When unauthenticated binds are allowed, the bind attempt goes through as an anonymous bind
(assuming anonymous access is allowed).
The nsslapd-allow-unauthenticated-binds attribute sets whether to allow an unauthenticated
bind to succeed as an anonymous bind. By default, unauthenticated binds are disabled.
Parameter
Entry DN
Valid Values
Default Value
Syntax
Example
2.3.1.19. nsslapd-attribute-name-exceptions
This attribute allows non-standard characters in attribute names to be used for backwards
compatibility with older servers, such as "_" in schema-defined attributes.
Parameter
Entry DN
Valid Values
Default Value
Syntax
Example
2.3.1.20. nsslapd-auditlog (Audit Log)
This attribute sets the path and filename of the log used to record changes made to each database.
Parameter
Entry DN
Valid Values
Default Value
Syntax
Example
For audit logging to be enabled, this attribute must have a valid path and parameter, and the
nsslapd-auditlog-logging-enabled configuration attribute must be switched to on. The table
lists the four possible combinations of values for these two configuration attributes and their outcome
in terms of disabling or enabling of audit logging.
Attributes in dse.ldif
nsslapd-auditlog-logging-
enabled
nsslapd-auditlog
Description
cn=config
on | off
off
DirectoryString
nsslapd-allow-unauthenticated-binds: on
Description
cn=config
on | off
off
DirectoryString
nsslapd-attribute-name-exceptions: on
Description
cn=config
Any valid filename
/var/log/dirsrv/slapd-instance_name/audit
DirectoryString
nsslapd-auditlog: /var/log/dirsrv/
slapd-instance_name/audit
Value
on
empty string
Logging enabled or disabled
Disabled
cn=config
19
Need help?
Do you have a question about the DIRECTORY SERVER 8.1 and is the answer not in the manual?
Questions and answers