Novell GROUPWISE 8 - ADMINISTRATION Administration Manual page 517

Hide thumbs Also See for GROUPWISE 8 - ADMINISTRATION:
Table of Contents

Advertisement

For more information about LDAP usernames, see
GroupWise with Passwords Stored in an LDAP Directory," on page
6 If you want to prevent GroupWise users from changing their LDAP passwords by using the
Password dialog box in the GroupWise client, select Disable LDAP Password Changing.
This option is deselected by default, so that if users change their passwords in the GroupWise
client through the Security Options dialog box (GroupWise Windows client > Tools > Options
> Security) or on the Passwords page (GroupWise WebAccess client > Options > Password),
their LDAP passwords are changed to match the new passwords provided in the GroupWise
client.
7 If the LDAP server is configured for bind connections, as described in
Server Configuration Information" on page
should maintain an inactive connection to the LDAP server.
The default is 30 seconds.
8 If you have only one LDAP server, click OK to save the security settings for the post office.
You have provided all the necessary information to provide LDAP authentication for users in
the post office.
or
If you have multiple LDAP servers and want to configure them into an LDAP server pool, click
Apply, then continue with
or
If you have multiple LDAP servers and want to configure them for failover, click OK to save
the security settings for the post office, then continue with
(Non-SSL Only)" on page
Corresponding Startup Switches You can also use the /ldapuser, /ldappwd, /ldapdisablepwdchg,
and
/ldaptimeout
startup switches in the POA startup file to configure POA access to the LDAP
server. On NetWare, you can use the
e-mail addresses instead of by their distinguished names.
POA Web Console You can see if LDAP is enabled on the
Settings heading, click LDAP Authentication to view LDAP settings and change some of them for
the current POA session.
Configuring a Pool of LDAP Servers
You can configure the POA to contact a different LDAP server each time it needs to access the
LDAP directory. This provides load balancing and fault tolerance because each LDAP server in the
pool is contacted equally often by the POA. The LDAP server pool can include as many as five
servers.
1 Make sure you have enabled LDAP Authentication as described in
Authentication for a Post Office" on page
2 In the LDAP Pool Server Reset Timeout field, specify the number of minutes the POA should
wait before trying to contact an LDAP server in the pool that failed to respond to the previous
contact.
The default is 5 minutes.
3 Click Select Servers to define the specific pool of LDAP servers that you want to be available
to users in this post office for LDAP authentication.
514, specify the number of seconds the POA
"Configuring a Pool of LDAP Servers" on page
518.
/noldapx
startup switch to have the POA look up users by their
516.
Section 76.3, "Authenticating to
1169.
"Providing LDAP
517.
"Specifying Failover LDAP Servers
Configuration
page. Under the General
"Enabling LDAP
Configuring the POA 517

Advertisement

Table of Contents
loading

Table of Contents