Openldap client configuration using authconfig Redhat

Install the following packages:
# yum install -y openldap-clients nss-pam-ldapd

Then, type:
# authconfig –enableforcelegacy –update

# authconfig –enableldap –enableldapauth –ldapserver=”serverx.example.com” –ldapbasedn=”dc=example,dc=com” –update

Note: According to your requirements, you can need to specify the –enablemkhomedir option. This option creates a local user home directory at the first connection if none exists.

Test the configuration:


# getent passwd ldapuser01

ldapuser01:*:1001:1001:ldapuser01:/home/guests/ldapuser01:/bin/bash

LDAP ( Lightweight Directory Access Protocol) is client-server protocol which provides directory services to the client machines. Each LDAP server contain the data required to making up the LDAP database, commonly BDB ( Berkely DB), a high performance transactional database. LDAP manages it’s data in the form objects which are defined with several attributes.


  Right now the current LDAP standard provides following basic types of object classes:


Groups – unordered lists of individual objects or groups of objects

Location – e.g. Country name and description

Organisational Units – for Organisational classification of the directory

People – Individual user login accounts in the directory

As mentioned earlier each object class supported by additional information in the form of attributes. And these attributes are paired together with the values that customizes each object as unique entity in the LDAP database.


e.g: for example the “user” object has an attribute named “commonName in short cn” which is having the user name as it’s value


Source Reference