On 12/12/2011 08:02 PM, Simo Sorce wrote:
On Mon, 2011-12-12 at 19:34 +0100, Sigbjorn Lie wrote:
On 12/12/2011 04:18 PM, Simo Sorce wrote:
On Mon, 2011-12-12 at 16:13 +0100, Sigbjorn Lie wrote:
On Mon, December 12, 2011 15:31, Simo Sorce wrote:
On Mon, 2011-12-12 at 11:55 +0100, Sigbjorn Lie
On Mon, 2011-12-12 at 19:34 +0100, Sigbjorn Lie wrote:
> On 12/12/2011 04:18 PM, Simo Sorce wrote:
> > On Mon, 2011-12-12 at 16:13 +0100, Sigbjorn Lie wrote:
> >> On Mon, December 12, 2011 15:31, Simo Sorce wrote:
> >>> On Mon, 2011-12-12 at 11:55 +0100, Sigbjorn Lie wrote:
> >>>
> options lda
On 12/12/2011 04:18 PM, Simo Sorce wrote:
On Mon, 2011-12-12 at 16:13 +0100, Sigbjorn Lie wrote:
On Mon, December 12, 2011 15:31, Simo Sorce wrote:
On Mon, 2011-12-12 at 11:55 +0100, Sigbjorn Lie wrote:
options ldap.name uid=s-netapp,cn=users,cn=accounts,dc=test,dc=local options
ldap.passwd
I wonder if the following simplified setup I am using with AD:
ldap.ADdomainmydomain.com
ldap.enable on
ldap.nssmap.attribute.uniqueMember Member
ldap.nssmap.objectClass.groupOfUniqueNames Group
ldap.nssmap.objectClass.posixAccount User
ldap.nssmap.objectClass.pos
On Mon, 2011-12-12 at 16:13 +0100, Sigbjorn Lie wrote:
> On Mon, December 12, 2011 15:31, Simo Sorce wrote:
> > On Mon, 2011-12-12 at 11:55 +0100, Sigbjorn Lie wrote:
> >
> >> options ldap.name uid=s-netapp,cn=users,cn=accounts,dc=test,dc=local
> >> options ldap.passwd
> >> passwordforbinduser
> >
On Mon, December 12, 2011 15:31, Simo Sorce wrote:
> On Mon, 2011-12-12 at 11:55 +0100, Sigbjorn Lie wrote:
>
>> options ldap.name uid=s-netapp,cn=users,cn=accounts,dc=test,dc=local options
>> ldap.passwd
>> passwordforbinduser
>
> If you need a special user you can avoid polluting the normal user
On Mon, 2011-12-12 at 11:55 +0100, Sigbjorn Lie wrote:
> options ldap.name uid=s-netapp,cn=users,cn=accounts,dc=test,dc=local
> options ldap.passwd passwordforbinduser
If you need a special user you can avoid polluting the normal user space
by creating a user under cn=sysaccounts,cn=etc,suffix..
Hi,
I've used OnTAP 7.3.3 with IPA. Using LDAP lookups for users/groups and
netgroups so far, using
autenticated connections to the IPA LDAP server. Have not been able to get
LDAPS working yet.
I still have kerberos for NFSv4 left to configure.
I used the following OnTAP config:
options ldap.