How the server configuration is organized, Note, Configuration attributes – Red Hat 8.1 User Manual

Page 14: Configuration of plug-in functionality, Configuration of databases

Advertising
background image

50ns-web.ldif

Schema for Netscape Web Server.

60pam-plugin.ldif

Reserved for future use.

99user.ldif

User-defined schema maintained by Directory
Server replication consumers which contains the
attributes and object classes from the suppliers.

2.1.2. How the Server Configuration Is Organized

The dse.ldif file contains all configuration information including directory-specific entries created by
the directory at server startup, such as entries related to the database. The file includes the root
Directory Server entry (or DSE, named by "") and the contents of cn=config and cn=monitor.

When the server generates the dse.ldif file, it lists the entries in hierarchical order in the order that
the entries appear in the directory under cn=config, which is usually the same order in which an LDAP
search of subtree scope for base cn=config returns the entries.

dse.ldif also contains the cn=m onitor entry, which is mostly read-only, but can have ACIs set on it.

NOTE

The dse.ldif file does not contain every attribute in cn=config. If the attribute has not been
set by the administrator and has a default value, the server will not write it to dse.ldif. To see
every attribute in cn=config, use ldapsearch.

2.1.2.1. Configuration Attributes

Within a configuration entry, each attribute is represented as an attribute name. The value of the
attribute corresponds to the attribute's configuration.

The following code sample is an example of part of the dse.ldif file for a Directory Server. The
example shows, among other things, that schema checking has been enabled; this is represented by the
attribute nsslapd-schemacheck, which takes the value on.

dn: cn=config
objectclass: top
objectclass: extensibleObject
objectclass: nsslapdConfig
nsslapd-accesslog-logging-enabled: on
nsslapd-enquote-sup-oc: off
nsslapd-localhost: phonebook.example.com
nsslapd-schemacheck: on
nsslapd-port: 389
nsslapd-localuser: nobody
...

2.1.2.2. Configuration of Plug-in Functionality

The configuration for each part of Directory Server plug-in functionality has its own separate entry and
set of attributes under the subtree cn=plugins,cn=config. The following code sample is an
example of the configuration entry for an example plug-in, the Telephone Syntax plug-in.

dn: cn=Telephone Syntax,cn=plugins,cn=config
objectclass: top
objectclass: nsSlapdPlugin
objectclass: extensibleObject
cn: Telephone Syntax
nsslapd-pluginType: syntax
nsslapd-pluginEnabled: on

Some of these attributes are common to all plug-ins, and some may be particular to a specific plug-in.
Check which attributes are currently being used by a given plug-in by performing an ldapsearch on
the cn=config subtree.

For a list of plug-ins supported by Directory Server, general plug-in configuration information, the plug-in
configuration attribute reference, and a list of plug-ins requiring restart for configuration changes, see

Chapter 3, Plug-in Implemented Server Functionality Reference

.

2.1.2.3. Configuration of Databases

The o=NetscapeRoot and cn=UserRoot subtrees under the database plug-in entry contain
configuration data for the databases containing the o=NetscapeRoot suffix and the default suffix
created during setup, such as dc=example,dc=com.

14

Chapter 2. Core Server Configuration Reference

Advertising