BH!yPN%oPjb=% zLUXt+=le%awFDLZW9>Nit7O(O_3(3RtFR?Kz5{HL&FqFRkVF#bQKj31nqtcw(8>Fm*0m8y?eCb#YRiNntIv4WcCBm}`n zotu)T>Ba`DGYsN4JJy^OGN%sQ-l1|z;>QuUwir##*w+eXpPLBnjc-%3Iqr3LjZ<}k z6D{1$ZYrSSd${Uj*B_d92s@OPO%7eGuU%RFUER6MO3w3BN|lCRenalh z>e#NiuaDXeo)Zw}J>eKO$rf5)i*YFTZ%IpYlZ}cW4Vv9A`?qL+4e#~uFH1z`S+2Y^ zJ;IZJxnNwdkZUC7Cv3$p8UBt>RUyrHow^zs--h89l3o@R_ca@mcNXxzM{Bj zR7cGB%rHVzZt$Rv_^ea>CWk;V=iQNKU9XFt${unVx~D4}@4QZk3jCl}8gJz^cOvd? z>(|nr6poINXi{L0s2mX#HTEgsqqc`^8YWdSe5O2GQ~?E_$&SC?)}-lvDZFRL2K&2_ zO`j4{c178qO?t~y7>~%@6qu7c;iY)u)__X$@U0>n_9r)P$n1%%it(gGn<2ip@&!WM zekc~_56#LKg=LL@F>M|j{ik@5@3vQPd02$&y_}F1m&z|Icga+K5f<NmH)}`7HpI@y4ihj+5BfVPIzQDf^1+!x_2Hj!FaE7pQaRF>v|@n!t3OG(y=S9+ zuA6tiyG&Md`}&gHhI5|93H(dDla8Iz=~piFo=dXt(wDPW^fcyjl6;@2|AmJra8-() zJni&yXzdzLRLt>y`LyAzx8KtC!e(oclXD(>bCOSVYzi(beLoU&sGK}%q$lZZKEL2M zTu>_dV|c9e@$C_=b9?DnOanJFQ;+-pw55)&!1)T5fwP`3OIZi~x<$%j{UWzqv)|HQ zz5ef@w(wEAC*PLX-q}McOS7t{f9N>+%uWw{otW+MHLaRzVNIOxhzoZduG=2xSo34h zx4K|qX_o0iCHXYiiqd^|cspIrd#%QQ1AXbGhAwW(X4s$7iFHwlzfpPWzLk;CR2pOF;_dY zV^$Oyc4jgw!o|POUC**#Sj!CD2|{6f|3YI)lz9HFcgI- zilZojq9io{LlKOT#V{0ND2|~7hLRXckwhS)6oV*)C=O8qq9jBq<_ON{$8Z$lD2}59 zj*>V^$$=1zp%{Te0>ufGAW)J(DUA>krI0WZg(QlTC_$nmi2{bY)HsMS7|z%d#|Z)_NSp$vaHx?~H&saG zh^_T`98ZG~GA{cT*!u6FPU;sG$5(f3W28l>mw@q20On1w#lo%p2LBkq%qDcL;Y~_) z@Sp!veWqNHTKnjTgiT*V!OQvxdv>&>;M(;v-)Ry@Tvn`vl zO`Dd5dW!6a>B(w;&Ki_^E_Kp`WAg_-z{E9QS?M?5tIxBtDmIrEXwmq2)SmCrS?J7? z6SN(eE`F`w^z4%BAIXPAtUI!}UR?0L<39Dp&-9|A09Wx$DXm4Q*|%cFaNwcGI&a?5 z#ec|}7&b|^q& zt|b|&o4(McX!$f!L)GeXe0a^v5kzFr){Ze5vtDk-a3QQ^(o4Hx5A@qWE3`K1Xe zyRCAfJ{pTvE`%Ew6#a4i9Di2SKimt%#^FBa(iDF?NBUv4rp2a{_1xB~lP=hM zubYIbrw`Xvq$Dgwv#f|%W^ritz3Jf75z0#aH?EZ5hsOBN6bl zXOPEM)bsh4I&1FtYE`eSVdlcsjKHg|4l?-(Z0}4b3@@|_-$~n_YdZDd(LI4Fr~UP^ zgMG~2acP4E_J@47|1JgXOE1_2pW0fs)l@G^sS~iVbeMhX4j17r;^Uy zX^9e}8qY6!t?i(9WVS~t1{*&JIct46Lp{ae?$NFr9k{NFSZ%1wlzu+nhlBQC^{frU zj9Z?oSH$u4(DYr)_dbfV|5on7Nk7LbB{onXwV}UPJ^>#n^UFV|n9wo*rA}{K`(tjI zx!U>=cE1|#l|@ZDln~$iolr1VmC>}kH#sujvX);?XQ#}ntLEp&@%Qr7jY?)~a*jDH zbFYu84r#f5%1fpVk0e>8ypUA>GPaPB8!S6mAul~2O#c|nu_?}5WOZMH#vft!b;WaK z?xWA#K7Gl%>nnq-ar>p^4VpiJX>XQhiPdF^@QOmKnDC1~CsZR)RzDrB z4;wpbtpCO@jI;~x3)~$g!KSXOu28Ssr*&aQ{@P!)?55XRvN&(~7szs2%U`KJYXA7O z;sNLBs0&vb6E%yB|N<~n8=^!niSoebu!I1lVh~c>*Zd_*7xNW z(U<0VN0aLlu+YpibvAXCyLL^=O9Vu=iM8R=Kx4GWOoS=Ur?G?a0_< zMy~j+2g0pxqff`nz0B2b1@(+SR2ns~j0!emA2nm^m-!x*c&~RPE#k!IiHyt(y^T5P z4z|5PdT-;)3Mz`DZNodxOPSHO%sF1>(~@JCC%eO)78;U%tvkDX3TPdr+tZG^mX8Js zO0jV6GDU%sRQOD7L&bTC&$~8zoR~j8KX3S5#?PZ<*jeILNeR;~quDOM{pI}TUIwx) zReSHf*BSSzxwn#-!*A^V%*eyoyD+8A%xd;;^{w?^ZG*iVUkJ;=P0itY>AOpH9@5@v za~vh*ET?a-f8%!1h(~vB-yAsx{dTY(l@B?cQWdy|iX5naa~-8qxoZc6x^vH!UC7Pu%K4acQ#eSp;+LHfO}NMV8$v89UXa zZnaiwn{W4AT@k-t7QoZX?sdd*=oK8V;t?)%s;<2%81tlg{;%5&=1diV%+hDt9^c=& zJ5FV-$htl5K(YQ>@AO!zkL5+~86%oq_BpksAl9`Kr-+Xmy?4S^q({CgxXStM>tC`N zEU{IS620r_++C`pw6$p}vpG&5`kw^H)W%wSUXP<=n?|K%%hJWk714aJJHyqrmrXdP zx!k|*&3p=_WBIR}#&9NZI>yKdB>Bp!Sg~I}G~jkaY5zZ8akERenAt+EkDeUTZnU1j z?(fW)=(pKQk<{@kjtxOVePb?k%w~4x>F{L}h|p{h=Te){#GHI%&g1bjEJ?U|s((+KYi8?j z+rlHuWv15K-kuuHQqDEB$rI?9$SG{*6F8po#QBGPnWg_DbN#$Y8>5o3-iKn*{JwOH zin)Ob-Z#5jO?V>Nhgjb{9a@!j_)yJv*s1D4txvk1(_5dss)Nwj(zQtwM zjtP@_E^Y5@zd4xOdkh#z_`LQQyg5AMLAJaPODBUIRZA0t#my{+4oU1Q>%o*XR!8g% z!oBjLWvkb&)|+Tb&yB snLofJes_VH&GGJ{Q1Gj}OAn2Imn~T;?LM5}d3}z*zxR@XHwxtb53=&dy8r+H literal 3298 zcmeH@`6CmG1HdPbR(h2q_mTT1ggL7B7#1eCmHVE#6QYsKWQ4D4ZW=S!=G;i6mn+AR z`{sGM<~Bzy)xO{Uj_>>Y`1$V*vmz0F-`-U*+Ym zz+`@BJ^y9?<=+GUX9s{x02@#k((w8N3dpVC)Zc*XetBKevqG$?XpJX}3xY;FBf~0!`1{e#1~PpaQkhB+ecM6BnQB1Uei$3GHx4ia2)DP{ml?ilrE;H6Yl-!@i;r-Kk@Awp;b&?0~?45BA z0S0M{g*e1i&c=Suzv!M2{e#cVQoIpgjQA~WL%@2Ttq=F|MGikU3918Jj{1t55r(Z- zMB=OkBzOcf>jd z{b0M_+sQRT-Z>D4@Y}HTD6_37@S{tOXZrd~%iQ;`;n^rMjmKLRAx9D_jlvOI>%}ac z@{dZB*bilm5=wf#%eOI*4ID;oQ?N+$&jJF$SH4XSfpTv1^~rlH_qj4&6E^dw+;acJ z*Wp-Z^rS=6V2@vB>v%pQf@5QwA4mBKT21c~lv%5;ve+n&Bc3S~5-5o?WeF;M5dS7B zf=z-r9K^Tfh+Z1!k4&>qG-Y}(IQH^9EDqBtsuAQ0K!SZjQNxNRy~ zKP%P0^8v{<=rJh#82iy4)-)hiOKh;f%0$yf_U6~asN_pA0%Q7yjExCPLulS`2Ib1a z*nstL&3NN!#i^H$tf|I?DC;n#H#SDuZ8D%4s%3~+L25<0y#Eogm_3rZ-yOltOpRO) zV=jfR#Iky8HhEpL0Il2+i4Am2MlGGKNhrHK`5Zm*qtWh1=pC)OWWBVb4I*aWY0XBc zgt3gNe53m`#w6(5xDaaoV74?SZGOiVcU31e|GY#Q)q;y?Yt^E6O4ns;j~;=W+wGst z?H{pu9PP8z>D!?bQ>*r~NGcs~C%Nza9oOfpT|fRgmxuf{J^5bDnP}^m)dESAYkE(< z=~d#tb0`A6h%-1YbiIMEzw2O2ZZ-3yUhZ%G!0n_Lizp!g z#qRb=sNAz7D=`wxwgE*6f#k5@Jiz=N0P9WT%DGR+E@>Gb}CH1IZ7z`|2<5pC) zGtn`CdkoPyg{}=4p3QNYzd6oTP^9&F8~i7kA|Xz?|hD&J63v z1AzJ#1Ewb2y6x43$2dmIyi3{rrBL3;hyYhm=6E4t%?UK8!K}X$bPK**D7|^oW1&Gh zF0_!Bnkr*6L*)+@o%G=DU>*|SCG@A?@l)iRG*i=Pt5UfX-|9LB)%p=n5ly4;jp+QC zRfL9-Xqk7#Am)unyj8(^vyDz+l`;0NiqWJR&HTzKa*OZCP@sR9uAMU5lP47CK$=qI zj9T@$FW!6U4@}BK-TP`p+#WUPPwnQly0Q8!XO*yu8p2AAjcv_vkYnqDg92?js)?fP z-|x7bDXoo}@P35U<6b&zY7M264wOe1I?k_-1b@3B>v4M7g{h_Nd7%6%yx!l9&H{Tk z%eIR2)o>SNgP9KX2!<+N(O z+MqsulFKV-(oD}-Uc=2!wNn|$hn;t3-9$zsG*D?R9C78@8H&`BO`O6Y_WLZbZY&Gj zhCs*h!M%VGtg5epipf~FD|>TRLqL;yp$-%6%Nrar)#0O-H46sy9AmTzYu_1dgkA4Y z%WwL&n>?qT@uK8he{&nAu-tM15B?H!xLe(o{?vd>ub`K^DZl&e*VMttQJ0P)B6hZ~m^F_TDl4dp;lKHjj zX$%-yzL1gMl+z1l^xTce|6I+CAoMXWK1Qb?^`)P4x{9PtQ=>bek|Yq?en}^5bas~i z?*8DzWqQVYWTp_?6G*hNWMHRtI~ZwMB2VgEh;kdyevs ze$~b2z*q5*Gon@&4HX};aNQ}`(N1JPh%0Pq@2aYT&HaOC@70G>bv_XzpB^xHL8(-i z-M?g)4=|GvM3Lu_jT4E^Yd2`UjJ4oiPx#9=nacH#fv4v2vE60C>*deWzUin5}Si%Vt-- zn@K;&s{dY~;rd0AqR`eXEn}Xdjihyrw(sYDUyS?g;TXyV3RrFck>^KX70)C_v7^@10sku&z< zCR|p6H(m<(JlrN;4#qE=7q0}Ado>Y%YfBo>jk;YWNwPtKwz%fIUg-4e&rhNL*peT= xkpPynNV7_Sz!QSHQ1?Ny|6paI{AiT5v$-6)ik?tshqljCsW 4 heavy trace debugging -> 64 configuration file processing -> 65535 enable all debugging +!block table; colaligns="RL"; align=Center; \ + title="Table 10.1: Debugging Levels" +Level Description +4 heavy trace debugging +64 configuration file processing +65535 enable all debugging +!endblock Debugging levels are additive. That is, if you want heavy trace debugging and want to watch the config file being @@ -223,9 +227,13 @@ files located in the database {{EX:directory}} specified in suffix depending on the underlying database package used. The current possibilities are -* {{EX: dbb}} Berkeley DB B-tree backend -* {{EX: dbh}} Berkeley DB hash backend -* {{EX: gdbm}} GNU DBM backend +!block table; align=Center; \ + title="Table 10.2: Database File Suffixes" +Suffix Database +{{EX:dbb}} Berkeley DB B-tree backend +{{EX:dbh}} Berkeley DB hash backend +{{EX:gdbm}} GNU DBM backend +!endblock In general, you should copy all files found in the database {{EX: directory}} unless you know it not used by {{slapd}}(8). @@ -353,7 +361,7 @@ the X.500 DSA: !import "replication.gif"; align="center"; \ title="Replication from slapd to an X.500 DSA" -FT: Figure 6: Replication from slapd to an X.500 DSA +FT: Figure 10.1: Replication from slapd to an X.500 DSA Note that the X.500 DSA must be a read-only copy. Since the replication is one-way, updates from {{TERM:DAP}} clients @@ -371,7 +379,7 @@ DSA may expect these attributes to be named A solution to this attribute naming problem is to have the ldapd read oidtables that map {{EX:modifiersName}} to the -objectID (OID) for the {{EX:lastModifiedBy}} attribute and +Object Identifier ({{TERM:OID}}) for the {{EX:lastModifiedBy}} attribute and {{EX:modifyTimeStamp}} to the OID for the {{EX:lastModifiedTime}} attribute. Since attribute names are carried as OIDs over DAP, this should perform the appropriate translation of diff --git a/doc/guide/admin/runningslapd.sdf b/doc/guide/admin/runningslapd.sdf index 8bce94ba93..c3da2cd713 100644 --- a/doc/guide/admin/runningslapd.sdf +++ b/doc/guide/admin/runningslapd.sdf @@ -19,6 +19,45 @@ in manual page. This section details a few commonly used options. This option specifies an alternate configuration file for slapd. The default is normally {{F:/usr/local/etc/openldap/slapd.conf}}. +> -h + +This option specifies alternative listener configuration. The +default is {{EX:ldap:///}} which implies LDAP over TCP, on all +interfaces, on the default LDAP port 389. You can specify +specific host-port pairs or other protocol schemes (such as +ldaps:// or ldapi://). For example, +{{EX:-h "ldaps:// ldap://127.0.0.1:666"}} will create +two listeners: one for LDAP over SSL, on all interfaces, on +the default LDAP/SSL port 646 and one for LDAP over TCL, only +the {{EX:localhost}} ({{loopback}}) interface, on port 666. +Hosts may be specified using IPv4 dot-decimal form or +using host names. Ports values must be numeric. + +> -n + +This option specifies the service name used for logging and +other purposes. The default service name is {{EX:slapd}}. + +> -l + +This option specifies the local user for the {{syslog}}(8) +facility. Values can be {{EX:LOCAL0}}, {{EX:LOCAL1}}, {{EX:LOCAL2}}, ..., +and {{EX:LOCAL7}}. The default is {{EX:LOCAL4}}. This option +may not be supported on all systems. + +> -u user -g group + +These options specify the user and group, respectively, to run +as. {{EX:user}} can be either a user name or uid. {{EX:group}} +can be either a group name or gid. + +> -r directory + +This option specifies a run-time directory. slapd will +{{chroot}}(2) to this directory after opening listeners but +before any reading any configuration file or initializing +any backend. +. > -d | ? diff --git a/doc/guide/admin/slapdconfig.sdf b/doc/guide/admin/slapdconfig.sdf index 5895203392..2122065ccf 100644 --- a/doc/guide/admin/slapdconfig.sdf +++ b/doc/guide/admin/slapdconfig.sdf @@ -5,9 +5,10 @@ H1: The slapd Configuration File Once the software has been built and installed, you are ready -to configure it for use at your site. The slapd runtime configuration -is primarily accomplished through the {{I:slapd.conf}}(5) file, -normally installed in the {{EX:/usr/local/etc/openldap}} directory. +to configure {{slapd}}(8) for use at your site. The slapd +runtime configuration is primarily accomplished through the +{{I:slapd.conf}}(5) file, normally installed in the +{{EX:/usr/local/etc/openldap}} directory. An alternate configuration file can be specified via a command-line option to {{slapd}}(8) or {{slurpd}}(8). This chapter @@ -103,7 +104,6 @@ This directive defines an attribute type. Please see the {{SECT:Schema Specification}} chapter for information regarding how to use this directive. - H4: defaultaccess { none | compare | search | read | write } This directive specifies the default access to grant requesters @@ -121,6 +121,13 @@ directive. E: defaultaccess read +H4: idletimeout + +Specify the number of seconds to wait before forcibly closing +an idle client connections. A idletimeout of 0, the default, +disables this feature. + + H4: include This directive specifies that slapd should read additional @@ -133,7 +140,6 @@ Note: You should be careful when using this directive - there is no small limit on the number of nested include directives, and no loop detection is done. - H4: loglevel This directive specifies the level at which debugging statements @@ -373,6 +379,17 @@ SASL-based Example: See the {{SECT:Replication}} chapter for more information on how to use this directive. +H4: updateref + +This directive is only applicable in a slave slapd. It +specifies the URL to return to clients which submit update +requests upon the replica. +If specified multiple times, each {{TERM:URL}} is provided. + +\Example: + +> update ldap://master.example.net + H3: LDBM Backend-Specific Directives @@ -404,6 +421,20 @@ modifies or when building indexes. > dbcachesize 100000 +H4: dbnolocking + +This option, if present, disables database locking. +Enabling this option may improve performance at the expense +of data security. + + +H4: dbnosync + +This option causes on-disk database contents not be immediately +synchronized with in memory changes upon change. Enabling this option +may improve performance at the expense of data security. + + H4: directory This directive specifies the directory where the LDBM files @@ -444,88 +475,19 @@ created database index files should have. -H3: Shell Backend-Specific Directives - -> bind -> unbind -> search -> compare -> modify -> modrdn -> add -> delete -> abandon - -These directives specify the pathname of the command to -execute in response to the given LDAP operation. The -command given should understand and follow the input/output -conventions described in Appendix B. - -\Example: - -> search /usr/local/bin/search.sh - -Note that you need only supply those commands you want the -backend to handle. Operations for which a command is not -supplied will be refused with an "unwilling to perform" error. - - - -H3: Password Backend-Specific Directives - -Directives in this category only apply to the PASSWD backend -database. That is, they must follow a "database passwd" line -and come before any other "database" line. - -H4: file - -This directive specifies an alternate passwd file to use. - -\Default: - -> file /etc/passwd - - +H3: Other Backend and Databases -H3: TCL Backend-Specific Directives +{{slapd}}(8) supports a number of other backend database types. -H4: scriptpath - -This is the full path to a file containing the TCL command(s) to handle -the LDAP operations. - -H4: Proc specifiers - -> bind -> unbind -> search -> compare -> modify -> modrdn -> add -> delete -> abandon - -These directives specify the name of the proc (function) in the -TCL script specified in {{EX:scriptpath}} to execute in response to -the given LDAP operation. - -\Example: - -> search proc_search - -Note that you need only supply those commands you want the -TCL backend to handle. Operations for which a command is not -supplied will be refused with an "unwilling to perform" error. - -H4: tclrealm +!block table; align=Center; \ + title="Table 5.2: Backend Database Types" +Types Description +passwd Provides read-only access to {{F:/etc/passwd}} +shell Shell (extern program) backend +sql SQL Programmable backend +!endblock -This is one of the biggest pluses of using the TCL backend. -The realm let's you group several databases to the same interpretor. -This basically means they share the same global variables and proc -space. So global variables, as well as all the procs are callable -between databases. If no {{EX:tclrealm}} is specified, it is put into the -"default" realm. +See {{slapd.conf}}(5) for details. @@ -615,7 +577,7 @@ access. Note that access is granted to "entities" not "entries." The follow table summaries entity specifiers: !block table; align=Center; \ - title="Table 5.2: Access Entity Specifiers" + title="Table 5.3: Access Entity Specifiers" Specifier Entities * All, including anonymous and authenticated users anonymous Anonymous (non-authenticated) users @@ -658,7 +620,7 @@ The kind of granted can be one of the following: !block table; colaligns="LRL"; align=Center; \ - title="Table 5.3: Access Levels" + title="Table 5.4: Access Levels" Level Privledges Description none no access auth =x needed to bind -- 2.39.5