DB2 database with LDAP instanceowner and users: Difference between revisions
Jump to navigation
Jump to search
(New page: = Create DB2 database with LDAP instanceowner and users = == Introduction == This guide documents what I have done with opensuse 11.3 and DB2 9.7 FP2 to setup a database with LDAP users. ...) |
No edit summary |
||
Line 1: | Line 1: | ||
= Create DB2 database with LDAP | = Create DB2 database with LDAP instance owner and users = | ||
== Introduction == | == Introduction == | ||
Line 6: | Line 6: | ||
* check that package openldap2 is installed (description says ldap client tools, but thats wrong!) | * check that package openldap2 is installed (description says ldap client tools, but thats wrong!) | ||
* check that yast modules for ldap client and server are installed | * check that yast modules for ldap client and server are installed | ||
$ cd /usr/share/jba-pki/ | |||
$ source ./vars | |||
$ ./pkitool openldap-server@job2.job.de | |||
$ cp -av keys/ca.crt keys/openldap-server@job2.job.de.crt keys/openldap-server@job2.job.de.key /etc/openldap | |||
This generates the certificate and key necessary for enabling TLS for the ldap server. | |||
Now start yast ldap server module, configure ldap server start and open firewall port, configure as standalone server, activate tls and ldaps, | |||
enter the file names for the ca and ldap server certificate and the ldap server key, use default db type hdb, accept basis-dn, change admin dn to cn=root, enter the admin password, accept default db directory, use as ldap client standard. | |||
-> TLS does not work | |||
-> user auth does not work |
Latest revision as of 18:10, 5 August 2010
Create DB2 database with LDAP instance owner and users
Introduction
This guide documents what I have done with opensuse 11.3 and DB2 9.7 FP2 to setup a database with LDAP users.
- check that package openldap2 is installed (description says ldap client tools, but thats wrong!)
- check that yast modules for ldap client and server are installed
$ cd /usr/share/jba-pki/ $ source ./vars $ ./pkitool openldap-server@job2.job.de $ cp -av keys/ca.crt keys/openldap-server@job2.job.de.crt keys/openldap-server@job2.job.de.key /etc/openldap
This generates the certificate and key necessary for enabling TLS for the ldap server.
Now start yast ldap server module, configure ldap server start and open firewall port, configure as standalone server, activate tls and ldaps, enter the file names for the ca and ldap server certificate and the ldap server key, use default db type hdb, accept basis-dn, change admin dn to cn=root, enter the admin password, accept default db directory, use as ldap client standard.
-> TLS does not work -> user auth does not work