简体   繁体   English

如何在Oracle Unified Directory(OUD)11g r2中添加管理员用户?

[英]How can I add an admin user in Oracle Unified Directory (OUD) 11g r2?

I'm using OUD 11G R2. 我正在使用OUD 11G R2。 I just installed OUD with the default setting and setup an instance. 我只是使用默认设置安装了OUD并设置了一个实例。 I tried to add an admin user with the command: 我试图使用以下命令添加管理员用户:

./ldapmodify -h localhost -p 1389 -D "cn=Directory Manager" -w password --defaultAdd --filename admin.ldif 

Here is the content of admin.ldif 这是admin.ldif的内容

dn: cn=oimuser,cn=Root DNs,cn=config
objectClass: inetOrgPerson
objectClass: person
objectClass: top
objectClass: ds-cfg-root-dn-user
objectClass: organizationalPerson
userPassword: Oracle123
cn: oimuser
sn: oimuser
ds-cfg-alternate-bind-dn: cn=oimuser
givenName: OIM User
ds-privilege-name: -config-read
ds-privilege-name: -config-write
ds-privilege-name: -backend-backup
ds-privilege-name: -backend-restore
ds-privilege-name: -data-sync
ds-privilege-name: -disconnect-client
ds-privilege-name: -jmx-notify
ds-privilege-name: -jmx-read
ds-privilege-name: -jmx-write
ds-privilege-name: -ldif-export
ds-privilege-name: -ldif-import
ds-privilege-name: -modify-acl
ds-privilege-name: -privilege-change
ds-privilege-name: -proxied-auth
ds-privilege-name: -server-restart
ds-privilege-name: -server-shutdown
ds-privilege-name: -update-schema
ds-privilege-name: -cancel-request

I got the error as below: 我收到如下错误:

The provided entry cn=oimuser,cn=Root DNs,cn=config cannot be added because its suffix is not registered with the network group network-group 不能添加提供的条目cn = oimuser,cn = Root DNs,cn = config,因为其后缀未在网络组network-group中注册

Would you please advise how I can fix that? 您能告诉我我该如何解决吗? Thanks 谢谢

I got the reason. 我有原因。 cn=config is an administrative suffix. cn = config是管理后缀。

In general, direct LDAP access to the administrative suffixes (using the ldap* utilities) is discouraged. 通常,不建议直接通过LDAP访问管理后缀(使用ldap *实用程序)。 In most cases, it is preferable to use the dedicated administrative command-line utilities to access these suffixes. 在大多数情况下,最好使用专用的管理命令行实用程序来访问这些后缀。

If you must use the ldap* commands to access the administrative suffixes, you must use the administration connector port (with the --useSSL or -Z option). 如果必须使用ldap *命令访问管理后缀,则必须使用管理连接器端口(带有--useSSL或-Z选项)。

It works when I use the command: 当我使用命令时它起作用:

./ldapmodify -h localhost -p 4444 -D "cn=Directory Manager" -w Oracle123 --defaultAdd -Z --filename admin.ldif

You can verify it by: 您可以通过以下方式进行验证:

./ldapsearch -h localhost -p 4444 -D "cn=Directory Manager" -w password --useSSL -b "cn=root DNs,cn=config" "cn=oimuser"

I'm only familiar with OUD 11.1.2.1.0. 我只熟悉OUD 11.1.2.1.0。 OUD 11.1.2.1.0 has more than one way to add a root user: OUD 11.1.2.1.0有多种添加根用户的方法:

  • ldapmodify The other way you mentioned works just fine (documentation: OUD 11.1.2.1.0 Admin Guide, 19.2.1.2 To Create a New Root User ). ldapmodify您提到的另一种方法也很好(文档: OUD 11.1.2.1.0 Admin Guide,19.2.1.2创建新的Root用户 )。 The problem comes when you try to limit the root user's privileges through the Privilege Subsystem, then you'll have to use the dsconfig tool too. 当您尝试通过Privilege子系统限制root用户的特权时,问题就来了,那么您也必须使用dsconfig工具。

  • Oracle Directory Services Manager GUI ODSM is a JavaEE 6 application compressed into an Enterprise ARchive. Oracle Directory Services Manager GUI ODSM是一个压缩到Enterprise ARchive中的JavaEE 6应用程序。 If you install an Oracle Fusion Middleware 11gR2 stack with Weblogic 10.3.6 as application server, you can create a WLS domain in which you are able to deploy ODSM (eg. on AdminServer). 如果您将带有Weblogic 10.3.6的Oracle Fusion Middleware 11gR2堆栈安装为应用程序服务器,则可以创建一个WLS域,您可以在其中部署ODSM(例如,在AdminServer上)。 If you are not familiar with FMW I don't suggest this option regarding the huge overhead the configuration & learning needs. 如果您不熟悉FMW,那么我不建议您考虑此选项,因为它需要大量的配置和学习资源。 Nevertheless, once you configured it properly, the GUI helps a lot! 但是,一旦正确配置它,GUI将会大有帮助! In ODSM, you can find what you need here: Log in -> Configuration -> General Configuration -> Root Users 在ODSM中,您可以在此处找到所需的信息:登录->配置->常规配置->根用户

Hope I helped a little. 希望我能有所帮助。

PS: I would add to Jacky's answer: You might need to use -X too to trust the admin connector's certificate (if you haven't flagged it trusted by adding it to the JKS truststore). PS:我想补充一下Jacky的答案:您可能还需要使用-X来信任管理连接器的证书(如果您尚未通过将其添加到JKS信任库中将其标记为受信任的证书)。

Change "dn: cn=oimuser,cn=Root DNs,cn=config" to "dn: cn=oimuser,cn=Users,dc=xyz,dc=com" 将“ dn:cn = oimuser,cn = Root DNs,cn = config”更改为“ dn:cn = oimuser,cn = Users,dc = xyz,dc = com”

update cn=Users,dc=xyz,dc=com according to your directory structure. 根据您的目录结构更新cn = Users,dc = xyz,dc = com

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM