dsconfigldap(1) General Commands Manual dsconfigldap(1)

dsconfigldapLDAP server configuration/binding add/remove tool.

dsconfigldap [-fvixsgmeSN] -a servername [-n configname] [-c computerid] [-u username] [-p password] [-l username] [-q password]


dsconfigldap [-fviSN] -r servername [-u username] [-p password] [-l username] [-q password]

options:

force authenticated binding/unbinding
verbose logging to stdout
prompt for passwords as required
choose SSL connection
enforce secure authentication only
enforce packet signing security policy
enforce man-in-middle security policy
enforce encryption security policy
do not update search policies
do not prompt about adding certificates
display usage statement
servername
add config of servername
servername
remove config of servername
configname
name given to LDAP server config
computerid
name used if binding to directory
username
privileged network username
password
privileged network user password
username
local admin username
password
local admin password

dsconfigldap allows addition or removal of LDAP server configurations. Presented below is a discussion of possible parameters. Usage has three intents: add server config, remove server config, or display help.

Options list and their descriptions:

Bindings will be established or dropped in conjunction with the addition or removal of the LDAP server configuration.
This enables the logging to stdout of the details of the operations. This can be redirected to a file.
You will be prompted for a password to use in conjunction with a specified username.
This ensures that no clear text passwords will be sent to the LDAP server during authentication. This will only be enabled if the server supports non-cleartext methods.
This ensures that if the server is capable of supporting encryption methods (i.e., SSL or Kerberos) that encryption will be enforced at all times via policy.
This ensures that man-in-the-middle capabilities will be enforced via Kerberos, if the server supports the capability.
This ensures that packet signing capabilities will be enforced via Kerberos, if the server supports the capability.
Connection to the LDAP server will only be made over SSL.
Will skip updating the search policies.
Will assume Yes for installing certificates
Display usage statement.
servername
This is either the fully qualified domain name or correct IP address of the LDAP server to be added to the DirectoryService LDAPv3 configuration.
servername
This is either the fully qualified domain name or correct IP address of the LDAP server to be removed from the DirectoryService LDAPv3 configuration.
configname
This is the UI configuration label that is to be given the LDAP server configuration.
computerid
This is the name to be used for directory binding to the LDAP server. If none is given the first substring, before a period, of the hostname (the defined environment variable "HOST") is used.
username
Username of a privileged network user to be used in authenticated directory binding.
password
Password for the privileged network user. This is a less secure method of providing a password, as it may be viewed via process list. For stronger security leave the option off and you will be prompted for a password.
username
Username of a local administrator.
password
Password for the local administrator. This is a less secure method of providing a password, as it may be viewed via process list. For stronger security leave the option off and you will be prompted for a password.

dsconfigldap -a ldap.company.com

The LDAP server config for the LDAP server myldap.company.com will be added. If authenticated directory binding is required by the LDAP server, then this call will fail. Otherwise, the following parameters configname, computerid, and local admin name will respectively pick up these defaults: ip address of the LDAP servername, substring up to first period of fully qualified hostname, and username of the user in the shell this tool was invoked.

dsconfigldap -r ldap.company.com

The LDAP server config for the LDAP server myldap.company.com will be removed but not unbound since no network user credentials were supplied. The local admin name will be the username of the user in the shell this tool was invoked.

opendirectoryd(8), odutil(1)

April 24 2010 Mac OS X