Summary of Contents for Novell EDIRECTORY 8.8 - ADMINISTRATION
Page 1
Novell eDirectory 8.8 Administration Guide Novell eDirectory w w w . n o v e l l . c o m 8 . 8 A D M I N I S T R A T I O N G U I D E...
Page 2
Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes.
Page 3
Novell is a registered trademark of Novell, Inc., in the United States and other countries. Novell Client is a trademark of Novell, Inc. Novell Directory Services and NDS are registered trademarks of Novell, Inc., in the United States and other countries.
Page 8
Viewing Entries for Synchronization or Purging ......201 7.4.17 Viewing Novell Nsure Identity Manager Details ......201 7.4.18 Viewing the Synchronization Status of a Replica .
Page 9
Performing a Repair in Novell iMonitor ........
Page 10
Construction Used within Policy Sections ....... . 303 Novell eDirectory 8.8 Administration Guide...
Page 11
Syntax Differences ..........319 12.2.5 Supported Novell LDAP Controls and Extensions ......320 12.3 Using LDAP Tools on Linux, Solaris, AIX, or HP-UX.
Page 12
Using Novell iManager for Backup and Restore........
Page 13
16.2.3 Tuning the Solaris OS for Novell eDirectory ......502 16.3 Improving Bulkload Performance.
Page 14
Novell Service Location Providers ........
Page 15
Managing the SASL-GSSAPI Method ......... . 568 E.3.1 Extending the Kerberos Schema.
Chapter 18, “The eDirectory Management Toolbox,” on page 531 • Appendix A, “NMAS Considerations,” on page 543 • Appendix B, “Novell eDirectory Linux and UNIX Commands and Usage,” on page 549 • Appendix C, “Configuring OpenSLP for eDirectory,” on page 557 •...
Page 18
® A trademark symbol ( , etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party trademark. When a single pathname can be written with a backslash for some platforms or a forward slash for other platforms, the pathname is presented with a backslash.
Novell eDirectory is a highly scalable, high-performing, secure directory service. It can store and manage millions of objects, such as users, applications, network devices, and data. Novell eDirectory offers a secure identity management solution that runs across multiple platforms, is internet-scalable, and extensible.
Novell iManager lets you manage the directory and users, and access rights and network resources within the directory, from a Web browser and a variety of handheld devices. The eDirectory plug-ins...
Page 21
This allows you to grant rights with very few rights assignments. For example, suppose you want to grant management rights to the objects shown in Figure 1-4 on page Sample eDirectory Objects Figure 1-4 Understanding Novell eDirectory...
• Filtered Replica Configuration Wizard • SNMP • WAN Traffic Manager For more information on installing, configuring, and running iManager, see the Novell iManager 2.5 Administration Guide (http://www.novell.com/documentation/imanager25/index.html). 1.1.3 Single Login and Authentication With eDirectory, users log in to a global directory, so you don’t need to manage multiple server or domain accounts for each user, and you don’t need to manage trust relationships or pass-through...
Page 24
“Country” on page License Container (LC) Created automatically when you install a license certificate or create a metering certificate using Novell Licensing Services (NLS) technology. When an NLS-enabled application is installed, it adds a License Container container object to the tree and a License Certificate leaf object to that container.
The Tree container, formerly [Root], is created when you first install eDirectory on a server in your network. As the top-most container, it usually holds Organization objects, Country objects, or Alias objects. What Tree Represents Tree represents the top of your tree. Understanding Novell eDirectory...
Page 26
Typically, the Name property is the same as your company’s name. Of course, you can shorten it for simplicity. For instance, if the name of your company is Your Shoe Company, you might use YourCo. The Organization name becomes part of the context for all objects created under it. Novell eDirectory 8.8 Administration Guide...
Page 27
The Organizational Unit name becomes part of the context for all objects created under it. • Login Script The Login Script property contains commands that are executed by any User objects directly under the Organizational Unit. These commands are run when a user logs in. Understanding Novell eDirectory...
Page 28
Usually, the topmost Domain is the overall Tree, with subdomains under Tree. For example, machine1.novell.com could be represented by DC=machine1.DC=novell.DC=com in a tree representation. Domains give you a more generic way to set up an eDirectory tree. If all containers and subcontainers are DC objects, users do not need to remember C, O, or OUs when searching for objects.
By default, the name of the Volume object is the server’s name with an underscore and the physical volume’s name appended (for example, YOSERVER_SYS). Volume objects are supported only on NetWare. Linux and UNIX file system partitions cannot be managed using Volume objects. Understanding Novell eDirectory...
Page 30
You can use the following methods to create or import User objects: • iManager For more information on iManager, see the Novell iManager 2.5 Administration Guide (http:// www.novell.com/documentation/imanager25/index.html). • Batches from database files For more information on using batch files, see Section 2.2, “Designing the eDirectory Tree,”...
Page 31
However, you might want to keep login names unique across the company to simplify administration. Typically, login names are a combination of first and last names, such as STEVEJ or SJONES for Steve Jones. Understanding Novell eDirectory...
Page 32
RFC 2255 (http://www.cis.ohio-state.edu/cgi-bin/rfc/rfc2255.html). Dynamic groups let you specify the criteria to be used for evaluating membership in a group. The actual members of the group are dynamically evaluated by eDirectory, which lets you define the Novell eDirectory 8.8 Administration Guide...
Page 33
NOTE: To address exceptions to the listing created by the memberQueryURL, dynamic groups also allow for explicit inclusion and exclusion of users. Dynamic groups can be created and managed through Novell iManager. You can access the Dynamic Group management tasks by clicking the Dynamic Groups role on the Roles and Tasks page.
Page 34
DN is a static member alone and can also find which groups have dynamic members and no static members. To add this property to the existing dynamic groups, extend the schema using dgstatic.sch. Novell eDirectory 8.8 Administration Guide...
Page 35
In both eDirectory 8.6.1 and eDirectory 8.7.x, binary syntaxes like SYN_OCTET_STRING and SYN_NET_ADDRESS are not supported in the memberQueryURL search filters. For more information, see How to Manage and Use Dynamic Groups in Novell eDirectory (http:// developer.novell.com/research/appnotes/2002/april/05/a020405.htm). Understanding Novell eDirectory...
Page 36
You can create an Alias object in the South container, as shown in Figure 1-6. Alias Object in eDirectory Container Figure 1-6 The Alias object points to the original ColorQ object, so setting up printing for the users involves a local object. Novell eDirectory 8.8 Administration Guide...
Page 37
• Name Identifies the object in the directory (for example, Shared) and is used in MAP commands. • Volume Contains the name of the Volume object that the Directory Map object references, such as Sys.North.YourCo. • Path Understanding Novell eDirectory...
The context of an object is its position in the tree. It is nearly equivalent to a DNS domain. You can see in the following figure that User Bob is in Organizational Unit Accounts, which is in Organizational Unit Finance, which is in Organization YourCo. Sample eDirectory Container Figure 1-8 Novell eDirectory 8.8 Administration Guide...
Bob’s workstation and need to supply a name context, as shown in Figure 1-9 on page Novell Client NDS Page Figure 1-9 The context is specified as a list of containers separated by periods, between the object in question and the top of the Tree.
Suppose a workstation’s current context is set to Finance. (See Figure 1-10.) Sample eDirectory Container Figure 1-10 The relative object name of Bob is Bob.Accounts eDirectory interprets the name as “Bob, which is in Accounts, resolved from the current context, which is Finance.” Novell eDirectory 8.8 Administration Guide...
You might want to create a new attribute called Shoe Size and then add it to the User class. For more information, see Chapter 4, “Managing the Schema,” on page 117. Understanding Novell eDirectory...
1.4.1 Schema Management The Schema role in Novell iManager lets users who have the Supervisor rights to a tree customize the schema of that tree. The Schema role, and its associated tasks, is available on the Roles and Task page in iManager.
Page 43
• Distinguished Name Used by attributes whose values are the names of objects in the eDirectory tree. Distinguished Names (DN) are not case sensitive, even if one of the naming attributes is case sensitive. • E-mail Address Understanding Novell eDirectory...
Page 44
Attributes that represent a file system path contain all the information to locate a file on a server. Two paths match when they are of the same length and their corresponding characters, including case, are identical. Novell eDirectory 8.8 Administration Guide...
Page 45
Login scripts and other stream attributes use this syntax. The data stored in a stream file has no syntax enforcement of any kind. It is completely arbitrary data, defined by the application that created and uses it. • Telephone Number Understanding Novell eDirectory...
This figure shows information on the Organization class. Most of the information displayed on this screen was specified when the class was created. Some of the optional attributes were added later. Novell eDirectory 8.8 Administration Guide...
Each directory partition consists of a set of container objects, all the objects contained in them, and data about those objects. eDirectory partitions don’t include any information about the file system or the directories and files contained there. Understanding Novell eDirectory...
Partitioning is done with Novell iManager. Partitions are identified in iManager by the following partition icon ( ). Replica View for a Server Figure 1-13 In the above example, the partition icon is next to the Tree object. This means it is the top-most container in the partition.
• If replicas are distributed between sites, users can access the directory locally. However, server- to-server synchronization of replicas happens over the WAN link, so there can be eDirectory errors if the link is unreliable. Any changes to the directory are slow to propagate across the WAN link. Understanding Novell eDirectory...
A replica is a copy or an instance of a user-defined partition that is distributed to an eDirectory server. If you have more than one eDirectory server on your network, you can keep multiple replicas Novell eDirectory 8.8 Administration Guide...
Page 51
You can get fault tolerance for file systems by using the Transaction Tracking System (TTS ), disk mirroring/duplexing, RAID, or Novell Replication Services (NRS). A master or read/write replica is required on NetWare servers that provide bindery services.
The original master replica automatically becomes read/write. A master replica must be available on the network for eDirectory to perform operations such as creating a new replica or creating a new partition. Novell eDirectory 8.8 Administration Guide...
Page 53
Users can read but not modify the contents of the replica. The contents are limited to the types of eDirectory objects and properties specific in the host server's replication filter. For more information, see “Filtered Replicas” on page Understanding Novell eDirectory...
• Reduce synchronization traffic to the server by reducing the amount of data that must be replicated from other servers. • Reduce the number of events that must be filtered by Novell Nsure Identity Manager. For more information on Novell Nsure Identity Manager, see the...
Normal Synchronization or Replica Synchronization • Priority Sync 1.9 Access to Resources eDirectory provides a basic level of network access security through default rights. You can provide additional access control by completing the tasks outlined below. • Assigning rights Understanding Novell eDirectory...
Installing RBS (http://www.novell.com/documentation/imanager25/imanager_admin_25/ data/am757mw.html#bu1rlq9) in the Novell iManager 2.5 Administration Guide for instruction on setting up Role-Based Services. You can also define roles in terms of the specific tasks that administrators can perform in role- based administration applications. See Section 3.3, “Configuring Role-Based Services,”...
• Compare lets the trustee compare the value of a property to a given value. This right allows searching and returns only a true or false result. It does not allow the trustee to actually see the value of the property. Understanding Novell eDirectory...
Page 58
(Create and Delete) with zero rights and adds the new all property rights. e. eDirectory repeats the filtering and adding steps (c and d above) at each level of the tree, including at the target resource. Novell eDirectory 8.8 Administration Guide...
Page 59
The assignment of Write all properties at the top of the tree is filtered out by the IRF at Accounting. • Tree: No rights No rights are assigned for Tree anywhere in the pertinent branch of the tree. • [Public]: Browse object, Read all properties Understanding Novell eDirectory...
Page 60
When you add a User object as an occupant to an Organizational Role object, that User automatically becomes security equivalent to the Organizational Role object. The same is true when a User becomes a member of a Group role object. Novell eDirectory 8.8 Administration Guide...
Read and File Scan rights to sys: \public. This allows User objects under the container to access NetWare utilities in \public. User objects If home directories are automatically created for users, the users have the Supervisor right to those directories. Understanding Novell eDirectory...
To delegate administration: 1 Grant the Supervisor object right to a container. 1a In Novell iManager, click the Roles and Tasks button 1b Click Rights > Modify Trustees. 1c Enter the name and context of the container object that you want to control access to, then click OK.
Page 63
“Blocking Inherited Rights to an eDirectory Object or Property” on page • “Controlling Access to Novell eDirectory by Resource” on page 63 • “Controlling Access to Novell eDirectory by Trustee” on page 63 Controlling Access to Novell eDirectory by Resource 1 In Novell iManager, click the Roles and Tasks button 2 Click Rights >...
Page 64
• For a Group object, use the Members property page. In Novell iManager, click eDirectory Administration > Modify Object, specify the name and context of a Group object, click OK, then click the Members tab. • For an Organizational Role object, use the Role Occupant field on the Role Occupant property page.
Page 65
4 Click OK. Granting Security Equivalence Explicitly 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Administration > Modify Object. 3 Enter the name and context of the user or object that you want the user to be security equivalent to, then click OK.
Page 66
One exception is that the Supervisor right can’t be blocked in the NetWare file system. 1 In Novell iManager, click the Roles and Tasks button 2 Click Rights > Modify Inherited Rights Filter.
Page 67
The additional properties are pertinent only if this object is a container, or if it has been extended to include the properties of an auxiliary class. The additional properties are shown without a bullet next to them. 5 Click Done. Understanding Novell eDirectory...
Section 2.5, “Planning the User Environment,” on page 80 • Section 2.6, “Designing eDirectory for e-Business,” on page 81 • Section 2.7, “Understanding the Novell Certificate Server,” on page 82 • Section 2.8, “Synchronizing Network Time,” on page 86 •...
Searching and browsing the directory rely greatly on the consistency of naming or property values. The use of standard names also makes it easier for Novell Nsure Identity Manager to move data between eDirectory and other applications. For more information on Novell Nsure Identity Manager, see the Novell Nsure Identity Manager Administration Guide (http://www.novell.com/...
Page 71
• Contains only letters A-Z, numbers 0-9, hyphens (-), periods (.), and underscores (_). • Does not use a period as the first character. • Once named, the Server object cannot be renamed in Novell iManager. If you rename it at the server, the new name automatically appears in iManager.
Page 72
Directory Map | Name Contents of the directory DOSAPPS Short, standard names indicated by the Directory make it easy to identify Map. which department the container is servicing. Novell eDirectory 8.8 Administration Guide...
To create the upper layers of the tree, see “Creating an Object” on page 94 “Modifying an Object's Properties” on page Using a Pyramid Design With a pyramid-designed eDirectory, managing, initiating changes to large groups, and creating logical partitions are easier. Designing Your Novell eDirectory Network...
Page 74
For example, an organization consisting of several autonomous organizations might need to create several trees. If your organization needs multiple trees, consider using Novell Nsure Identity Manager to simplify management. For more information on Novell Nsure Identity Manager, see the Novell Nsure Identity Manager Administration Guide (http://www.novell.com/documentation/...
If you are interested, you can easily determine the size of your eDirectory database or the Directory Information Base (DIB) Set. • For NetWare, download toolbox.nlm from the Novell Support Web site (http:// support.novell.com) to see the sys:_netware directory on your server.
• For Windows, look at the DIB Set at \novell\nds\dibfiles. • For Linux, Solaris, AIX, or HP-UX, look at the DIB Set in the directory you specified during installation. Deciding Which Containers to Create In general, create containers for objects that have access needs in common with other eDirectory objects.
2.3.4 Considering Network Variables Consider the following network variables and their limitations when planning your partitions: • The number and speed of servers • The speed of network infrastructure (such as network adapters, hubs, and routers) Designing Your Novell eDirectory Network...
You can have only one master replica. Additional replicas must be read/write, read-only, or filtered. Most replicas should be read/write. They can handle object viewing, object management, and user login, just as the master replica can. They send out information for synchronization when a change is made. Novell eDirectory 8.8 Administration Guide...
This methodology limits errors that could have adverse effects to eDirectory operations and provides for a central backup of the master replicas. The network administrator should perform high-cost activities, such as creating a replica, at times when network traffic is low. Designing Your Novell eDirectory Network...
Consider which applications and data files are needed by users, what operating systems exist, and which groups or users need access to applications. Consider if the shared applications should be manually or automatically launched by applications such as ZENworks. Novell eDirectory 8.8 Administration Guide...
• Create a separate tree for e-Business. Limit the network resources, such as servers and printers, included in the tree. Consider creating a tree that contains only User objects. You can use Novell Nsure Identity Manager to link this user tree to your other trees that contain network information. For more information, see the...
2.7.1 Rights Required to Perform Tasks on Novell Certificate Server To complete the tasks associated with setting up Novell Certificate Server, the administrator needs to have rights as described in the following table. Novell Certificate Server Task Rights Required...
• Supervisor right to the W0 object located in the Security container, inside the KAP object. These rights are assigned to a group or a role, where all the administrative users are defined. For a complete list of required rights to perform specific tasks associated with Novell Certificate Server, refer to the Novell Certificate Server (http://www.novell.com/documentation/beta/crt30/index.html)
Page 84
3 (Conditional) If the NICI package is not installed, install it now. You will not be able to proceed if the NICI package is not installed. 4 Copy the .nfk file provided with the package to the /var/novell/nici directory. Execute the /var/novell/nici/primenici program.
Page 85
Help. Exporting an Organizational CA's Self-Signed Certificate A self-signed certificate can be used for verifying the identity of the Organizational CA and the validity of a certificate signed by the Organizational CA. Designing Your Novell eDirectory Network...
Organizational CA’s self-signed certificate as a trusted root will accept a valid user or server certificate signed by the Organizational CA. 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Administration > Modify Object.
TIMESYNC.NLM Timesync.nlm synchronizes time among NetWare servers. You can use timesync.nlm with an external time source like an Internet NTP server. You can also configure Novell Client workstations to update their clocks to servers running the timesync.nlm. For more information on time synchronization, refer to the Network Time Management Administration Guide (http://www.novell.com/documentation/lg/nw65/time_enu/data/...
NOTE: The following command will help troubleshoot time synchronization issues: set timesync debug=7 Windows 1 Click Start > Settings > Control Panel > Novell eDirectory Services. 2 Click dsrepair.dlm > Start. 3 Click Repair > Time Synchronization. Linux, Solaris, AIX, and HP-UX...
Page 89
IMPORTANT: The user needs to access the LDAP server using the DNS name instead of the IP address of the server. This is because the conversion of the IP address to the DNS name is not secure. Designing Your Novell eDirectory Network...
The eDirectory Object Selector page in Novell iManager also lets you search or browse for objects. In most entry fields in Novell iManager, you can specify an object name and context, or you can click the Object Selector button to search or browse for the object you want.
Page 92
• “Using Browse” on page 92 • “Using Search” on page 92 Using Browse 1 In Novell iManager, click the View Objects button 2 Click Browse. 3 Use the following options to browse for an object: Option Description Lets you move down one level in the tree.
Page 93
You can use an asterisk (*) as a wildcard character in this field. For example, g* finds all objects starting with g, such as Germany or Greg, and *te finds all entries ending in te, such as Kate or Corporate. 5 Select the type of object you want to search for from the Type drop-down list.
3.1.2 Creating an Object 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Administration > Create Object. 3 Select an object from the list of available object classes, then click OK. 4 Specify the information requested, then click OK.
6 Click OK. 3.1.6 Deleting Objects 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Administration > Delete Object. 3 Specify the name and context of the object or objects you want to delete.
• “Disabling a User Account” on page 96 Creating a User Object 1 In Novell iManager, click the Roles and Tasks button 2 Click Users > Create User. 3 Specify a user name and a last name for the user.
Setting Up a User's Network Computing Environment 1 In Novell iManager, click the Roles and Tasks button 2 Click Users > Modify User. 3 Specify the name and context of the User or Users you want to modify, then click OK.
Setting Up Intruder Detection for All Users in a Container 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Administration > Modify Object. 3 Specify the name and context of a container object, then click OK.
The default server is set on the Environment property page of the user object. Creating a Login Script 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Administration > Modify Object. 3 Specify the name and context of the object that you want to create the login script on.
3.3 Configuring Role-Based Services Novell iManager gives administrators the ability to assign specific responsibilities to users and to present the user with only the tools (and their accompanying rights) necessary to perform those sets of responsibilities. This functionality is called Role-Based Services (RBS).
User, Group, or container objects that can perform those tasks. In some cases, Novell iManager plug-ins (product packages) provide predefined RBS roles that you can modify.
Page 103
(for example, the Role-Based Services Collection container). 1 In Novell iManager, click the Configure button 2 Click Role Configuration > Create iManager Role. 3 Follow the instructions in the Create iManager Role Wizard.
To assign role membership and scope: 1 In Novell iManager, click the Configure button 2 Click Role Configuration > Modify iManager Roles. 3 To add or remove members from a role, click the Modify Members button to the left of the role you want to modify.
Deleting a Task 1 In Novell iManager, click the Configure button 2 Click Task Configuration > Delete Task. 3 Specify the name and context of the task you want to delete, then click OK. 3.4 Synchronization Synchronization is the transfer of directory information from one replica to another, so the information in each partition is consistent with the other.
Server 2 and from Server 2 to Server 3. Even if Server 1 could not come into direct contact with Server 3, because of a problem in communication, it still receives the latest change to the data, 106 Novell eDirectory 8.8 Administration Guide...
You can enable or disable normal synchronization by enabling or disabling outbound and inbound synchronization in Novell iMonitor. Both inbound and outbound synchronizations are enabled by default. To sync the modifications to data across the other servers through normal synchronization, you need to configure the synchronization parameters in iMonitor.
Page 108
For outbound synchronization, you need to configure the synchronization threads. Using iMonitor, you can specify the number of synchronization threads using Agent Configuration under Agent Synchronization.The supported values are 1 to 16. “Controlling and Configuring the DS Agent” on page 196 for more information. 108 Novell eDirectory 8.8 Administration Guide...
Synchronization Method Normally, eDirectory automatically chooses the method based on the number of replicas and replication partners. The following are the synchronization methods: • By Partition: The modifications to data are synchronized simultaneously with other replicas.Several threads are used to synchronize the modifications. For example, D1, D2, and D3 are modifications to data on replica R1, and these have to be synchronized across replicas R2 and R3, D1, D2, and D3 are simultaneously synchronized with R2 and R3.
Page 110
D1 is first synchronized with server2 and server3. Then D2 is synchronized with server2 and server3, and later D3 is synchronized with server2 and server3. If an 110 Novell eDirectory 8.8 Administration Guide...
Page 111
You can manage priority sync by creating and defining policies and applying them to partitions through iManager or LDAP. You define a priority sync policy by identifying the attributes that are critical. NOTE: Plug-ins are available only in Novell iManager 2.5 and later. Managing Objects...
Page 112
You can choose to select the mandatory or optional attributes for priority sync. The priority sync policy can be created anywhere in the eDirectory tree using either iManager or LDAP. 112 Novell eDirectory 8.8 Administration Guide...
Page 113
Using iManager: 1 Click the Roles and Tasks button 2 Click Partition and Replicas > Priority Sync Policies. 3 In the Priority Sync Policies Management Wizard, select Create Priority Sync Policy. 4 Follow the instructions in the Create Priority Sync Policy Wizard to create the policy. Help is available throughout the wizard.
Page 114
3 In the Priority Sync Policies Management Wizard, select Delete a Priority Sync Policy. 4 Follow the instructions in the Delete Priority Sync policy Wizard to delete the policy. Help is available throughout the wizard. Using LDAP: dn:cn=policy1,o=policieschangetype:delete 114 Novell eDirectory 8.8 Administration Guide...
Page 115
When Can Priority Sync Fail? Priority sync can fail under any of the following circumstances: • Network failure: Priority sync will not store modifications if it is unable to send them to the remote server in the case of network failure. •...
User class that has Fax Number as a mandatory attribute, then begin using the new User class to create User objects. The Schema Management role in Novell iManager lets those with the Supervisor right to a tree customize the schema of that tree and perform the following tasks: •...
4.1.1 Creating a Class You can add a class to your existing schema as your organizational needs change. 1 In Novell iManager, click the Roles and Tasks button 2 Click Schema > Create Class. 3 Follow the instructions in the Create Class Wizard to define the object class.
You can define your own custom types of attributes and add them as optional attributes to existing object classes. You can’t, however, add mandatory attributes to existing classes. 1 In Novell iManager, click the Roles and Tasks button 2 Click Schema > Create Attribute.
To create an auxiliary class: 1 In Novell iManager, click the Roles and Tasks button 2 Click Schema > Create Class. 3 Specify a class name and (optional) ASN1 ID, then click Next.
6 Click Apply, then click OK. 4.1.9 Deleting Auxiliary Properties from an Object 1 In Novell iManager, click the Roles and Tasks button 2 Click Schema > Object Extensions. 3 Specify the name and context of the object want to extend, then click OK.
Use NDSCons.exe to extend the schema on Windows servers. Schema files (*.sch) that come with eDirectory are installed by default into the C:\Novell\NDS directory. 1 Click Start > Settings > Control Panel > Novell eDirectory Services. 2 Click install.dlm, then click Start.
Using the ndssch Utility to Extend the Schema on Linux, Solaris, AIX, or HP-UX In addition to Novell iManager, you can use ndssch, the eDirectory schema extension utility, to extend the schema on Linux, Solaris, AIX, or HP-UX systems. The attributes and classes that you specify in the schema file (.sch) will be used to modify the schema of the tree.
If this parameter is not specified, the tree name is taken from the /etc/ opt/novell/eDirectory/conf/nds.conf file. Using the ldapmodify Utility Enter one of the following commands: ldapmodify -h -D -w -f /opt/novell/eDirectory/lib/nds-schema/ rfc2307-usergroup.ldif ldapmodify -h -D -w -f /opt/novell/eDirectory/lib/nds-schema/ rfc2307-nis.ldif...
Page 125
flag. If any of these flags is present on a schema definition, LDAP treats the attribute as “operational” and will not return that attribute unless specifically requested to do so. BOTH_MANAGED is a new security rights enforcement mechanism. It is only meaningful on an attribute of Distinguished Name syntax.
“DSSchema eMTool Options” on page 127 for more information on the DSSchema eMTool options. 4 Log out from the eMBox Client by entering the following command: logout 5 Exit the eMBox Client by entering the following command: exit 126 Novell eDirectory 8.8 Administration Guide...
4.5.2 DSSchema eMTool Options The following tables lists the DSSchema eMTool options. You can also use the list -tdsschema command in the eMBox Client to list the DSSchema options with details. See “Listing eMTools and Their Services” on page 535 for more information.
Managing Partitions and Replicas ® Partitions are logical divisions of the Novell eDirectory database that form a distinct unit of data in the eDirectory tree for administrators to store and replicate eDirectory information. Each partition consists of a container object, all objects contained in it, and the information about those objects.
To create a partition: 1 In Novell iManager, click the Roles and Tasks button 2 Click Partition and Replicas > Create Partition. 3 Specify the name and context of the container you want to create a new partition from, then click OK.
To merge a child partition with its parent partition: 1 In Novell iManager, click the Roles and Tasks button 2 Click Partition and Replicas > Merge Partition.
First, fix the synchronization errors. To move a partition: 1 In Novell iManager, click the Roles and Tasks button 2 Click Partition and Replicas > Move Partition. 132 Novell eDirectory 8.8 Administration Guide...
• Faster access to data • Faster access across a WAN link • Access to objects in a set context (using bindery services) To add a replica: 1 In Novell iManager, click the Roles and Tasks button Managing Partitions and Replicas 133...
This merges the replicas of the partition with those of its parent and removes them from the servers they reside on. Merging removes partition boundaries, but not the objects. The objects continue to exist on each server which held a replica of the “joined” partition. 134 Novell eDirectory 8.8 Administration Guide...
To delete a replica: 1 In Novell iManager, click the Roles and Tasks button 2 Click Partition and Replicas > Replica View. 3 Specify the name and context of the partition or server that holds the replica you want to delete, then click OK.
The Filtered Replica Wizard guides you step-by-step through the setup of a server’s replication filter and partition scope. 1 In Novell iManager, click the Roles and Tasks button 2 Click Partition and Replicas > Filtered Replica Wizard. 136 Novell eDirectory 8.8 Administration Guide...
Replicas” on page Viewing Replicas on an eDirectory Server 1 In Novell iManager, click the Roles and Tasks button 2 Click Partition and Replicas > Replica View. 3 Specify the name and context of server you want to view, then click OK to view the list of replicas on this server.
“Using the Server Object” on page 138 Using the Replica View 1 In Novell iManager, click the Roles and Tasks button 2 Click Partition and Replicas > Replica View. 3 Specify the name and context of the partition or server that holds the replica you want to change, then click OK.
5.7.1 Viewing the Partitions on a Server You can use Novell iManager to view which partitions are allocated to a server. You might want to view the partitions stored on a server if you are planning to remove a Server object from the directory tree.
In a state not known to iManager To view information about a replica: 1 In Novell iManager, click the Roles and Tasks button 2 Click Partition and Replicas > Replica View. 3 Enter the name and context of a partition or server, then click OK.
Files” for more information on LDIF file syntax, structure, and debugging. You can run the Novell Import Conversion Export client utility from the command line, from a snap- ® , or from the Import Convert Export Wizard in Novell iManager. The comma- in to ConsoleOne delimited data handler, however, is available only in the command line utility and Novell iManager.
Compare data between an LDIF or schema file and another LDIF file. • Compare data between a server and an LDIF file. • Generate an order file. For information on using and accessing Novell iManager, see the Novell iManager 2.5 Administration Guide (http://www.novell.com/documentation/imanager25/index.html). Importing Data from a File 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance >...
Page 143
Exporting Data to a File 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance > Import Convert Export Wizard. 3 Click Export Data to a File on Disk, then click Next. 4 Specify the LDAP server holding the entries you want to export.
Page 144
NOTE: Ensure that the schema is consistent across LDAP Services. Updating Schema from a File 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance > Import Convert Export Wizard. 3 Click Add Schema from a File > Next.
Page 145
Password attribute of the entry specified in the User DN field 8 Click Next > Finish. Adding Schema from a Server 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance > Import Convert Export Wizard. 3 Click Add Schema from a Server > Next.
Page 146
Password attribute of the entry specified in the User DN field 8 Click Next > Finish. Comparing Schema Files 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance > Import Convert Export Wizard. 3 Click Compare Schema Files > Next.
Page 147
Comparing Schema from Server and File 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance > Import Convert Export Wizard. 3 Click Compare Schema between Server and File > Next. 4 Specify the LDAP server that the schema is to be compared from.
Help for more information on the available options. 7 Click Next, then click Finish. 6.1.2 Using the Command Line Interface You can use the command line version of the Novell Import Conversion Export utility to perform the following: • LDIF imports •...
Page 149
• Load information into eDirectory using a template • Schema imports The Novell Import Convert Export Wizard is installed as part of Novell iManager. Both a Win32* ® version (ice.exe) and a NetWare version (ice.nlm) are included in the installation. On Linux, Solaris, AIX, and HP-UX systems, the Import/Export utility is included in the NOVLice package.
Page 150
For a list of supported LDIF options, see “LDIF Source Handler Options” on page 151. -SLDAP Specifies that the source is an LDAP server. For a list of supported LDAP options, see “LDAP Source Handler Options” on page 152 150 Novell eDirectory 8.8 Administration Guide...
Page 151
For a list of supported options, see “DELIM Destination Handler Options” on page 157. LDIF Source Handler Options The LDIF source handler reads data from an LDIF file, then sends it to the Novell Import Conversion Export engine. Option Description -f LDIF_file Specifies a filename containing LDIF records read by the LDIF source handler and sent to the engine.
Page 152
LDAP Source Handler Options The LDAP source handler reads data from an LDAP server by sending a search request to the server. It then sends the search entries it receives from the search operation to the Novell Import Conversion Export engine.
Page 153
• One: Searches only the immediate children of the base object. • Base: Searches only the base object entry itself. • Sub: Searches the LDAP subtree rooted at and including the base object. If you omit this option, the search scope defaults to Sub. Novell eDirectory Management Utilities 153...
Page 154
Enables the Manage DSA IT control, and makes it critical. LDAP Destination Handler Options The LDAP destination handler receives data from the Novell Import Conversion Export engine and sends it to an LDAP server in the form of update operations to be performed by the server.
Page 155
If a later operation creates the parent, the forward reference is changed into a normal entry. Stores password values using the simple password method of the Novell Modular Authentication Service (NMAS ). Passwords are kept in a secure location in the directory, but key pairs are not generated until they are actually needed for authentication between servers.
Page 156
(' '). The following values are special case delimiters: [q] = quote (a single " as the delimiter) [t] = tab For example, to specify a tab as a delimiter, you would pass -d[t]. 156 Novell eDirectory 8.8 Administration Guide...
Page 157
The SCH handler reads data from a legacy NDS or eDirectory schema file (files with a *.sch extension), then sends it to the Novell Import Conversion Export engine. You can use this handler to implement schema-related operations on an LDAP Server, such as extensions using a *.sch file as input.
Page 158
“%d” is the default format that the program uses if none was specified. The numeric value is incremented after each object, so if you use $C multiple times in the attribute specification, the 158 Novell eDirectory 8.8 Administration Guide...
Page 159
Control Settings provide some additional controls for the object creation. All controls have an exclamation point (!) as the first character on the line to separate them from attribute settings. The controls can be placed anywhere in the file. !COUNTER=300 !OBJECTCOUNT=2 !CYCLE=title !UNICYCLE=first,last !CYCLE=ou,BLOCK=10 • Counter Novell eDirectory Management Utilities 159...
Page 160
Karl Schultzcn cn: Doug Griegercn cn: Karl Grieger Examples Listed below are sample commands that can be used with the Novell Import Conversion Export command line utility for the following functions: • “Performing an LDIF Import” on page 160 •...
Page 161
389 using the identity cn=admin,c=us and the password “password” and outputs the data in comma- delimited format to the /tmp/server1.csv file. Performing a Data Migration between LDAP Servers To perform a data migration between LDAP servers, combine the LDAP source and LDAP destination handlers. For example: Novell eDirectory Management Utilities 161...
Page 162
Performing a Schema Import To perform a schema file import, use a command similar to the following: ice -S SCH -f $HOME/myfile.sch -D LDAP -s myserver -d cn=admin,o=novell -w passwd This command line reads schema data from myfile.sch and sends it to the LDAP server myserver using the identity cn=admin,o=novell and the password “passwd.”...
Page 163
Running the following command from a command prompt sends the data to an LDAP server via the LDAP Handler: ice -S LOAD -f attrs -D LDAP -s www.novell.com -d cn=admin,o=novell -w admin If the previous template file is used, but the following command line is used, all of the records that were added with the above command will be deleted.
Page 164
-S LOAD -f attrs -m -D LDIF -f new.ldf then the results would be the following LDIF data: version: 1 dn: cn=BillTSmith,ou=ds,ou=dev,o=novell changetype: modify delete: givenname add: givenname givenname: test1 replace: givenname givenname: test2 givenname: test3 164 Novell eDirectory 8.8 Administration Guide...
6.1.3 Conversion Rules The Novell Import Conversion Export engine lets you specify a set of rules that describe processing actions to be taken on each record received from the source handler and before the record is sent on to the destination handler.
Page 166
6 Follow the online instructions to finish your selected task. Using the Command Line Interface You can enable conversion rules with the -p, -c, and -s general options on the Novell Import Conversion Export executable. For more information, see “General Options” on page 149.
Page 167
Using XML Rules The Novell Import Conversion Export conversion rules use the same XML format as Novell Nsure Identity Manager. For more information on Novell Nsure Identity Manager, see the Novell Nsure Identity Manager Administration Guide (http://www.novell.com/documentation/dirxml20/...
Page 168
Example Command: If the schema rules are saved to an sr1.xml file, the following command instructs the utility to use the rules while processing the 1entry.ldf file and to send the results to a destination file, outt1.ldf. ice -o -sfile://sr1.xml -SLDIF -f1entry.ldf -c -DLDIF -foutt1.ldf 168 Novell eDirectory 8.8 Administration Guide...
Page 169
• Matching Attributes specifies that an add record must have the specific attributes and match the specified values, or else the add fails. • Templates specifies the distinguished name of a Template object in eDirectory. The Novell Import Conversion Export utility does not currently support specifying templates in create rules.
Page 170
Example Command: If the create rules are saved to an crl.xml file, the following command instructs the utility to use the rules while processing the 1entry.ldf file and to send the results to a destination file, outt1.ldf. ice -o -cfile://cr1.xml -SLDIF -f1entry.ldf -c -DLDIF -foutt1.ldf 170 Novell eDirectory 8.8 Administration Guide...
Page 172
LDAP format. The Novell Import Conversion Export utility supports source and destination names only in LDAP format. Placement Example 1: The following placement rule requires that the record have a base class of inetOrgPerson.
Page 173
Jones, ou=English, ou=Humanities, o=UofZ, o=test Placement Example 6: The following placement rule requires the record to have an sn attribute. If the record matches this condition, the entry's entire DN is copied to the neworg container. Novell eDirectory Management Utilities 173...
8. The server sends an end LBURP extended response to the client. The LBURP protocol lets Novell Import Conversion Export present data to the server as fast as the network connection between the two will allow. If the network connection is fast enough, this lets...
IMPORTANT: Because LBURP is a relatively new protocol, eDirectory servers earlier than version 8.5 (and most non-eDirectory servers) do not support it. If you are using the Novell eDirectory Import/Export Wizard to import an LDIF file to one of these servers, you must disable the LBURP option for the LDIF import to work.
Page 176
491. Using Simple Passwords Novell eDirectory uses public and private key pairs for authentication. Generating these keys is a very CPU-intensive process. With eDirectory 8.7.3 onwards, you can choose to store passwords using the simple password feature of Novell Modular Authentication Service (NMAS ).
8 Click Next, then follow the online instructions to complete the remainder of the LDIF import wizard. If you choose to store passwords using simple passwords, you must use an NMAS-aware Novell Client to log in to the eDirectory tree and access traditional file and print services. NMAS must also be installed on the server.
Using Novell iManager, you can create or delete indexes. You can also view and manage the properties of an index, including the index name, state, type, rule, and attribute indexed. Use the Predicate Statistics data, available only in ConsoleOne, to know what additional indexes might be valuable for your environment.
6 Use the columns provided to move a copy of the index to the desired server. 7 Click Apply. 6.2.5 Using the Novell Import Conversion Export Utility to Manage Indexes You can use the Novell Import Conversion Export utility to create or delete indexes. Novell eDirectory Management Utilities 179...
Page 180
• 2 - Substring Matching, which optimizes queries that involve a match of a few characters. For example, a query for all entries with a surname containing .der. This query returns entries with the surnames of Derington, Anderson, and Lauder. 180 Novell eDirectory 8.8 Administration Guide...
The Predicate Statistics feature is not intended to run all the time. Collecting predicate statistics affects search performance. Also, lengthy accumulation of statistics can result in large databases. Use Predicate Statistics if you suspect performance issues are related to a particular directory lookup. Novell eDirectory Management Utilities 181...
“Using the eMBox Client Service Manager eMTool” on page 182 • “Using the Service Manager Plug-In to Novell iManager” on page 183 6.4.1 Using the eMBox Client Service Manager eMTool The eDirectory Management Toolbox (eMBox) Client is a command line Java client that gives you remote access to the eDirectory Service Manager eMTool.
5 Exit the eMBox Client by entering the following command: exit 6.4.2 Using the Service Manager Plug-In to Novell iManager 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance > Service Manager. 3 Specify the server you want to manage, then click OK.
You can also examine what tasks are taking place, when they are happening, what their results are, and how long they are taking. iMonitor provides a Web-based alternative or replacement for many of the Novell traditional server- based eDirectory tools such as DSBrowse, DSTrace, DSDiag, and the diagnostic features available in DSRepair.
For NetWare and Windows, iMonitor loads automatically when eDirectory runs. On Linux, Solaris, AIX, and HP-UX, iMonitor can be loaded using the ndsimonitor -l command. It can also be loaded automatically by adding [ndsimonitor] in the /etc/opt/novell/eDirectory/conf/ ndsimon.conf file before starting the eDirectory Server.
“Anatomy of an iMonitor Page” on page 188 • “Modes of Operation” on page 189 • “iMonitor Features Available on Every Page” on page 190 • “NetWare Remote Manager Integration” on page 190 • “Configuration Files” on page 191 Using Novell iMonitor 2.1 187...
This frame appears only when you view pages where another replica of the requested data exists or where another replica might have a different view of the information being presented in the Data frame. 188 Novell eDirectory 8.8 Administration Guide...
7.3.2 Modes of Operation Novell iMonitor can be used in two different modes of operation: Direct mode and Proxy mode. No configuration changes are necessary to move between these modes. Novell iMonitor automatically moves between these modes, but you should understand them in order to successfully and easily navigate the eDirectory tree.
DSRepair, Reports, and Search pages from any iMonitor page by using the icons in the Navigator frame. You can also log in or link to the Novell Support Web page from any iMonitor page. Login/Logout: The Login button is available if you are not logged in. A Logout button, which closes your browser window, is displayed if you are logged in.
These files are located in the same directory as the iMonitor executable (which is usually in the same location as the Novell eDirectory executables) on NetWare and Windows, and in the /etc directory on Linux, Solaris, AIX, and HP-UX.
Page 192
2 is at least marginal, anything not in the range -5 to 5 is at least suspect, and anything not in the range -10 to 10 is a warning. time_delta-active: WARN | SUSPECT | MARGINAL time_delta-Min_Warn: time_delta-Min_Suspect: time_delta-Min_Marginal: time_delta-Max_Marginal: time_delta-Max_Suspect: time_delta-Max_Warn: For help on any of these options, enter the following URL in iMonitor: 192 Novell eDirectory 8.8 Administration Guide...
“Viewing Entries for Synchronization or Purging” on page 201 • “Viewing the Synchronization Status of a Replica” on page 201 • “Configuring and Viewing Reports” on page 201 • “Viewing Schema, Class, and Attribute Definitions” on page 203 Using Novell iMonitor 2.1 193...
If Unknown is listed under Maximum Ring Delta, it means the transitive synchronized vector is inconsistent and the maximum ring delta cannot be calculated due to replica/partition operations occurring, or some other problem. 194 Novell eDirectory 8.8 Administration Guide...
Status shows whether the server is up, down, or unknown. If the status shows as unknown, this means that this server has never needed to communicate with the server being shown as unknown. Using Novell iMonitor 2.1 195...
Having an inadequate amount of cache might severely impact your system’s performance. Login Settings lets you disable the queuing of login updates. You can also increase or decrease the amount of time between updates if updates are enabled. 196 Novell eDirectory 8.8 Administration Guide...
7.4.7 Configuring Trace Settings From the Trace Configuration page, you can set trace settings. Novell iMonitor's DSTrace is a server-centric feature. That is, it can be initiated only on a server where iMonitor is running. If you need to access this feature on another server, you must switch to the iMonitor running on that server.
DIB lock. If you are viewing a server running Novell eDirectory 8.6 or later, you will also see a list of partitions and the servers that participate in the replica ring with the server specified in the Navigator frame.
7.4.13 Viewing DSRepair Information From the DSRepair page, you can view problems and back up or clean up your DIB sets. Novell iMonitor's DSRepair is a server-centric feature. That is, it can be initiated only on a server where iMonitor is running.
DS Repair Advanced Switches lets you fix problems, check for problems, or create a backup of your database. You will not need to enter information in the Support Options field unless you are directed to do so by Novell Support. 3 Click Start Repair to run DS Repair on this server.
Entry Synchronization lets you determine why an entry needs to be synchronized. 7.4.17 Viewing Novell Nsure Identity Manager Details From the DirXML Summary page, you can view a list of any DirXML drivers running on your server, the status of each driver, any pending associations, and driver details.
Page 202
4 (Optional) Configure the report to run on either a periodic basis or at a later time. 4a Specify a frequency, start time, and start day. 4b Click Schedule. 5 Click Run Report to start the report. 202 Novell eDirectory 8.8 Administration Guide...
From the Search page, you can search objects based on a variety of query options and filters. The search query options and filters are grouped in two levels of search request forms: basic and advanced. The basic search request form is designed for average users of eDirectory and simple Using Novell iMonitor 2.1 203...
Relative Distinguished Name) will be ignored. Use the Ctrl key to deselect an item or select more than one item on the multilists. Deselected multilists will also be ignored. 1 In Novell iMonitor, click Search 2 Choose from the following options: Scope Options lets you specify the scope of the search.
Page 205
Although the back end for this feature shipped with eDirectory 8.7, it was not supported until eDirectory 8.7.1 running iMonitor 2.1 or later. This option does not apply to any version of Novell eDirectory or NDS prior to 8.7.
Page 206
Use NWConfig (NWConfig.nlm > Configuration Options > Directory Options > Extend Schema). dibclone.sch is located in sys:\system\schema. Windows Use NDSCons.exe (in NDSCons.exe, load install.dlm, then click Install Additional Schema Files). dibclone.sch is located in C:\Novell\NDS. 206 Novell eDirectory 8.8 Administration Guide...
Page 207
The NDS Clone object is created and the DIB fileset is copied to the specified destination. 3 Move the cloned DIB fileset onto the target server in the proper directory location. Additionally, on Linux, Solaris, AIX, and HP-UX systems, transfer the /etc/opt/novell/ eDirectory/conf/nds.conf file to the target server and update all the references to the source server in the file with the target server name.
Page 208
2d Manually copy the *.nds, nds*, and nds.rfl/*.* files to a destination or media on the target server convenient for moving the set to the target server. Additionally, on Linux, Solaris, AIX, and HP-UX systems, transfer the /etc/opt/novell/eDirectory/ conf/nds.conf file to the target server and update all the references to the source server in the file with the target server name.
Page 209
SNMP Platform Command or Tool NetWare SNMPINST -c adminContext password ServerDN Windows rundll32 snmpinst, snmpinst -c createobj -a userFDN -p password -h hostname_or_IP_address Linux, Solaris, AIX, and HP-UX ndsconfig -t tree_name -o server_context -m snmp Using Novell iMonitor 2.1 209...
7.5 Ensuring Secure iMonitor Operations Securing access to your iMonitor environment involves the following protective steps: 1. Use a firewall and provide VPN access (this also applies to Novell iManager and any other Web-based service that should have restricted access).
Section 8.3, “Renaming a Tree,” on page 222 8.1 Merging eDirectory Trees To merge eDirectory trees, use the Merge Tree Wizard in Novell iManager. This wizard lets you merge the root of two separate eDirectory trees. Only the Tree objects are merged; container objects and their leaf objects maintain separate identities within the newly merged tree.
Other servers in the source tree should be upgraded to eDirectory 8.6 or later to ensure proper functionality. 8.1.2 Target Tree Requirements Novell eDirectory 8.8 must be installed on the server containing the master replica of the target ® tree's [Root] partition. If this server is running any other version of NDS or eDirectory, the merge operation will not complete successfully.
Novell eDirectory will not work properly if different time sources are used that have different times or if all servers in a tree are not time synchronized.
For the Novell Client for DOS/Windows, check the Preferred Tree and Preferred Server statements in the net.cfg files. For the Novell Client for Windows, check the Preferred Tree and Preferred Server statements on the client Property Page. If Preferred Server is used, the client is unaffected by a tree merge or rename operation because the client still logs in to the server by name.
For the Novell Client for DOS/Windows, check the Preferred Tree and Preferred Server statements in the net.cfg files. For the Novell Client for Windows, check the Preferred Tree and Preferred Server statements on the client Property Page, or rename the target tree.
NOTE: It might take up to several hours for the inherited rights to be recalculated and become effective. This time will vary based on the tree's complexity, size, and number of partitions. The source tree's administrator has rights only in the newly created Domain object. Merging Novell eDirectory Trees 217...
Page 218
Trees before a Graft Figure 8-3 Source tree Preconfigured_tree T=Preconfigured_tree OU=Cache Services OU=GroupWise OU=IS ADMIN Target tree T=Oak_tree O=San Jose Security ADMIN OU=Engineering OU=Operations OU=New Devices 218 Novell eDirectory 8.8 Administration Guide...
For example, if you are using dot delimiters, the typeful name for Admin in the Preconfigured_tree (source tree) is CN=Admin.OU=IS.T=Preconfigured_tree After the Preconfigured_tree is merged into the New Devices container in the Oak_tree, the typeful name for Admin is CN=Admin.OU=IS.DC=Preconfigured_tree.OU=Newdevices. OU=Engineering.O=Sanjose.T=Oak_tree. Merging Novell eDirectory Trees 219...
• Make the partition associated with this container the master partition). replica and delete other replicas. • Split the target tree graft container into a separate partition and remove replicas. After the graft is complete, the partition association can be re- established. 220 Novell eDirectory 8.8 Administration Guide...
Page 221
You can check this using iMonitor > Schema. If the containment list does not include Domain, run DSRepair to make schema enhancements. If containment requirements aren't met, run DSRepair to correct the schema. 1 In Novell iManager, click the Roles and Tasks button Merging Novell eDirectory Trees 221...
Therefore, after you change a tree's name, you might need to change your client workstation configurations. For the Novell Client for DOS/Windows, check the Preferred Tree and Preferred Server statements in the net.cfg files. For Novell Client for Windows, check the Preferred Tree and Preferred Server statements on the client Property Page.
To rename the tree: 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance > Rename Tree. 3 Specify which server will run the Rename Tree Wizard (this should be a server in the target tree), then click Next.
Check whether the source tree dsmerge.pg -uSource_tree_user can be grafted into the target -pSource_tree_user_password -TTarget_tree_name tree container -UTarget_tree_user -PTarget_tree_password -CTarget_tree_container Graft the source tree into the dsmerge.g -uSource_tree_user container in the target tree -pSource_tree_user_password -TTarget_tree_name -UTarget_tree_user -PTarget_tree_password -CTarget_tree_container 224 Novell eDirectory 8.8 Administration Guide...
Page 225
Merge Operation eMBox Client Command Cancel the running dsmerge cancel operation Merging Novell eDirectory Trees 225...
8.8 servers. This provides greater security for the confidential data. Refer to the Novell eDirectory 8.8 What's New Guide (http://www.novell.com/documentation/ edir88/index.html) for more information on the need for encryption of data and the scenarios in which you can encrypt data.
For example, in an encrypted attributes policy EP1, you can select both AES as the encryption scheme for an attribute cubeno and Triple DES for an attribute empno. Refer to “Creating and Defining Encrypted Attributes Policies” on page 230 for more information. 228 Novell eDirectory 8.8 Administration Guide...
You can change the encryption scheme for an encrypted attribute by editing the encrypted attributes policy. You can also unencrypt an attribute that you have encrypted earlier. Refer to “Editing Encrypted Attributes Policies” on page 230 for more information. You can choose to have different encryption schemes in different servers of the replica ring. For example, an attribute might be enabled for encryption using AES on Server1, Triple DES on Server2 and no encryption scheme on Server3.
Page 229
This implies that the whole entry is blocked. Creating and Defining Encrypted Attributes Policies 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Encryption > Attributes. 3 In the Encrypted Attributes Policies Management Wizard, select Create, Edit, and Apply Policy.
Page 230
Creating and Defining Encrypted Attributes Policies 1 Create an attribute encryption policy. For example, the encrypted attributes policy is AE Policy- test-server, then dn: cn=AE Policy - test-server, o=novell changetype: add objectClass: encryptionPolicy 2 Add the attrEncryptionDefinition attribute to the Policy object you created and mark the attributes for encryption.
For example, if the NCP server is test-server: dn: cn=test-server, o=novell changetype: modify add: encryptionPolicyDN encryptionPolicyDN: cn=AE Policy - test-server, o=novell Editing Encrypted Attributes Policies The following LDIF file illustrates editing an encrypted attributes policy by changing the value of the attrEncryptionRequireSecure attribute:...
By default, the encrypted attributes can be accessed only through a secure channel. However, if you want the clients to be able to access the encrypted attributes over clear text, then disable the Always Require Secure Channel option. For more information, refer to “Enabling and Disabling Access to Encrypted Attributes Over Clear Text Channels”...
You can add eDirectory 8.8 servers to replica rings irrespective of whether the attributes are marked for encryption on one or all the servers hosting the replica or whether Always Require Secure Channel is enabled or disabled. 234 Novell eDirectory 8.8 Administration Guide...
235. 9.2 Encrypted Replication In Novell eDirectory 8.8 and later, you can encrypt data that is transmitted between eDirectory 8.8 servers. This offers a high level of security during replication as the data does not flow in clear text. Refer to the Novell eDirectory 8.8 What's New Guide (http://www.novell.com/documentation/...
Enabled Disabled Unencrypted Disabled Enabled Encrypted This section contains the following procedures: • “Enabling Encrypted Replication at the Partition Level” on page 237 • “Enabling Encrypted Replication at the Replica Level” on page 238 236 Novell eDirectory 8.8 Administration Guide...
Page 236
Enabling Encrypted Replication at the Partition Level When you enable encrypted replication at a partition level, replication between all the replicas hosting the partition is encrypted. For example, consider partition P1 has replicas R1, R2, R3, and R4. You can encrypt the replication between all the replicas, and all replications, inbound or outbound, are encrypted for these replicas.
Page 237
To enable encrypted replication between replicas of a partition, you need to define an encryption link between the replicas. Refer to “Enabling Encrypted Replication at the Replica Level Using iManager” on page 239 for more information. 238 Novell eDirectory 8.8 Administration Guide...
Page 238
If you have enabled encrypted replication for one replica, it means that: • the inbound synchronization from a server to this replica • outbound synchronization from this replica to any other server is encrypted. The replicas you have enabled for encrypted replication must be on eDirectory 8.8 servers. The remaining replicas in the replica ring, that are not enabled for encrypted replication, can be on servers with earlier versions of eDirectory.
Enabling Encrypted Replication at the Partition Level The scenarios vary depending on the version of eDirectory server you are trying to add. This section contains the following information: • “Adding Pre-eDirectory 8.8 Servers to the Replica Ring” on page 241 240 Novell eDirectory 8.8 Administration Guide...
Page 240
• “Adding eDirectory 8.8 Servers to the Replica Ring” on page 243 Adding Pre-eDirectory 8.8 Servers to the Replica Ring The following illustration gives you the possible scenarios when you add a pre-eDirectory 8.8 server to the replica ring: • Scenario A •...
Page 241
Scenario C: Adding a Pre-eDirectory 8.8 Server to a Mixed Replica Ring with Encrypted Replication Disabled You can add a pre-eDirectory 8.8 server to a replica ring having a mixed version of eDirectory with encrypted replication disabled. Refer to Figure 43 above. 242 Novell eDirectory 8.8 Administration Guide...
Page 242
Adding eDirectory 8.8 Servers to the Replica Ring The following illustration gives you the possible scenarios when you add eDirectory 8.8 server to the replica ring: • Scenario A • Scenario B • Scenario C • Scenario D Possible Scenarios for eDirectory 8.8 Server Figure 9-8 Possible scenarios for eDirectory...
Page 243
Refer to Figure 9-10 on page 244. Scenario D: Adding eDirectory 8.8 Servers to a Mixed Replica Ring where Master Replica is a Pre-eDirectory 8.8 Server and Encrypted Replication is Disabled 244 Novell eDirectory 8.8 Administration Guide...
In this case, you do not need to enable encrypted replication on the eDirectory 8.8 server you are trying to add. Adding eDirectory 8.8 server to a Replica Ring where Master Replica is a Pre-eDirectory 8.8 Server Figure 9-11 No need to enable ER Pre- eDirectory eDirectory...
• Section 9.3.1, “Encrypting Data in an All New Setup,” on page 247 • Section 9.3.2, “Encrypting Data in an Existing Setup,” on page 247 • Section 9.3.3, “Conclusion,” on page 249 246 Novell eDirectory 8.8 Administration Guide...
9.3.1 Encrypting Data in an All New Setup In case of a new setup, you would have just installed the operating system and then eDirectory. It is assured that there is no clear text data present in the hard disk where the DIB resides. Complete the following steps to ensure that the encrypted data in eDirectory is truly secure: 1 Plan in advance which attributes you want to encrypt and with what scheme.
Page 247
Change the encryption algorithms for an attribute. 2 Take a DIB backup. You can backup the DIB using DIB Clone Backup. 3 Restore the backed up DIB to a new fresh server, and delete the old server. 248 Novell eDirectory 8.8 Administration Guide...
4 Destroy any existing clear text data on the old server. This avoids bits and pieces of data with the old scheme still on the hard disk. Any disks (or on other media) with the clear text data on it should be securely wiped.This includes things like the clear text LDIF file used to bulk load the server, any other server that were used for replication or tapes with old backups on them.
Novell does not recommend running repair operations unless you run into problems with eDirectory, or are told to do so by Novell Support. However, you are encouraged to use the diagnostic features available in Repair and in other Novell utilities such as Novell iMonitor. For more information, see Chapter 7, “Using Novell iMonitor 2.1,”...
Section 10.1, “Performing Basic Repair Operations,” on page 252 • Section 10.2, “Viewing and Configuring the Repair Log File,” on page 256 • Section 10.3, “Performing a Repair in Novell iMonitor,” on page 257 • Section 10.4, “Repairing Replicas,” on page 257 •...
Page 252
Checks server network addresses stored in eDirectory against Addresses the values maintained in local SAP, SLP, or DNS tables to make sure that eDirectory still has accurate information. If a discrepancy is found, eDirectory is updated with the correct information. Repairing the Novell eDirectory Database 253...
If not, the trustee ID is removed from the volume list. To perform an unattended full repair: 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance Utilities > Basic Repair. 3 Specify the server that will perform the operation, then click Next.
Section 10.2, “Viewing and Configuring the Repair Log File,” on page 256. 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance Utilities > Basic Repair. 3 Specify the server that will perform the operation, then click Next.
IMPORTANT: This operation should not be run unless you understand the consequences or have been advised by Novell Support to run it. 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance Utilities > Basic Repair.
10.3 Performing a Repair in Novell iMonitor You can access Repair features by using the Repair Via iMonitor option in Novell iManager. The Repair page in iMonitor lets you view problems and back up or clean up your eDirectory database.
“Performing a Local Database Repair” on page 254 for more information. 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance Utilities > Replica Repair. 3 Specify the server that will perform the operation, then click Next.
Declaring a new epoch is a very expensive operation, and should not be used regularly. Novell eDirectory is a loosely consistent database, so you should allow for five to ten minutes before checking replica synchronization. This operation results in the following conditions: •...
Do not use this option to perform the normal partition operations available in Novell iManager. For more information, see Chapter 5, “Managing Partitions and Replicas,” on page 129. 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance Utilities > Replica Repair.
Local Database Repair” on page 254 for more information. 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance Utilities > Replica Ring Repair. 3 Specify the server that will perform the operation, then click Next.
This operation removes the specified server from the selected replica stored on the current server. WARNING: Misuse of this operation can cause irrevocable damage to the eDirectory database. You should not use this operation unless directed to by Novell Support personnel. 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance Utilities >...
IMPORTANT: If all servers request the schema from the master replica, network traffic can increase. Therefore, use this option with caution. 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance Utilities > Schema Maintenance. 3 Specify the server that will perform the operation, then click Next.
This operation requires that this server contain a replica of the [Root] partition (preferably the Master of [Root]) and that the state of the replica is On. 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance Utilities > Schema Maintenance.
If the receiving server contains a schema that was not in the new epoch, objects and attributes that use the old schema are changed to the Unknown object class or attribute. IMPORTANT: Do not perform this operation unless instructed to do so by Novell Support. 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance Utilities >...
If the server address cannot be found in the SAP tables, local/remote DNS information, or SLP directory agents, no repair is performed. 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance Utilities > Server Repair.
Issues Novell SLP is an optional package. The authentication feature is not implemented as a part of the Novell SLP package. eDirectory is now interoperatible with OpenSLP, and the authentication features of OpenSLP are used. 10.8 Performing Synchronization Operations The Sync Repair Wizard lets you synchronize a selected replica on the current server, report the synchronization status on the current server, report the synchronization status on all servers, perform a time synchronization, and schedule an immediate synchronization.
It also displays a warning message if synchronization has not completed within 12 hours. 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance Utilities > Sync Repair.
6 Follow the online instructions to complete the operation. 10.9 Advanced DSRepair Options In addition to the Repair features available in Novell iManager, the DSRepair utilities for each eDirectory platform contain some advanced features that are hidden from normal use. These advanced features are enabled through switches when loading the DSRepair utility on the various platforms.
Page 269
-R [-l yes|no] [-u yes|no] [-m yes|no] [-i yes|no] [-f yes|no][-d yes|no] [-t yes|no] [-o yes|no][-r yes|no] [-v yes|no] [-c yes|no] [-F filename] [-A yes|no] [-O yes|no] IMPORTANT: The -Ad option should not be used without prior direction from Novell Support personnel. Examples To perform an unattended repair and log events in the /root/ndsrepair.log file, or to append...
Unattended Full Repair option. Instructs ndsrepair to run and exit without further user intervention. This is the suggested means of repair unless you are told by Novell Support to perform certain operations manually. You can view the log file after the repair has completed to determine what changes ndsrepair has made.
10.9.3 Using Advanced DSRepair Switches WARNING: The features described in this section can cause irreversible damage to your eDirectory tree if they are used improperly. Use these features only if instructed to do so by Novell Support personnel. You should make a full backup of eDirectory on the server before using any of these features in a production environment.
The port number is usually 80 or 8028, unless you have a Web server that is already using the port. The -n option opens a nonsecure connection. The eMBox Client will indicate whether the login is successful. 3 Enter a repair command, using the following syntax: Repairing the Novell eDirectory Database 273...
Rebuild operational schema Repair all local replicas Validate mail directories and stream files Check local references Unattended full repair Repair selected server's network address Object ID in hex Object DN Repair all network addresses 274 Novell eDirectory 8.8 Administration Guide...
Page 274
Synchronize the replica on all servers Partition ID Partition DN Destroy the selected replica on this server Partition ID Partition DN Remove this server from the replica ring Partition ID Partition DN Server ID Server DN Repairing the Novell eDirectory Database 275...
Page 275
Option Description Designate this server as the new master replica Partition ID Partition DN Delete unknown leaf objects 276 Novell eDirectory 8.8 Administration Guide...
WAN Traffic Manager WAN Traffic Manager (WTM) lets you manage replication traffic across WAN links, reducing ® network costs. WAN Traffic Manager is installed during the Novell eDirectory installation and consists of the following elements: • WTM This resides on each server in the replica ring. Before eDirectory sends server-to-server traffic, WTM reads a WAN traffic policy and determines whether the traffic will be sent.
Page 277
Verifies external references, which are pointers to eDirectory objects that are not stored in the replicas on a server. The backlink process normally runs two hours after the local database is opened and then every 13 hours thereafter. 278 Novell eDirectory 8.8 Administration Guide...
LANs by wide area links. If you do not create a LAN Area object, you must manage each server’s WAN traffic individually. Creating a LAN Area Object 1 In Novell iManager, click the Roles and Tasks button 2 Click WAN Traffic > Create LAN Area. 3 Select WANMAN-LAN Area from the Object Class drop-down list.
Allows only existing WAN connections to be used. opnspoof.wmg Allows only existing WAN connections to be used but assumes that a connection that hasn't been used for 15 minutes is being spoofed and should not be used. 280 Novell eDirectory 8.8 Administration Guide...
Page 280
= values statement. Key is the policy name displayed in the snap-in and value is the path to the text files containing delimited policies. 1 In Novell iManager, click the Roles and Tasks button 2 Click WAN Traffic > WAN Traffic Manager Overview.
Page 281
9 Click Apply, then click OK. Modifying WAN Policies Applied to a LAN Area Object 1 In Novell iManager, click the Roles and Tasks button 2 Click WAN Traffic > WAN Traffic Manager Overview > View LAN Areas. 3 Click the LAN Area object that contains the policy you want to edit.
Area object manage traffic for all servers that belong to the object. Creating a WAN Policy for a Server Object 1 In Novell iManager, click the Roles and Tasks button 2 Click WAN Traffic > WAN Traffic Manager Overview > View NCP Servers.
Page 283
7 If you want to keep the original 1-3 am policy, add the new policy under a different name. 7a Click Rename Policy. 7b Enter a name for the edited policy, then click OK. 8 Click Apply, then click OK. 284 Novell eDirectory 8.8 Administration Guide...
“Modifying WAN Policies” on page 281. Assigning Default Cost Factors 1 In Novell iManager, click the Roles and Tasks button 2 Click WAN Traffic Management > WAN Traffic Manager Overview. 3 Click View LAN Areas, then click a LAN Area object.
Janitor or Limber; and schema synchronization unless the cost factor is less than 20. • Cost < 20 Prevents all other traffic unless the cost factor is less than 20. To prevent all traffic with a cost factor of 20 or greater, both policies must be applied. 286 Novell eDirectory 8.8 Administration Guide...
11.2.4 Ipx.wmg The policies in this group allow only IPX traffic. There are two policies: • IPX, NA Prevents the checking of backlinks, external references, and login restrictions; the running of Janitor or Limber; and schema synchronization unless the traffic that is generated is IPX. •...
Page 287
NDS_BACKLINKS does not have a destination address; it requires a NO_ADDRESSES policy. If WAN Traffic Manager returns DONT_SEND, backlink checking will be put off and rescheduled. The following variables are supplied: • Last (Input Only, Type TIME) 288 Novell eDirectory 8.8 Administration Guide...
Page 288
The time of the last round of backlink checking since eDirectory started. When eDirectory starts, Last is initialized to 0. If NDS_BACKLINKS returns SEND, Last is set to the current time after eDirectory finishes backlinking. • Version (Input Only, Type INTEGER) The version of eDirectory.
Page 289
(default). Call WAN Traffic Manager and let the policies decide whether to allow the connection. Return ERR_CONNECTION_DENIED without calling WAN Traffic Manager, causing the connection to fail. • CheckEachAlreadyOpenConnection (Output Only, Type INTEGER) 290 Novell eDirectory 8.8 Administration Guide...
Page 290
Value Description Return Success without calling WAN Traffic Manager, allowing the connection to proceed normally (default). Call WAN Traffic Manager and let the policies decide whether to allow the connection. Return ERR_CONNECTION_DENIED without calling WAN Traffic Manager, causing the connection to fail. Sample NDS_CHECK_LOGIN_RESTRICTION_OPEN NDS_CHECK_LOGIN_RESTRICTION_OPEN is only used if either CheckEachNewOpenConnection or CheckEachAlreadyOpenConnection was set to 1 during the...
Page 291
Tells eDirectory what to do if it needs to create a new connection while running the janitor. CheckEachNewOpenConnection is initialized to 0. Value Description Return Success without calling WAN Traffic Manager, allowing the connection to proceed normally (default). 292 Novell eDirectory 8.8 Administration Guide...
Page 292
Value Description Call WAN Traffic Manager and let the policies decide whether to allow the connection. Return ERR_CONNECTION_DENIED without calling WAN Traffic Manager, causing the connection to fail. • CheckEachAlreadyOpenConnection (Output Only, Type INTEGER) Tells eDirectory what to do if it needs to reuse a connection it determines is already open while running the Janitor.
Page 293
• CheckEachNewOpenConnection (Output Only, Type INTEGER) Value Description Return Success without calling WAN Traffic Manager, allowing the connection to proceed normally (default). Call WAN Traffic Manager and let the policies decide whether to allow the connection. 294 Novell eDirectory 8.8 Administration Guide...
Page 294
Value Description Return ERR_CONNECTION_DENIED without calling WAN Traffic Manager, causing the connection to fail. • CheckEachAlreadyOpenConnection (Output Only, Type INTEGER) Value Description Return Success without calling WAN Traffic Manager, allowing the connection to proceed normally (default). Call WAN Traffic Manager and let the policies decide whether to allow the connection.
Page 295
(default). Call WAN Traffic Manager and let the policies decide whether to allow the connection. Return ERR_CONNECTION_DENIED without calling WAN Traffic Manager, causing the connection to fail. • CheckEachAlreadyOpenConnection (Output Only, Type INTEGER) 296 Novell eDirectory 8.8 Administration Guide...
Page 296
Value Description Return Success without calling WAN Traffic Manager, allowing the connection to proceed normally (default). Call WAN Traffic Manager and let the policies decide whether to allow the connection. Return ERR_CONNECTION_DENIED without calling WAN Traffic Manager, causing the connection to fail. Sample NDS_SCHEMA_SYNC_OPEN NDS_SCHEMA_SYNC_OPEN is used only if either CheckEachNewOpenConnection or CheckEachAlreadyOpenConnection was set to 1 during the corresponding NDS_SCHEMA_SYNC...
This policy prevents other traffic to existing WAN connections that have been open less than 15 minutes. To prevent all traffic to existing connections open less than 15 minutes, both policies must be applied. 298 Novell eDirectory 8.8 Administration Guide...
11.2.8 Samearea.wmg The policies in this group allow traffic only in the same network area. A network area is determined by the network section of an address. In a TCP/IP address, Wan Traffic Manager assumes a class C address (addresses whose first three sections are in the same network area). In an IPX address, all addresses with the same network portion are considered to be in the same network area.
WAN Traffic Manager provides system symbols (predefined variables) for use with all traffic types. Each declaration consists of three parts: • Scope • Type • List of names/optional value pairs 300 Novell eDirectory 8.8 Administration Guide...
Page 300
Scope Valid scopes are listed in the following table. Scope Description REQUIRED Variables defined as REQUIRED in scope can be used in multiple sections, but only once within the Declaration section. No values can be defined for a REQUIRED scope variable. Its value must come from the GetWanPolicy request.
The result of this Declarations list is a value representing the policy's suggestion to SEND or DONT_SEND. The result of a Provider section is given in a RETURN declaration. If no RETURN declaration is made, a default value of SEND is returned. The following is a sample Provider section: 302 Novell eDirectory 8.8 Administration Guide...
PROVIDER RETURN SEND; For more information on writing declarations, see “Construction Used within Policy Sections” on page 303. 11.3.4 Construction Used within Policy Sections The following statements and constructions can be used, except as noted, in the Selector and Provider sections of a WAN policy. For more information on how to construct the Declaration section of a policy, see “Declaration Section”...
Page 303
The assignment declaration must be terminated with a semicolon (;). For example: variable.field:=expression; variable:=expression; t1 and t2 are of type TIME, i1 and i2 are type INTEGER, and b1 and b2 are Boolean valid assignments: 304 Novell eDirectory 8.8 Administration Guide...
Page 304
t1 := t2; b1 := t1 < t2; i1 := t1.mday - 15; b2 := t2.year < 2000 Invalid assignments: b1 := 10 < i2 < 12; (10 < i2) is Boolean, and a BOOLEAN cannot be compared to an INTEGER. You could use b1 := (10 <...
Page 305
You can use PRINT declarations to send text and symbol values to the server’s WAN Traffic Manager display screen and to the log file. PRINT statements can have any number of arguments that can be literal strings, symbol names or members, integer values, or Boolean values, separated by commas. 306 Novell eDirectory 8.8 Administration Guide...
Page 306
You must enclose literal strings in double quotes (“ ”). PRINT declarations must end in a semicolon (;). For example: PRINT "INT=",10,"BOOL=",TRUE,"SYM=",R1; TIME and NETADDRESS variables use formatted PRINT declarations. TIME symbols are printed as follows: m:d:y h:m NETADDRESS variables are printed as follows: Type length data Type is either IP or IPX, length is the number of bytes, and data is the hexadecimal address string.
X.500 standard. LDAP is used most often as the simplest directory access protocol. ® Lightweight Directory Access Protocol (LDAP) Services for Novell eDirectory is a server application that lets LDAP clients access information stored in eDirectory.
12.1.2 Objects LDAP Group object— Sets up and manages the Novell LDAP properties on an LDAP server. This object is created when you install eDirectory. An LDAP Group object contains configuration information that can be conveniently shared among multiple LDAP servers.
The following figure illustrates an LDAP Server object in Novell iManager. 12.1.3 Referrals Referral— A message that the LDAP server sends to the LDAP client telling the client that this server can't provide complete results and that more data might be on another LDAP server.
12.2 Understanding How LDAP Works with eDirectory This section explains the following: • “Connecting to eDirectory from LDAP” on page 313 • “Class and Attribute Mappings” on page 316 312 Novell eDirectory 8.8 Administration Guide...
“Supported Novell LDAP Controls and Extensions” on page 320 12.2.1 Connecting to eDirectory from LDAP All LDAP clients bind (connect) to Novell eDirectory as one of the following types of users: • [Public] User (Anonymous Bind) • Proxy User (Proxy User Anonymous Bind) •...
Page 313
• You can grant a Proxy User object rights to All Properties (default) or Selected Properties. To give the Proxy User rights to only selected properties: 1 In Novell iManager, click the Roles and Tasks button 2 Click Rights > Modify Trustees.
Page 314
When an LDAP client requests access to an eDirectory object and attribute, eDirectory accepts or rejects the request based on the LDAP client’s eDirectory identity. The identity is set at bind time. Understanding LDAP Services for Novell eDirectory 315...
You should examine the class and attribute mapping and reconfigure as needed. 1 In Novell iManager, click the Roles and Tasks button 2 Click LDAP > LDAP Overview > View LDAP Groups. 3 Click an LDAP Group object, then click Attribute Map.
Page 316
If you request all attributes, you get the attribute that is first in the mappings list for that class. If you ask for an attribute by name, you will get the correct name. Many-to-One Class Mappings LDAP Class Name eDirectory Class Name alias Alias aliasObject groupOfNames Group groupOfUniqueNames group mailGroup NSCP:mailGroup1 rfc822mailgroup Understanding LDAP Services for Novell eDirectory 317...
Page 317
NOTE: The attributes with ;binary are security related. They are in the mapping table in case your application needs the name retrieved with ;binary. If you need it retrieved without ;binary, you can change the order of the mappings. 318 Novell eDirectory 8.8 Administration Guide...
OID or Object Identifier is a string of octet digits that is required to add an attribute or objectclass of your own to an LDAP server. To enable nonstandard schema output: 1 In Novell iManager, click the Roles and Tasks button 2 Click LDAP > LDAP Overview. 3 Click View LDAP Servers, then click an LDAP Server object.
Both relative distinguished names (Smith and Smith+Lisa) can exist in the same context because they must be referenced by two completely different relative distinguished names. 12.2.5 Supported Novell LDAP Controls and Extensions The LDAP 3 protocol allows LDAP clients and LDAP servers to use controls and extensions for extending an LDAP operation.
LDAP and NDS Integration Guide. 12.3 Using LDAP Tools on Linux, Solaris, AIX, or HP-UX eDirectory includes the following LDAP tools, stored in /opt/novell/eDirectory/bin, to help you manage the LDAP directory sever. Tool Description Imports entries from a file to an LDAP directory, modifies the entries in a directory from a file, exports the entries to a file, and adds attribute and class definitions from a file.
There are some options that are common to all ldap tools. These are listed in the following table: Option Description Enables referral following. (anonymous bind) -d debuglevel Sets the LDAP debugging level to debuglevel. The ldapmodify tool must be compiled with LDAP_DEBUG defined for this option to have any effect. 322 Novell eDirectory 8.8 Administration Guide...
Page 322
TLS is started. If the -e option is not specified, any certificate from the server is accepted. Examples Assume that the file /tmp/entrymods exists and has the following contents: dn: cn=Modify Me, o=University of Michigan, c=US changetype: modify Understanding LDAP Services for Novell eDirectory 323...
Page 323
Assume that the file /tmp/newentry exists and has the following contents: dn: cn=Barbara Jensen, o=University of Michigan, c=US objectClass: person cn: Barbara Jensen cn: B Jensen sn: Jensen title: Manager mail: bjensen@terminator.rs.itd.umich.edu uid: bjensen 324 Novell eDirectory 8.8 Administration Guide...
Page 324
Example The command ldapdelete "cn=Delete Me, o=University of Michigan, c=US" will attempt to delete the entry named with the commonName Delete Me directly below the University of Michigan Understanding LDAP Services for Novell eDirectory 325...
Page 325
NOTE: On a NetWare server, the utility is called lmodrdn dn <newrdn>). Output from the ldap utilities is sent to stdout. If the utility exits before you can view the output, redirect the output to a file, for example, ldapmodrdn [options] > out.txt. 326 Novell eDirectory 8.8 Administration Guide...
Page 326
TIP: Output from the ldap utilities is sent to stdout. If the utility exits before you can view the output, redirect the output to a file, for example, ldapsearch [options] filter [attribute list] > out.txt. Understanding LDAP Services for Novell eDirectory 327...
Page 327
Specifies the URL prefix for files (default: "file://tmp/"). -z sizelimit Waits at most sizelimit entries for a search to complete. NOTE: Refer to “Common Options for All LDAP Tools” on page 322 for more details on common options. 328 Novell eDirectory 8.8 Administration Guide...
Page 328
-L -s one -b "c=US" "o=university*" o description Search results will be displayed in the LDIF format. The organizationName and description attribute values will be retrieved and printed to standard output, resulting in output similar to the following: Understanding LDAP Services for Novell eDirectory 329...
Page 329
Lists the specified indexes. If the index is not specified, ndsindex lists all existing indexes on the server. Creates new indexes. delete Deletes the specified indexes. resume Resumes the specified indexes from an off-line state. suspend Suspends the specified indexes to an off-line state. 330 Novell eDirectory 8.8 Administration Guide...
LDAP servers to recognize a search element called an extensible match filter. An extensible match allows an LDAP client to specify the following items in a search filter: • An optional attribute name • An optional matching rule Understanding LDAP Services for Novell eDirectory 331...
Page 331
The DN specification allows matching on specific elements of the DN. Novell eDirectory 8.7.3 onwards supports the extensible match filter for matching on the DN attributes. The other elements of the extensible match search filter, namely the matching rule, are treated as undefined and ignored.
Page 332
This example illustrates the use of the :dn notation to indicate that matching rule 2.4.6.8.10 should be used when making comparisons, and that the attributes of an entry’s distinguished name should be considered part of the entry when evaluating the match. Understanding LDAP Services for Novell eDirectory 333...
Configuring LDAP Services for Novell eDirectory ® The eDirectory installation program automatically installs LDAP Services for Novell eDirectory. For information on installing eDirectory, see the Novell eDirectory 8.8 Installation Guide. This section explains the following: • Section 13.1, “Loading and Unloading LDAP Services for eDirectory,” on page 335 •...
In the DHOST (NDSCONS) screen, click nldap.dlm > Stop. Linux, Solaris, AIX, and HP-UX In the DHOST remote management page, to unload LDAP, click the LDAP v3 for Novell eDirectory 8.8 action icon to stop. At the Linux, Solaris, AIX, or HP-UX prompt, enter /opt/novell/eDirectory/sbin/nldap -u 13.2 Verifying That the LDAP Server Is Loaded...
3 Select a connection, server, or DNS name or IP address, then click OK. 4 Provide your password, then click OK. 5 Click LDAP Agent for Novell eDirectory 8.8. The Module Information section displays nldap.nlm in the filename field. Loaded on Linux and UNIX Identify libnldap.so or libnldap.sl.
For a refresh or update, the search will not be aborted even if it has many hits to return to the client. 13.3.2 Verifying That The LDAP Server Is Running To verify that the LDAP service is running, use the Novell Import Conversion Export Utility (ICE). ®...
Because the example reads information from a Novell eDirectory server, the vendor information displays as Novell, Inc. Using Novell iManager To verify that the LDAP server is functional by using Novell iManager, follow steps in “Exporting Data to a File” on page 143.
-a 2 Find a line where the local address is servername:389 and the state is LISTENING. If one of the following situations occurs, run Novell iMonitor: • You are unable to get information from the ICE utility • You are uncertain that the LDAP server is handling LDAP requests For information on Novell iMonitor, see “Configuration Files”...
The LDAP configuration utility is ldapconfig. You can use ldapconfig on Linux, Solaris, AIX, or HP-UX systems to modify, view, and refresh the attributes of LDAP Server and LDAP Group objects. Use the following syntax to view LDAP attribute values on Linux, Solaris, AIX, and HP-UX systems: Configuring LDAP Services for Novell eDirectory 341...
Page 341
[-t tree_name | -p host_name[:port]] [-w password] [-a user_FDN] -v “Require TLS for simple binds with password”,”searchTimeLimit” To configure the LDAP TCP port number and search size limit to 1000, enter the following command: 342 Novell eDirectory 8.8 Administration Guide...
Page 342
[-w password] [-a admin_FDN] -s “LDAP TCP Port=389”,"searchSizeLimit=1000" Attributes on the LDAP Server Object Use the LDAP Server object to set up and manage the Novell LDAP server properties. The following table provides a description of the LDAP server attributes: Attribute...
Attributes on the LDAP Group Object Use the LDAP Group object to set up and manage the way LDAP clients access and use the information on the Novell LDAP server. To require TLS for simple binds, see “Requiring TLS for Simple Binds with Passwords” on page 346.
13.6 Authentication and Security This section contains information on the following: • “Requiring TLS for Simple Binds with Passwords” on page 346 • “Starting and Stopping TLS” on page 346 Configuring LDAP Services for Novell eDirectory 345...
To require TLS for simple binds with passwords: 1 In Novell iManager, click the Roles and Tasks button 2 Click LDAP > LDAP Overview > View LDAP Groups. 3 Click the LDAP Group object, then click Information on the General tab.
This certificate is automatically provided during the eDirectory installation. During installation, Key Material objects are created as part of Public Key Infrastructure (PKI) and Novell Modular Authentication Services (NMAS ). The following figure illustrates these objects in iManager:...
X.509 certificate. The Server Certificate field in the following figure illustrates this DN. In Novell iManager, you can browse to the Key Material object (KMO) certificates. Using the drop- down list, you can change to a different certificate. Either the DNS or the IP certificate will work.
CA. LDAP Services for eDirectory 8.8 supports multiple certificate authorities. Novell's tree CA is just one certificate authority. The LDAP server might have other CAs (for example, from VeriSign*, an external company.) This additional CA is also a trusted root.
The LDAP server also allows Anonymous users to use the rights of a different proxy user. That value is located on the LDAP Group object. In Novell iManager, the value is named the Proxy User field. In ConsoleOne, the value is named the Proxy Username field. The following figure illustrates this field in Novell iManager.
This mechanism is an LDAP SASL bind (and not a simple bind). Therefore, the LDAP server accepts these requests, even if you checked the Require TLS for Simple Binds with Passwords check box during installation. Configuring LDAP Services for Novell eDirectory 351...
Page 351
NMAS (http://www.novell.com/documentation/nmas30/ index.html) online documentation. Even if the client sends an EXTERNAL mechanism, the LDAP server could fail the request. Novell iMonitor can provide the reasons for failure: • The connection is not secure. • Although the connection is secure, the client did not provide the required certificate during the handshake.
Limits the time that the server searches. The default is 0 seconds, for no time limit. The following figure illustrates these attributes in Novell iManager. 1 In Novell iManager, click the Roles and Tasks button 2 Click LDAP > LDAP Overview > View LDAP Servers.
Historically, the eDirectory LDAP server sent the default referral in a number of failover situations. Many users find these behaviors strange and sometimes unpredictable. LDAP Services for eDirectory 8.8 let you control when the default referral is sent for any kind of subordinate referral. 354 Novell eDirectory 8.8 Administration Guide...
Page 354
Referral Options drop-down list, referrals will still come from nonauthoritative partitions to other servers. To support superior referrals to non-eDirectory DSAs, LDAP Services for eDirectory 8.7.a has an Always Chain option. See “Always Chain” on page 356. Configuring LDAP Services for Novell eDirectory 355...
Page 355
LDAP server will present the nonauthoritative data as if it were the actual directory tree data. An intelligent client should, however, interrogate the supportedFeatures attribute of the RootDSE to ascertain whether or not the server supports superior referrals. 356 Novell eDirectory 8.8 Administration Guide...
Page 356
The exception is a search operation that is accompanied by the persistent search control. In this case, because the Novell implementation of persistent search does not support chaining, referrals are sent if the scope of the search operation is not all held locally.
Page 357
No Support for ManageDsaIT In LDAP Services for eDirectory 8.8, the distributed relationships between eDirectory servers in an eDirectory tree are managed by means other than the use of the ManageDsaIT control. The 358 Novell eDirectory 8.8 Administration Guide...
However, if you are certain that a filtered replica holds data that you need, you can configure an LDAP server to search filtered replicas. 1 In Novell iManager, click the Roles and Tasks button 2 Click LDAP > LDAP Overview.
Section 13.8.6, “Known Issues,” on page 363 13.8.1 Need for LDAP Referral Filtering In a Novell eDirectory deployment scenario, if you have multiple replica servers running in a tree and have configured LDAP servers to return referrals using the Prefer Referrals/Always Refer option, then the LDAP server will return referrals if the requested operation on a replica is not present locally.
Here, specifying the clear text port or SSL port will be like pre-pending ldap:// or ldaps:// strings. If nothing is specified, the match filter is applicable for both referrals. Examples: Examples Description 1.2.3.4 # matches both ldap and ldaps referrals on any port Configuring LDAP Services for Novell eDirectory 361...
= { 1.2.3.4 } referralExcludeFilter = { 2.3.4.5 } If the referral 3.4.5.6 comes, it will be excluded as it does not match the referralIncludeFilter, even though it does not match the referralExcludeFilter also. 362 Novell eDirectory 8.8 Administration Guide...
The following figure illustrates this tree: eDirectory masters only the data within the partition for OU=Sales. The data in the other areas are mastered on non-eDirectory DSAs. Luc configures LDAP Services to return superior referrals Configuring LDAP Services for Novell eDirectory 363...
Notice that entries are placed above OU=Sales, even though these entries are mastered by another DSA. This placement is necessary to provide the proper DNs for the entries mastered by the eDirectory server. To create a nonauthoritative area: 1 Segregate the nonauthoritative data from the authoritative data. 364 Novell eDirectory 8.8 Administration Guide...
If no reference information is found after exhausting all entries, the LDAP server returns the superior reference. (This reference is held in the default referral setting on the LDAP Group or LDAP Server object.) Configuring LDAP Services for Novell eDirectory 365...
NOTE: The superior reference feature is only available through LDAP. Other protocols (for example, NDAP) are not affected by the presence of the authoritative attribute. Therefore, the use of ConsoleOne or Novell iManager to interrogate and update data in the nonauthoritative area is unhindered.
13.10 Persistent Search: Configuring for eDirectory Events Novell eDirectory has an event service that enables applications to be notified of significant events that occur within the Directory. Some of these events are general events that can pertain to any Directory service. Other events are specific to eDirectory and its special features.
Understanding and Using Persistent Search in Novell eDirectory (http:// developer.novell.com/research/appnotes/2003/february/04/a030204.htm). 13.10.1 Managing Persistent Searches You can use Novell iManager to view or edit persistent searches. 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Administration > Modify Object.
8 Click Apply, then click OK. 13.10.2 Controlling Use of the Monitor Events Extended Operation 1 In Novell iManager, click the Roles and Tasks button 2 Click LDAP > LDAP Overview. 3 Click View LDAP Servers, then click the name of an LDAP server.
The directory server name and the directory tree dsaName: cn=WestWindNDS,o=westwind name. directoryTreeName: t=WESTWINDTREE Supported SASL mechanisms. supported SASLMechanisms: EXTERNAL supported SASLMechanisms: DIGEST-MD5 supported SASLMechanisms: NMAS LOGIN Which version of LDAP Server is supported. supportedLDAPVersion: 2 supportedLDAPVersion: 3 370 Novell eDirectory 8.8 Administration Guide...
Page 370
Henri reads rootDSE and finds supportedExtension: 2.16.840.1.113719.1.27.100.7 in the list. Henri knows that the server supports the call to create a new replica. Also, Novell iManager checks to see what functionality is available in rootDSE and then behaves according to that information.
Replacing a Server,” on page 512. • Works within the distributed nature of eDirectory. You can ensure that a restored server matches the synchronization state that other servers in the tree expect by turning on continuous roll-forward logging. Backing Up and Restoring Novell eDirectory...
Section 14.3, “Using Roll-Forward Logs,” on page 389 • Section 14.4, “Preparing for a Restore,” on page 393 • Section 14.5, “Using Novell iManager for Backup and Restore,” on page 396 • Section 14.6, “Using the eMBox Client for Backup and Restore,” on page 404 •...
Page 374
Do a cold backup before upgrading a server, as described in Section 16.6, “Upgrading Hardware or Replacing a Server,” on page 512. For multiple-server trees, ensure that all eDirectory partitions are replicated on more than one server, for fault tolerance. Backing Up and Restoring Novell eDirectory 375...
“Transitive Vectors and the Restore Verification Process” on page 387 • “Restore Verification Is Backward Compatible Only with eDirectory 8.5 or Later” on page 388 • “Preserving Rights When Restoring File System Data on NetWare” on page 388 376 Novell eDirectory 8.8 Administration Guide...
378. The new eDirectory backup tool must be used in conjunction with file system backups to put the eDirectory backup files safely on tape. Novell has partnered with several leading providers of backup solutions. For a list, see NetWare Partner Products: Backup, Restore, & Recovery (http:// www.novell.com/partnerguide/p100004.html).
Backup of server-specific information has been implemented using the Backup eMTool. See Section 14.8, “Changes to Server-Specific Information Backup (NetWare Only),” on page 423. For more comparison information, see the following table. 378 Novell eDirectory 8.8 Administration Guide...
Page 378
Roll-forward logging is off by default. For more information, see Section 14.3, “Using Roll- Forward Logs,” on page 389. Backing Up and Restoring Novell eDirectory 379...
Page 381
If the backup spans multiple files, then the header for each file will show the filename including a number appended to show its order in the set. For an example of the filenames in a set of backup files, see file_size. 382 Novell eDirectory 8.8 Administration Guide...
Page 383
</file> <file size=”4228” name=”C:\WINNT\system32\novell\nici\system\Xmgrcfg.ks2” encoding=”base64” type=”nici”>the data is included here </file> <file size=”168” name=”C:\WINNT\system32\novell\nici\system\Xmgrcfg.ks3” encoding=”base64” type=”nici”>the data is included here </file> <file size=”1414” name=”C:\WINNT\system32\novell\nici\xmgrcfg.wks” encoding=”base64” type=”nici”>the data is included here </file> </backup> 384 Novell eDirectory 8.8 Administration Guide...
So, for disaster recovery planning it's best to not have the same partition replicated on more than one DSMASTER server. For general information on replicas, see Section 1.6, “Replicas,” on page 386 Novell eDirectory 8.8 Administration Guide...
425. If a disaster occurs in which you lose many servers but not all, the issues with replicas will probably be complex, and you should contact Novell Support. 14.2.7 Transitive Vectors and the Restore Verification Process A transitive vector is a time stamp for a replica. It is made up of a representation of the number of seconds since a common specific point in history (January 1, 1970), the replica number, and the current event number.
If an object which is a trustee does not exist in the eDirectory database (such as in a new installation before eDirectory has been restored), it's possible that rights assignments for that object might be removed from the file system. 388 Novell eDirectory 8.8 Administration Guide...
(consuming only a small amount of disk space), and the history of changes to the eDirectory database is not being saved. Backing Up and Restoring Novell eDirectory 389...
• Document the location of the roll-forward logs. For more information, see “Location of the Roll-Forward Logs” on page 391. • Monitor the available disk space where the logs are located. For more information, see “Backing Up and Removing Roll-Forward Logs” on page 392. 390 Novell eDirectory 8.8 Administration Guide...
The logs should not be placed on volume sys: because that is the same volume where the eDirectory database is located. Backing Up and Restoring Novell eDirectory 391...
• The last directory in the path is created by eDirectory. It is based on the name of the current eDirectory database. For example, if the location you specified was d:\Novell\NDS\DIBFiles and your eDirectory database was currently named NDS, the location of the roll-forward logs would be d:\Novell\NDS\DIBFiles\nds.rfl.
“Prerequisites for Restoring” on page 394. If you are not sure how to gather the right backup files, “Locating the Right Backup Files for a Restore” on page 395. Backing Up and Restoring Novell eDirectory 393...
You must do this before you remove the Server object or any associated objects from the tree. XBrowse and additional information is available from the Novell Support Web site, Solution 2960653 (http://support.novell.com/servlet/tidfinder/ 2960653). You have installed eDirectory, in a new temporary tree.
WARNING: When opening a backup file, just view the header—make sure you don't try to save or modify the file, or it might become truncated. Most applications can't save the binary data correctly. Backing Up and Restoring Novell eDirectory 395...
The Backup, Backup Configuration, and Restore tasks in Novell iManager give you access to most of the features of the eDirectory Backup eMTool, and iManager lets you perform tasks on your servers in a browser even if you are outside the firewall. For more information about Novell iManager, see the Novell iManager 2.5 Administration Guide (http://www.novell.com/...
389. For how to turn them on, see “Configuring Roll-Forward Logs with iManager” on page 399. For multiple-server trees, you should upgrade all the servers that share replicas with this server to eDirectory 8.5 or later. Backing Up and Restoring Novell eDirectory 397...
Page 397
To back up only the changes made to the database since the last backup was performed, click Do an Incremental Backup. The following is an example of the screen. 6 Specify additional files to back up. 398 Novell eDirectory 8.8 Administration Guide...
• Determine the current and last unused roll-forward log • Turn stream file logging on or off for the roll-forward logs For more information about roll-forward logs, see Section 14.3, “Using Roll-Forward Logs,” on page 389. Backing Up and Restoring Novell eDirectory 399...
Page 399
We recommend you periodically back up and remove unused roll-forward logs from your server. See “Backing Up and Removing Roll-Forward Logs” on page 392. The following is an example of the screen. 400 Novell eDirectory 8.8 Administration Guide...
5 Specify a username, password, and context for the server where you want to perform the restore, then click Next. 6 Specify the name of the backup and log files you want to use, then click Next. Backing Up and Restoring Novell eDirectory 401...
Page 401
If you are restoring roll-forward logs, make sure you include the full path to the logs, including the directory that is automatically created by eDirectory, usually named \nds.rfl. (For more information about this directory, see “Location of the Roll-Forward Logs” on page 391.) 402 Novell eDirectory 8.8 Administration Guide...
Page 402
The new full backup is necessary so that you are prepared for any failures that might occur before the next unattended full backup is scheduled to take place. Backing Up and Restoring Novell eDirectory 403...
Using the eMBox Client, you can do tasks such as the following: • Do a full or incremental backup while the database is open (hot continuous backup) 404 Novell eDirectory 8.8 Administration Guide...
Page 404
You can also use a third-party file compression tool on the files after they are created. They compress approximately 80%. Review the description of the command line options in “Backup and Restore Command Line Options” on page 415. Backing Up and Restoring Novell eDirectory 405...
Page 405
This command specifies that other files should be backed up along with the database: • The files listed in an include file (-u c:\backups\myincludefile.txt) that was created beforehand by the administrator. • Stream files (-t) 406 Novell eDirectory 8.8 Administration Guide...
NOTE: On NetWare, you can use third-party scheduling software, or cron.nlm (http:// support.novell.com/servlet/tidfinder/2939440), available from the Novell Support Web site. Make sure the eMBoxClient.jar file is on the machine you want to initiate the backup from. The file is installed on your server as part of eDirectory. You can copy it from there and run it on any machine with Sun JVM 1.3.1.
Page 407
2 Run the batch files unattended, according to the instructions in your operating system or third- party documentation. 3 Make sure you schedule file system backups shortly after eDirectory backups, to place the eDirectory backup files safely on tape. The Backup eMTool only places them on the server. 408 Novell eDirectory 8.8 Administration Guide...
Page 408
• A nonsecure port is used in this example (-p 8008), so a nonsecure connection is specified (-n). Example Batch File for Windows java -cp c:\novell\nds\embox\eMBoxClient.jar embox -s myserver -p 8008 -u admin.myorg -w mypassword -n -t backup.backup -b -f...
• Turn stream file logging on or off for the roll-forward logs For information about roll-forward logging, see Section 14.3, “Using Roll-Forward Logs,” on page 389. Prerequisites Make sure the eMBoxClient.jar file is on the machine you want to initiate the configuration changes from. 410 Novell eDirectory 8.8 Administration Guide...
Page 410
Last roll forward log not used 00000000.log Current roll forward log 00000001.log *** END *** 4 Change the settings using the setconfig command, following this general pattern: setconfig [-L|-l] [-T|-t] -r path_to_roll-forward_logs -n minimum_file_size -m maximum_file_size Backing Up and Restoring Novell eDirectory 411...
For example, if the restore is necessary because of a failed storage device, you need to do a new installation of eDirectory on the new storage device. If you are restoring a failed server onto a 412 Novell eDirectory 8.8 Administration Guide...
Page 412
-r switch to restore the eDirectory database itself; otherwise only the other kinds of files will be restored. If you want the database to be active and open when the restore is complete, make sure you specify -a and -o. Backing Up and Restoring Novell eDirectory 413...
Page 413
Forward Logs,” on page 389. Your restore should now be complete, and NICI reinitialized with the restored NICI files so you can access encrypted information. If you use roll-forward logging, you have prepared for any failures in 414 Novell eDirectory 8.8 Administration Guide...
Performs an incremental backup of the eDirectory database. This will back up any changes made to the database since the last full or incremental backup. (Optional) Back up stream files Includes the stream files when backing up the eDirectory database. Backing Up and Restoring Novell eDirectory 415...
Page 415
381.) WARNING: When opening a backup file, just view the header—make sure you don't try to save or modify the file, or it might become truncated. Most applications can't save the binary data correctly. 416 Novell eDirectory 8.8 Administration Guide...
Page 416
TIP: The backup files can also be made much smaller using a third-party file compression tool. They compress approximately 80%. Backing Up and Restoring Novell eDirectory 417...
Page 417
For example, restore -f vol1:/backup/ndsbak.bak will restore from the file vol1:/backup/ndsbak.bak. If the backup was made up of more than one file, all the files in the set must be copied into the same directory on the server. 418 Novell eDirectory 8.8 Administration Guide...
Page 418
If the restore verification fails, this option opens the database that was on the machine before the restore was performed. (For an overview of the process, see “Overview of How the Backup eMTool Does a Restore” on page 380.) Backing Up and Restoring Novell eDirectory 419...
Page 419
Renames the database from RST to NDS without trying to verify. IMPORTANT: We do not recommend using this option unless suggested by Novell Support. (Optional) Remove lockout on database Removes the lockout on the NDS database. getconfig Retrieves the current roll-forward log configuration. 420 Novell eDirectory 8.8 Administration Guide...
Page 420
If the logs are turned off unintentionally, you need to turn them back on and then do a new backup of the database to ensure that you can make a full recovery. For more information, see Section 14.3, “Using Roll-Forward Logs,” on page 389. Backing Up and Restoring Novell eDirectory 421...
Page 421
Sets the maximum size for the roll-forward log files (in bytes). If this limit is reached and a transaction is in progress, the transaction is continued over into the next file. This setting must always be larger than the minimum size. 422 Novell eDirectory 8.8 Administration Guide...
Instead, the database changes were supported in a new “hot backup” facility provided by the Backup eMTool in Novell iManager or by the eMBox client. Support for backup of server- specific information using filesystem TSA was not included at that time. In eDirectory 8.7.3, this is now supported using the hot backup functionality.
Page 423
To restore a backup of server-specific information (SSI) using filesystem TSA: • Do not delete the volume or server objects associated with the downed server. • Call Novell Support for detailed instructions. 5.1 & 6.0 Back up and restore only using the Backup eMtool.
If the restore is complete on a second try, the verification can succeed and the restored database will open. Backing Up and Restoring Novell eDirectory 425...
• NetWare and Windows: Use the -a switch. • UNIX: Use the -Ad switch. For more information on how to run DSRepair with advanced options using the -a or -Ad switches, see Section 10.9, “Advanced DSRepair Options,” on page 269. 426 Novell eDirectory 8.8 Administration Guide...
To remove replicas using DSRepair, and re-add them using replication: 1 Make sure you have completed “Cleaning Up the Replica Ring” on page 426. 2 Override the restore on the server using the advanced restore option in the eMBox Client. Backing Up and Restoring Novell eDirectory 427...
Page 427
DSRepair. • NetWare: Enter dsrepair -XK2 -rd • Windows: Click Start > Settings > Control Panel > Novell eDirectory Services. Select dsrepair.dlm. In the Startup Parameters field, type -XK2 -rd. Click Start. • UNIX: Enter ndsrepair -R -Ad -xk2 The -rd or -R switch repairs the local database and the replica.
It's server-centric and it's fast. After upgrading her Windows server from eDirectory 8.6.2 to eDirectory 8.7.3, Indira sets up unattended backups for her server using batch files to run the Backup eMTool. Backing Up and Restoring Novell eDirectory 429...
He monitors the free space and rights on those storage devices to make sure the roll- forward logs don't fill up the storage device. Occasionally he backs up the roll-forward logs to tape and removes all except the one in use by eDirectory, to free up space. 430 Novell eDirectory 8.8 Administration Guide...
Page 430
9. He copies the incremental backups for Monday, Tuesday, and Wednesday nights into the directory. Each of them is named backupincr.bk, so when he copies them into the directory he changes the filenames to backupincr.mon.bk Backing Up and Restoring Novell eDirectory 431...
Saturday night and incremental backups nightly, running the eDirectory backup shortly before the file system backup to tape. All of the servers are participating in replica rings. Bob uses roll-forward logging for all the servers. 432 Novell eDirectory 8.8 Administration Guide...
He is not sure which servers to restore eDirectory on first or how to address inconsistencies between replicas. Because of the complex issues involved, he calls Novell Support for help in deciding how to restore.
Page 433
• Activating the restored database, but keeping it locked, using advanced restore options • Using DSREPAIR to change all the replica information to external references. • Unlocking the restored database. 434 Novell eDirectory 8.8 Administration Guide...
14.11 Backing Up and Restoring NICI Novell International Cryptography Infrastructure (NICI) stores keys and user data in the file system and in system and user specific directories and files. These directories and files are protected by setting the proper permissions on them using the mechanism provided by the operating system.
14.11.1 UNIX In NICI 2.6.5 and earlier, the /var/novell/nici directory contains all the system and user directories and files. In NICI 2.7.0 and later, /var/novell/nici is a symbolic link to the / var/opt/novell/nici directory that contains the files. To determine the version of NICI you are using, see the /etc/nici.cfg file.
1 If NICI is already installed on the system, take a backup of the existing set up as outlined above. 2 Uninstall NICI and remove the /var/novell/nici or /var/opt/novell/nici directory structure. This is to make sure that the existing system keys do not conflict with the restored set.
In that case, be sure to adjust the access rights based on the new owner of the user configuration directories. The individual directories are named 438 Novell eDirectory 8.8 Administration Guide...
Page 438
In that case, backup and restore is only necessary for those specific users who are permanent. The default path will be user the Application Data\Novell\Nici directory branch of the user’s directory in Documents and Settings. Backing Up and Restoring Novell eDirectory 439...
NMS, IBM* NetView, or Sun* Net Manager. The managed devices includes hosts, routers, bridges, and hubs and also network applications like Novell eDirectory This section describes SNMP services for Novell eDirectory 8.8. It contains the following topics: • Section 15.1, “Definitions and Terminology for SNMP,” on page 441 •...
• Monitors one or more network management applications (NMA) simultaneously; it has facilities to graphically show information about managed devices, table viewing, and logging. • Allows you to compile the MIB file using the MIB compiler present in the NMS. 442 Novell eDirectory 8.8 Administration Guide...
Page 442
For more information about SNMP, refer to the following Web sites: • NET-SNMP Home Page (http://net-snmp.sourceforge.net) • SNMP FAQ (http://www.faqs.org/faqs/snmp-faq/part1) • RFC 1157 (http://www.ietf.org/rfc/rfc1157.txt) • SNMPLink (http://www.snmplink.org) • SNMPInfo (http://www.snmpinfo.com) • SNMP RFC Standard MIBs and Informative Links (http://www.wtcs.org/snmp4tpc/ snmp_rfc.htm) • RFC 2605 (http://ietf.org/rfc/rfc2605.txt?number=2605) SNMP Support for Novell eDirectory 443...
• The Protocol Statistics Table - ndsProtoIfOpsTable: Provides summary statistics on the accesses, operations, and errors for each application protocol interface of a directory server. 444 Novell eDirectory 8.8 Administration Guide...
Page 444
-h <hostname or IP address> DNS host name or IP address Example: rundll32 snmpinst, snmpinst -c createobj -a admin.mycontext -p mypassword -h 160.98.146.26 To delete an SNMP group object, enter the following command: SNMP Support for Novell eDirectory 445...
Page 445
Refer to the table above for more details. Example: SNMPINST -d admin.mycontext.treename mypassword myserver On Linux and UNIX To create an SNMP group object, enter the following command: ndsconfig add -m <modulename> -a <userFDN> Example: ndsconfig add -m snmp -a admin.mycontext 446 Novell eDirectory 8.8 Administration Guide...
“Dynamic Configuration” on page 449. A new object called SNMP Group-Object is added to the directory tree when eDirectory is installed. This object is used to set up and manage the Novell eDirectory SNMP traps. See “SNMP Group Object” on page 445 for more information.
Server Command Linux, Solaris, AIX, and HP-UX In the DHOST remote management page, to unload the SNMP trap server, click the SNMP Trap Server for Novell eDirectory 8.8 action icon to stop. At the prompt, enter /opt/novell/eDirectory/bin/ndssnmp 15.4.2 Subagent Configuration •...
Page 448
475. iManager Plug-In Traps can also be configured using Novell iManager. Novell iManager is a browser-based tool used for administering, managing, and configuring eDirectory objects. Novell iManager gives you the ability to assign specific tasks or responsibilities to users and to present the user with only the tools (with the accompanying rights) necessary to perform those sets of tasks.
Loading the Subagent 1 To load the subagent, enter dssnmpsa at the command prompt. A dialog box is displayed with the Login and Exit options. 2 Select Login to proceed or Exit to discontinue. 450 Novell eDirectory 8.8 Administration Guide...
Page 450
1 To start the master agent, do the following: Click Start > Settings > Control Panel > Administrative Tools > Services > SNMP > Start. 2 Enter the following at the command prompt: Net start SNMP SNMP Support for Novell eDirectory 451...
Page 451
/etc directory on other Linux platforms. Snmpd.conf Changes In the snmpd.conf file, enter the hostname trapsink myserver public Where, myserver is the hostname for the trap destination. In the snmpd.conf file, add the following line: 452 Novell eDirectory 8.8 Administration Guide...
Page 452
“Issues While Starting the Subagent” on page 456. Enter the username and password when prompted. Upon successful authentication, the following message is displayed if INTERACTION = ON in the /etc/opt/novell/eDirectory/ conf/ndssnmp/ndssnmp.cfg file: Do you want to remember password? (Y/N) Enter Y to remember the password. When you start the subagent the next time, you are not prompted for the password.
Page 453
4 Start the master agent as follows: # /home/ndssnmp/usr/sbin/snmpd -C -c snmpd.conf For example, if your snmpd.conf file is present in the /etc directory, the command would be similar to the following: # /home/ndssnmp/usr/sbin/snmpd -C -c /etc/snmpd.conf 454 Novell eDirectory 8.8 Administration Guide...
Page 454
“Issues While Starting the Subagent” on page 456. Enter the username and password when prompted. Upon successful authentication, the following message is displayed if INTERACTION = ON in the /etc/opt/novell/eDirectory/ conf/ndssnmp/ndssnmp.cfg file: Do you want to remember password? (Y/N) SNMP Support for Novell eDirectory 455...
Page 455
= 1-117, 2001, 2002 } where trap-community is the community name used in traps, myserver is the trap destination host name, Novell eDirectory is the enterprise MIB, and trap-num is the trap range. 456 Novell eDirectory 8.8 Administration Guide...
Page 456
To start the subagent, execute the following command: /etc/init.d/ndssnmpsa start Enter the username and password when prompted. Upon successful authentication, the following message is displayed if INTERACTION = ON in the /etc/opt/novell/eDirectory/ conf/ndssnmp/ndssnmp.cfg file: Do you want to remember password? (Y/N) Enter Y to remember the password.
Page 457
To start the subagent, execute the following command: /etc/ndssnmpsa start Enter the username and password when prompted. Upon successful authentication, the following message is displayed if INTERACTION= ON in the /etc/opt/novell/eDirectory/ conf/ndssnmp/ndssnmp.cfgfile: Do you want to remember password? (Y/N) Enter Y to remember the password. When you start the subagent the next time, you are not prompted for the password.
Page 458
SNMP Subagent (ndssnmpsa) Starting the HP-UX SNMP Master Agent To start the HP-UX SNMP master agent, execute the following command: /etc/snmpd /usr/sbin/snmpdm NOTE: To stop the HP-UX SNMP master agent, enter /etc/snmpd -k SNMP Support for Novell eDirectory 459...
Page 459
NOTE: Because the NET-SNMP-5.0.8 binary download does not come with a sample master agent configuration file, the NET-SNMP sample master agent configuration file is bundled with the eDirectory SNMP component. After eDirectory is installed, you can get the sample NET-SNMP 460 Novell eDirectory 8.8 Administration Guide...
To start the subagent, execute the following command: /sbin/init.d/ndssnmpsa start Enter the username and password when prompted. Upon successful authentication, the following message is displayed if INTERACTION = ON in the /etc/opt/novell/eDirectory/ conf/ndssnmp/ndssnmp.cfg file: Do you want to remember password? (Y/N) Enter Y to remember the password.
Page 461
NOTE: If the return value is NULL, you might have to access the directory over a secure channel. For more information, refer to “Accessing the Encrypted Attributes” on page 475 ndsCloseStream A stream attribute is modified. 462 Novell eDirectory 8.8 Administration Guide...
Page 462
A container and its subordinate object are moved. Example: When a partition is moved to a different context using LDAP tools, ICE, ConsoleOne, or iManager. ndsNoReplicaPointer A replica has no replica pointer associated with it. ndsSyncInEnd Inbound synchronization is completed. SNMP Support for Novell eDirectory 463...
Page 463
Run dstrace and Set ndstrace=*j. ndsLimberDone The limber operation is completed. Example: Configure dstrace to start limber after a particular interval of time. ndsPartitionSplitDone The split partition operation is completed. Example: Create a partition using ConsoleOne or iManager. 464 Novell eDirectory 8.8 Administration Guide...
Page 464
Joining of partitions is completed. Example: Using ConsoleOne or iManager, create a partition and merge the partition. ndsPartitionLocked A partition gets locked (for example, before merging the partitions). Example: Using ConsoleOne or iManager, create a partition. SNMP Support for Novell eDirectory 465...
Page 465
Use ldapmodrdn or ldapsdk to rename the server. ndsSyntheticTime Objects are created with future time stamps. To synchronize eDirectory servers, synthetic time might be invoked. Example: Add a secondary server to the tree using ndsconfig. 466 Novell eDirectory 8.8 Administration Guide...
Page 466
Change the password of a user object using ldapmodify. ndsLogout eDirectory is logged out of. Example: Detach the connection to the tree from Novell Client. ndsAddReplica A replica is added to a server partition. Example: Add a new replica to the tree using ndsconfig.
Page 467
Back up Directory objects using the dsbackup utility (ndsbackup on Linux and UNIX, NDSCons on Windows). ndsRestoreEntry An entry is restored. Example: Restore the backed-up Directory objects using the dsbackup utility (ndsbackup on Linux and UNIX, NDSCons on Windows). 468 Novell eDirectory 8.8 Administration Guide...
Page 468
Attribute values are compared. Example: Compare an attribute value against any object.Perform an LDAP search operation against a User object to check if its telephone number is the same as the input value. SNMP Support for Novell eDirectory 469...
Page 469
A Mutate Entry operation is performed on an entry. Example: Mutate a bindery object class to User object class. ndsMergeEntries Two entries are merged. Example: Merge two User objects. Merge Entry2 (ndsEntryName2) into Entry (ndsEntryName). 470 Novell eDirectory 8.8 Administration Guide...
Page 470
Delete a user from one of the servers; the other replica is updated for the delete operation. ndsSyncPartition A Synchronize Partition operation is performed on a partition replica. Example: Delete a user from one of the partitions. The sync can be observed using ndstrace. SNMP Support for Novell eDirectory 471...
Page 471
Add a new class using ConsoleOne > Wizard > Schema, LDAP tools, or ndssch. ndsEndUpdateSchema An End Update Schema operation is performed. Example: Add a new class using ConsoleOne > Wizard > Schema, LDAP tools, or ndssch. 472 Novell eDirectory 8.8 Administration Guide...
Page 472
Change the security equivalent of any user and make it equal to admin using ConsoleOne or iManager. ndsRemoveEntry An entry is removed from eDirectory. Example: Delete any user using ConsoleOne or iManager. ndsCRCFailure A CRC failure occurs when fragmented NCP requests are being reconstructed. SNMP Support for Novell eDirectory 473...
Page 473
Disable the Account Disable attribute using LDAP tools, ICE, ConsoleOne, or iManager. ndsDetectIntruder A user account is locked out because of intruder detection. Example: Locked by Intruder attribute using LDAP tools, ICE, ConsoleOne, or iManager. 474 Novell eDirectory 8.8 Administration Guide...
-6089, indicating that you need a secure channel to get the encrypted attributes value. Following are the traps which will have the value data as NULL: • ndsAddValue • ndsDeleteValue • ndsDeleteAttribute 15.5.2 Configuring Traps The method of configuring traps differs from platform to platform. SNMP Support for Novell eDirectory 475...
Page 475
To disable all traps except 10, 11, and 100: dssnmpsa "DISABLE ID != 10, 11, 100" To disable all traps in the range 20 to 30: dssnmpsa "DISABLE 20-29" To disable all traps: dssnmpsa "DISABLE ALL" 476 Novell eDirectory 8.8 Administration Guide...
Page 476
If the time interval is out of range, then the default time interval is considered. dssnmpsa "DEFAULT INTERVAL" If the time interval is set to zero, all the To set the default time interval: traps are sent. dssnmpsa "DEFAULT INTERVAL = 10" SNMP Support for Novell eDirectory 477...
Page 477
To list all traps except selected traps such as 12, 224, and 300 along with trap names: dssnmpsa LIST ID != 12,224,300 To list all traps that have been enabled for failure with trap names: dssnmpsa LIST FAILED 478 Novell eDirectory 8.8 Administration Guide...
Page 478
Usage: ndssnmpcfg -h [hostname[:port]] -p password -a userFDN -c command Parameter Description DNS host name or IP address userFDN password for authentication SNMP Support for Novell eDirectory 479...
Page 479
To enable all traps except 10, 11, and 100: ndssnmpcfg "ENABLE ID != 10, 11, 100" To enable all traps in the range 20 to 30: ndssnmpcfg "ENABLE 20-29" To enable all traps: ndssnmpcfg "ENABLE ALL" 480 Novell eDirectory 8.8 Administration Guide...
Page 480
To list all traps except selected traps like 12, 224, and 300 along with trap names: ndssnmpcfg LIST ID != 12,224,300 To list all traps which have been enabled for failure with trap names: ndssnmpcfg LIST FAILED SNMP Support for Novell eDirectory 481...
Page 481
Usage: ndssnmpconfig -h [hostname[:port]] -p password -a userFDN -c command Parameter Description DNS host name or IP address userFDN password for authentication 482 Novell eDirectory 8.8 Administration Guide...
Page 482
To enable all traps except 10, 11, and 100: ndssnmpconfig "ENABLE ID != 10, 11, 100" To enable all traps in the range 20 to 30: ndssnmpconfig "ENABLE 20-29" To enable all traps: ndssnmpconfig "ENABLE ALL" SNMP Support for Novell eDirectory 483...
Page 483
To list all traps except selected traps like 12, 224, and 300 along with trap names: ndssnmpconfig LIST ID != 12,224,300 To list all traps that have been enabled for failure with trap names: ndssnmpconfig LIST FAILED 484 Novell eDirectory 8.8 Administration Guide...
"FAILURE ID != 24,30" To set failure for all traps: ndssnmpconfig "FAILURE ALL" 15.5.3 Statistics • “ndsDbCache” on page 486 • “ndsDbConfig” on page 486 • “ndsProtoIfOps” on page 487 • “ndsServerInt” on page 488 SNMP Support for Novell eDirectory 485...
Page 485
Managed Objects in Directory Description ndsDbCfgSrvApplIndex An index to uniquely identify the eDirectory Server Application. ndsDbCfgDynamicCacheAdjust Information on whether Dynamic Cache Adjust is on or off. 0 = off 1 = on 486 Novell eDirectory 8.8 Administration Guide...
Page 486
Number of bind requests that have been rejected due to inappropriate authentication or invalid credentials. ndsProtoIfInOps Number of requests received from DUAs or other eDirectory servers. ndsProtoIfReadOps Number of read requests received. ndsProtoIfCompareOps Number of compare requests received. SNMP Support for Novell eDirectory 487...
Page 487
Managed Objects in Directory Description ndsSrvIntSrvApplIndex An index to uniquely identify an eDirectory server application. ndsSrvIntProtoIfIndex An index to uniquely identify an entry corresponding to an eDirectory server protocol interface. 488 Novell eDirectory 8.8 Administration Guide...
Maintaining Novell eDirectory ® For Novell eDirectory to perform optimally, you need to maintain the directory through routine health check procedures and upgrading or replacing hardware when necessary. This chapter covers the following maintenance topics: Performance • Section 16.1, “Improving eDirectory Performance,” on page 491 •...
If the minimum and maximum threshold limits are not compatible, the minimum threshold limit is followed. For example, you could specify the following settings: Minimum threshold: 8 MB Percentage of available physical memory to use: Maximum threshold: Keep 10 MB available 492 Novell eDirectory 8.8 Administration Guide...
Page 492
Configuring Dynamically Adjusting and Hard Memory Limits You can configure dynamically adjusting and hard memory limits in either of the following methods: • “Using Novell iMonitor” on page 493 • “Using the _ndsdb.ini File” on page 495 Using Novell iMonitor...
Page 493
This interval applies only when Dynamic Adjust is set. It controls how often the cache size is adjusted, based on the specified percentage and constraints. Cache Cleanup Interval Controls how often unused old versions are removed from the cache. 494 Novell eDirectory 8.8 Administration Guide...
Page 494
• MIN:number_of_bytes Minimum number of bytes. • MAX:number_of_bytes Maximum number of bytes. • LEAVE:number_of_bytes Minimum number of bytes to leave. 3 (Optional) To specify the dynamic adjusting limit interval, add the following line: cacheadjustinterval=number_of_seconds Maintaining Novell eDirectory 495...
How to Configure and Optimize eDirectory LDAP Servers (http:/ /developer.novell.com/research/appnotes/2000/septembe/04/a000904.htm). Managing the Memory eDirectory uses memory for the database cache and for directory usage. These are separate allocated memory pools. The directory engine uses memory from available memory pools in the operating 496 Novell eDirectory 8.8 Administration Guide...
Page 496
Splits the cache between the block and record cache. If a hard limit is specified and the administrator wants to define the database cache to use a percentage of the memory, the administrator can select between a percentage of total memory or a Maintaining Novell eDirectory 497...
“Tuning the Solaris OS for Novell eDirectory” on page 502 16.2.1 Fine-Tuning the eDirectory Server Novell eDirectory on Linux and Solaris uses a dynamically adjusted thread pool to service client requests. The thread pool is self-adjusting and delivers optimum performance in most cases.
16.2.2 Optimizing eDirectory Cache Novell eDirectory uses persistent caching so that changes being made to a server are held in a vector. If the server crashes in the middle of changes, eDirectory will load faster and synchronize the changes in seconds when the server is brought back up.
Page 499
• “Manually Creating a .ini File” on page 500 • “Using Novell iMonitor” on page 500 Manually Creating a .ini File 1 Create a file called _ndsdb.ini in the same directory that the eDirectory database files (DIB set) are located (usually in /var/opt/novell/eDirectory/data/dib).
Page 500
By default, eDirectory uses dynamic cache. If you have sufficient RAM to increase the eDirectory cache size, you can increase the performance of eDirectory considerably for large databases by allocating more RAM to the eDirectory cache. Maintaining Novell eDirectory 501...
Specifies the minimum cache size in bytes. max:value Specifies the maximum cache size in bytes. According to the algorithm, the default setting for Novell eDirectory is the following: cache=dyn,%:51,min:16777216,max:0,leave:0 This indicates the following: • The minimum cache size is 16 MB.
Page 502
Adjusts the number of first transmission packets from 1 to 2. Fine-Tuning the Solaris File System Novell eDirectory performance on Solaris can be improved if the Solaris file system is adequately tuned, especially for bulk loading data into the directory. File system tuning for eDirectory is similar to tuning for a database.
16.3 Improving Bulkload Performance eDirectory 8.8 provides you with new options to increase the bulkload performance. The following are the tunable parameters for bulkload performance using the Novell Import Convert Export (ICE) utility. • Section 16.3.1, “eDirectory Cache Settings,” on page 504 •...
LDIF file or enables the use of forward references. “Enabling Forward References” in the Novell eDirectory 8.8 Troubleshooting Guide for more information. 16.3.3 Increasing the Number of Asynchronous Requests in This refers to the number of entries the ICE client can send to the LDAP server asynchronously before waiting for any result back from the server.
16.3.5 Disabling Schema Validation in ICE Use the -C and -n ICE command line options to disable schema validation at the ICE client as follows: ice -C -n -SLDIF -f LDIF_file -a -c -DLDAP -d cn=admin,o=novell -w password 16.3.6 Disabling ACL Templates You can disable the Access Control List (ACL) templates to increase the bulkload performance.
By default, the time out period for a client is 20 minutes (1200 seconds). But during bulkload, with the LBURP transaction size as high as 250, objects with large number of attributes with huge values 508 Novell eDirectory 8.8 Administration Guide...
For example, to export the LBURP_TIMEOUT variable with 1200 seconds, enter the following: export ICE_LBURP_TIMEOUT=1200 16.4 Keeping eDirectory Healthy The health of directory services is vital to any organization. Regular health checks using Novell iMonitor will keep your directory running smoothly and will make upgrades and troubleshooting much easier.
7 Click Run Report to process the report. Using the Assistant Frame 1 Access iMonitor. Section 7.2, “Accessing iMonitor,” on page 187. 2 In the Assistant frame, click Agent Health. 510 Novell eDirectory 8.8 Administration Guide...
Servers that are suspect should also be evaluated. 16.4.4 For More Information The tools and techniques used to keep eDirectory healthy are documented in the Novell Certified Directory Engineer Course 991: Advanced eDirectory Tools and Diagnostics. In this course you learn how to •...
NetPro* (http://www.netpro.com) If you need to monitor or audit certain characteristics of eDirectory that our partners do not provide, Novell Consulting Services can help you use the Novell Event System for customized assessment and auditing. 16.6 Upgrading Hardware or Replacing a Server This section provides information about transferring or safeguarding eDirectory on a specific server when you upgrade or replace hardware.
Page 512
1. Bring up the server and eDirectory. disk partition/volume containing 2. Restore the file system only for the disk partitions/ eDirectory was not affected volumes that were on the storage devices you changed. 3. Unlock the eDirectory database. Maintaining Novell eDirectory 513...
Page 513
The new full backup is necessary so that you are prepared for any failures that might occur before the next unattended full backup is scheduled to take place. 514 Novell eDirectory 8.8 Administration Guide...
Page 514
• Re-create the hardware configuration you had before, because it was working before the change. • Transfer this server's identity to another machine using the file system and eDirectory backups you made. See “Planned Replacement of a Server” on page 516. Maintaining Novell eDirectory 515...
Run DSRepair on the database of Server A. Ensure that Server A is synchronized completely. Preparation for Server B Install the latest version of the operating system. This must be the same operating system as Server A. Install eDirectory, putting Server B in a new temporary tree. 516 Novell eDirectory 8.8 Administration Guide...
Page 516
To transfer Server A's eDirectory identity and file system to Server B: 1 Make sure you have completed “1. Preparing for a Server Replacement” on page 516 “2. Creating a Backup of eDirectory” on page 517. 2 Make sure Server B is up and eDirectory is running. Maintaining Novell eDirectory 517...
Page 517
1 Unplug Server B's network cable or down the server. 2 Reattach Server A to the network, start it, then open the eDirectory database. Ignore system messages requesting you to run DSRepair. 518 Novell eDirectory 8.8 Administration Guide...
NOTE: If you do not have backup files for the server, use the XBrowse tool to query eDirectory to help you recover server information. You must do this before you remove the Server object or any associated objects from the tree. XBrowse and additional information are available from Novell Support, Technical Information Document #2960653 (http://support.novell.com/servlet/tidfinder/...
DHost iConsole Manager DHost iConsole Manager is a Web-based browser administrative tool that lets you: • Manage DHost modules • Query for DHost configuration parameters • View DHost connection information • View thread pool statistics • View details about protocols registered with the DHost protocol stack manager DHost iConsole Manager Figure 17-1 DHost iConsole Manager can also be used as a diagnostic and debugging tool by letting you access...
17.2.1 Running DHost iConsole on NetWare On NetWare, you can access the DHost iConsole through NetWare Remote Manager. httpstk.nlm must be running on the eDirectory server in order for you to set or change the SAdmin password. 1 Open a Web browser. 2 In the address (URL) field, enter the following: http://server’s TCP/IP address:port For example:...
“Loading or Unloading Modules on Windows” on page 525 • “Loading or Unloading Modules on Linux, Solaris, AIX, and HP-UX” on page 525 For more information on using Novell iManager to load and unload eDirectory services, see Section 6.4, “eDirectory Service Manager,” on page 182.
17.3.2 Loading or Unloading Modules on Windows 1 Open a Web browser. 2 In the address (URL) field, enter the following: http://server.name:port/dhost for example: http://MyServer:80/dhost You can also use the server IP address to access the DHost iConsole. For example: http://137.65.135.150:80/dhost 3 Specify a username, context, and password.
Type Displays the type of value that can be set for the parameter. For more information, see “Configuration Parameters” in the Novell eDirectory 8.8 Installation Guide. 17.4.2 Viewing Protocol Information In the DHost iConsole Manager, click Transports. The following protocol information is displayed: •...
The process stack contains a list of all threads currently running in the DHost process space. You can get detailed information on a thread by clicking the thread ID. This feature is used mainly as a low- level debugging tool for Novell engineers and support personnel. This option is available only on Windows.
You can also use the server IP address to access the DHost iConsole. For example: http://137.65.135.150:80/dhost 3 Specify a username, context, and password. 4 Click HTTP Server, then specify an SAdmin password. 5 Verify the password you just specified, then click Submit. 528 Novell eDirectory 8.8 Administration Guide...
Use the DHOST remote manager page (accessible through the /dhost URL or from the root page) to set the SAdmin password. Novell eDirectory server must be running on the eDirectory server in order for you to set or change the SAdmin password.
Management Toolbox (eMBox) lets you access all of the eDirectory backend utilities remotely as well as on the server. eMBox works with Novell iManager to provide Web-based access to eDirectory utilities such as DSRepair, DSMerge, Backup and Restore, and Service Manager.
Client” on page 533.) You must have access behind the firewall to use the eMBox command line client for the servers you want to manage—so if you are remote, you'll need VPN access. 532 Novell eDirectory 8.8 Administration Guide...
Page 532
• Copy the eMBoxClient.jar file from an eDirectory server to your machine. • NetWare: sys:\system\embox\eMBoxClient.jar • Windows: \novell\nds\embox\eMBoxClient.jar • Linux and UNIX: /opt/novell/eDirectory/lib/nds-modules/embox/ eMBoxClient.jar • Make sure the machine has Sun JVM 1.3.1 installed. • Make sure you have access behind the firewall to use the eMBox command line client for the servers you want to manage.
Page 533
Sets the timeout to 100 seconds. The timeout setting specifies how long set -T 100 to wait for responses from the server. Uses mylog.txt as the log file and overwrites when opening it. set -l mylog.txt -o Default=append 534 Novell eDirectory 8.8 Administration Guide...
Page 534
Novell eDirectory Merge eMTool dsrepair Novell eDirectory Repair eMTool dsschema Novell eDirectory Schema Operations eMTool service Novell eDirectory Service Manager eMTool Use -r to force the refresh of the list. Use -t to list service details. Use -f to list just the command format.
To run the eMBox Client in batch mode using an eMBox Client internal batch file, you need to create a file which contains a group of eMBox commands you would run in the interactive mode. 536 Novell eDirectory 8.8 Administration Guide...
Page 536
An eMBox Client internal batch file lets you run all the commands in the batch file without your attention. You can perform multiple tasks with multiple eMBox tools on the same server without logging in and logging out again for each task. From one server, you can also perform tasks with multiple eMBox tools on multiple servers.
NOTE: On NetWare, you can use third-party scheduling software, or you can consider using CRON.NLM (http://support.novell.com/servlet/tidfinder/2939440), an unsupported tool available for download from Novell Technical Support. 18.1.4 eMBox Command Line Client Options Option Description...
Option Description -l log file Name of the log file. Overwrite the log file when opening it. -T timeout How long (in seconds) to wait for responses from the server. -L language List of comma-delimited acceptable languages in order of preference, such as en-US,de_DE.
Page 539
On Windows 1 Click Start > Settings > Control Panel. 2 Double-click the Novell eDirectory Services icon, then click the Transport tab. 3 Look up the secure or nonsecure port. • For the nonsecure port, click the plus sign next to HTTP.
“Using the eMBox Logger Command Line Client” on page 541 • “Using the eMBox Logger Feature in Novell iManager” on page 542 18.2.1 Using the eMBox Logger Command Line Client The following table lists the eMBox Logger command line client options:...
Clears the contents of the server log file. 18.2.2 Using the eMBox Logger Feature in Novell iManager 1 In Novell iManager, click the Roles and Tasks button 2 Click eDirectory Maintenance Utilities > Log Files. 3 Specify which server will perform the log file operation, then click Next.
Make sure that this is something you really want to do because this procedure has the potential to be a very time-consuming and laborious task. IMPORTANT: These instructions are complete for trees with Novell Certificate Server 2.21 and earlier, Novell Single Sign-on 2.x, and NMAS 2.x.
“Other Security-Specific Operations” on page 547 Novell Certificate Server If Novell Certificate Server (previously known as Public Key Infrastructure Services, or PKIS) has been installed on any server in the source tree, you should complete the following steps. NOTE: Depending on how the product was used, the objects and items referred to might or might not be present.
Page 544
Organizational CA in the source tree. Novell Single Sign-on If Novell Single Sign-on has been installed on any server in the source tree, you should delete all Novell Single Sign-on secrets for users in the source tree.
Page 545
If Novell Certificate Server 2.x or later, Novell Single Sign-on, NMAS, NetWare 5.1 or later, or eDirectory 8.5 or later has been installed on any server in the source tree, the Novell Security Domain Infrastructure (SDI) will be installed. If SDI has been installed, you should complete the following steps.
The easiest way to accomplish this is to install Novell Certificate Server 2.52 or later on all servers formerly in the source tree that held SDI keys (the sys:\system\nici\nicisdi.key file).
Page 547
User object. In order to issue a certificate for a server, Novell Certificate Server 2.52 or later must be installed. Novell Certificate Server 2.52 or later must be installed on the server that hosts the Organizational CA.
NOTE: For more information on the usage of utilities, see the utilities man pages. Command Description Usage nds-install Utility that installs Novell nds-install [-c component1 [-c eDirectory components. component2]...] [-h] [--help] [- i] [-j] [-u] Novell eDirectory Linux and UNIX Commands and Usage...
Page 549
{set <valuelist> | get [<paramlist>] | get help [<paramlist>]} ndscheck Utility that checks the health of the ndscheck [-h <hostname:port>] [- tree. a <admin FDN>] [-F <logfile name>] [--config-file <configuration file name and path>] --version 550 Novell eDirectory 8.8 Administration Guide...
This appendix provides information for network administrators on the proper configuration of ® OpenSLP for Novell eDirectory installations without the Novell Client • Section C.1, “Service Location Protocol,” on page 557 • Section C.2, “SLP Fundamentals,” on page 557 •...
In summary, everything hinges on the directory agent that a user agent finds for a given scope. C.2.1 Novell Service Location Providers The Novell version of SLP takes certain liberties with the SLP standard in order to provide a more robust service advertising environment, but it does so at the expense of some scalability.
4. Querying DHCP for network-configured DA addresses that match the specified scope (and adding new addresses to the cache). 5. Multicasting a DA discovery request on a well-known port (and adding new addresses to the cache). The specified scope is “default” if not specified. That is, if no scope is statically defined in the SLP configuration file, and no scope is specified in the query, then the scope used is the word “default”.
Page 559
“false.” Any other value is a number of seconds between discovery broadcasts. These options, when used properly, can ensure an appropriate use of network bandwidth for service advertising. In fact, the default settings are designed to optimize scalability on an average network. 560 Novell eDirectory 8.8 Administration Guide...
How Novell eDirectory Works with If a client asks a server to resolve a fully qualified name (for example, admin.novell.novell_inc) that ® does not exist in the Novell eDirectory tree, or if you use a standalone application such as Novell...
Page 561
Example AAAA novell_inc.provo.novell.com. IN AAAA 4321:0:1:2:3:4:567:89ab _ldap._tcp.novell_inc.provo.novell.com. SRV 0 0 389 server1.novell_inc.provo.novell.com SRV 10 0 389 server2.novell_inc.provo.novell.com For redundancy, or to specify multiple hosts (servers in the replica ring) to the A record, create more than one A record. eDirectory will look at all of them. For more information on A, AAAA, and SRV...
LDAP using a Kerberos ticket. You are not required to enter the eDirectory user password. The Kerberos ticket should be obtained by authenticating to a Kerberos server. For SASL-GSSAPI conceptual information, refer to the Novell eDirectory 8.8 What's New Guide (http://www.novell.com/documentation/edir88/index.html). NOTE: The SASL-GSSAPI mechanism works with eDirectory 8.7.1 or later.
6 Specify the location of the kerberosPlugin.npm file or click Browse to select it. The plug-in package is located at extracted_folder/<platform(Linux, Solaris)>/nmas/NmasMethods/ Novell/GSSAPI/plugins/, where extracted_folder is the directory where you extracted the edir88.zip file. If you have moved the kerberosPlugin.npm file to a different location, browse to the location and select it.
12b Select the container under which you want to create the Role Based services, then click Next. 13 Select the Novell Kerberos plug-in, assign a scope (treename or any desired container), then click Start to complete installing the iManager plug-in for Kerberos configuration.
Page 565
Specifies the trusted root certificate filename for the SSL bind. If you are using an SSL port, specify the -e option. For more information, refer to Section E.1.4, “Exporting the Trusted Root Certificate,” on page 567. 566 Novell eDirectory 8.8 Administration Guide...
SSL trusted root certificates of the LDAP server that you use for Kerberos administration to iManager. For information on configuring iManager with SSL/TLS connection to eDirectory, refer to the iManager 2.0 Administration Guide (http://www.novell.com/documentation/lg/imanager20/ index.html?page=/documentation/lg/imanager20/imanager20/data/am4ajce.html#bow4dv4). 2 Complete the following procedures in the order given: Extend the Kerberos Schema.
RFC 1510 (http://www.ietf.org/rfc/rfc1510.txt?number=1510). This section discusses the following: • “Creating a New Realm Object” on page 569 • “Editing a Realm Object” on page 569 • “Deleting a Realm Object” on page 570 568 Novell eDirectory 8.8 Administration Guide...
Page 568
Creating a New Realm Object The supported and the default encryption type is DES-CBC-CRC. 1 In iManager, click Kerberos Management > New Realm to open the New Realm page. 2 Specify a name for the Kerberos realm that is to be created. The realm name must be the same as the one that you want to configure this Login Method with and must conform to the RFC 1510 conventions.
To delete the unsupported encryption types for the service principal, execute the following command: kadmin> del_enctype ldap/MYHOST.MYDNSDOMAIN@MYREALM des-cbc- md4kadmin> del_enctype ldap/MYHOST.MYDNSDOMAIN@MYREALM des-cbc- md5kadmin> del_enctype ldap/MYHOST.MYDNSDOMAIN@MYREALM des3-cbc- sha1 where MYHOST.MYDNSDOMAIN is the host name and MYREALM is the Kerberos realm. 570 Novell eDirectory 8.8 Administration Guide...
Page 570
For example, if you are using an MIT KDC, execute the following command: kadmin: ktadd -k /directory_path/keytabfilename -e des-cbc- crc:normal ldap/server.novell.com@MITREALM For example, if you are using Microsoft KDC, create a user ldapMYHOST in Active Directory and then execute the following command: ktpass -princ ldap/MYHOST.MYDNSDOMAIN@MYREALM -mapuser ldapMYHOST -...
Page 571
5 Click OK again to confirm the delete operation or click Cancel to cancel the delete operation. To delete multiple principal objects: 1 In iManager, click Kerberos Management > Delete Principal to open the Delete Principal page. 2 Click Select Multiple Objects. 572 Novell eDirectory 8.8 Administration Guide...
Page 572
3 Specify the name of the principal objects that are to be deleted or use the Object Selector icon to select them. 4 Select the principal to be deleted. 5 Click OK. 6 Click OK again to confirm the delete operation or click Cancel to cancel the delete operation. To delete a principal using advanced selection: 1 In iManager, click Kerberos Management >...
-Y GSSAPI -h 164.99.146.48 -b "" -s base E.6 Error Messages The SASL-GSSAPI error messages are logged into the following locations: • Linux and UNIX: ndsd.log • NetWare: logger screen • Windows: c:\temp\saslgss.log 574 Novell eDirectory 8.8 Administration Guide...
Page 574
For more information, refer to “Error Messages” in the eDirectory 8.8 Troubleshooting Guide (http:/ /www.novell.com/documentation/edir88/index.html). Configuring GSSAPI with eDirectory 575...
Need help?
Do you have a question about the EDIRECTORY 8.8 - ADMINISTRATION and is the answer not in the manual?
Questions and answers