Setting Up an LDAP Directory Server |
After you install the LDAP directory server, you must change the configuration so that SAS software can use the server correctly. The steps for performing this configuration are as follows:
The detailed procedures for performing these steps are as follows:
Locate the LDAP configuration files in the directory where Integration Technologies (IT) Administrator was installed. You will find the files in admin_loc\ldap, where admin_loc is the drive and directory where IT Administrator is installed. The default location is C:\itadmin\ldap.
The LDAP configuration files define the attributes and object classes that are used by SAS Integration Technologies and other related SAS software.
The files are as follows:
For a Netscape Directory Server, copy nsslapd.sas_at.conf and nsslapd.sas_oc.conf into the server's configuration directory. As a default, the configuration directory is in the following path: drive:\netscape\server4\slapd-instance\config
For an OpenLDAP directory server, copy slapd.sas_at.conf and slapd.sas_oc.conf into the server's configuration directory.
If you are using Microsoft Active Directory, refer to Installing the LDAP Schema for Microsoft Active Directory for instructions on loading the msadClassesAttrs.ldif schema file.
For a Netscape Directory Server, the procedure is as follows:
Use a text editor to open the slapd.conf file.
Search for an include
directive at
the beginning of a line.
After the last existing include
, add a new include
directive that contains the full path of the new nsslapd.sas_at.conf file. The new line should have the same syntax as the line above it.
Add another include
directive for the file nsslapd.sas_oc.conf.
The new lines should be similar to the following examples:
include "c:/netscape/suitespot/slapd-D1354/config/nsslapd.sas_at.conf" include "c:/netscape/suitespot/slapd-D1354/config/nsslapd.sas_oc.conf"
Restart the server so that the server reads the new configuration information.
For a Netscape Directory Server, the procedure is as follows:
Start the directory console. To start the console from a Windows/NT desktop, select Start Programs Netscape Server Products Netscape Console.
Restart the server from the console.
Edit containers.ldif to replace each instance of $SAS_CONTEXT$ with the correct LDAP suffix for your installation. Place this suffix everywhere that $SAS_CONTEXT$ appears. For example, if your suffix is o=ACE Industries, c=US
, you would edit the first line of containers.ldif to read as follows: dn: cn=SAS,o=ACE Industries,c=US
.
Alternatively, you can put the $SAS_CONTEXT$ entry lower in the directory tree. However, if you put it below the root, you must be sure that all entries between the root and the suffix are in place in the directory tree. For example, if the SAS tree starts at
ou=Finance,o=Alpine Airways,c=US
and the database suffix is
o=Alpine Airways,c=US
, then the organizational unit entry for ou=Finance,o=Alpine Airways,c=US
must be in the directory before you import the SAS containers.
Make sure that the directory contains an entry representing the suffix that you specified in the containers.ldif file. For example, if your suffix is o=ACE Industries, c=US, make sure the directory includes the entry dn: o=ACE Industries,c=US.
If your database is completely empty, then you must create the root object, which is usually an organization object class. An example of a simple organization entry is
dn: o=Alpine Airways,c=US objectclass: organization o: Ace Industries
Either use the command
ldapmodify -a -D manager DN -w manager password
to insert the root object entry into the directory, or add the command to the containers.ldif file.
If you are using Netscape Directory Server, you can import the containers.ldif file using the following procedure:
Check the success of the import or ldapadd procedure by noting the number of rejected entries. If more than one or two entries are rejected, check the two most likely reasons:
See the previous step for information about creating the parent entry.
Set the access control on the directory. The installation process may have created some default access control lists (ACLs). Normally, the installation process will create an ACL called "anonymous access" that allows anonymous users to search the data in the directory. Until you understand access control, modify this value to allow all access.
Although this is not a permanent solution, it lets you operate until you can create users and groups and can define ACLs that give those groups appropriate access to the data.
For more information about LDAP access control, refer to Adding Person Entries to the Directory and LDAP Configuration Access Control Overview.
Set up indexes on the LDAP server. These indexes will improve the performance of SAS with the server. Consult the documentation for your server for information on creating the indexes.
Create these indexes:
Attribute | Index Type |
sasInterface | eq, pres |
sasKeyword | eq, pres |
sasSubscriberName | eq, pres |
sasSubscriberGroupDn | eq, pres |
sasDomainName | eq, pres |
sasLogicalName | eq, pres |
sasReferenceDn | eq, pres |
sasPersonDn | eq, pres |
sasPortalSubwindows | Sub |
sasSubscriberCn | eq, pres |
Set the server limits to improve search performance. Using the directory console software, set the look-through limit, size limit, and time limit to -1 (minus 1). This value disables all three limits, and permits searches against the LDAP directory to return accurate results.
The server is now ready for use by SAS software.
Setting Up an LDAP Directory Server |