Lines Matching refs:cn

169 look at cn=mapping tree,cn=config and cn=ldbm database,cn=plugins,cn=config
1035 LDAP_ROOTDN="cn=Directory Manager" # Provide common default.
1261 eval "${LDAPSEARCH} ${SERVER_ARGS} -b cn=monitor -s base \"objectclass=*\" version | ${GREP} \"^version=\" | cut -f2 -d'/' | cut -f1 -d' ' > ${TMPDIR}/checkDSver 2>&1"
1462 _C_DN="cn=GSSAPI,cn=identity mapping,cn=config"
1464 dn: cn=GSSAPI,cn=identity mapping,cn=config
1467 cn: GSSAPI
1479 _H_DN="cn=${_H_CN}, ${_C_DN}"
1486 cn: ${_H_CN}
1490 dsSearchFilter: (&(objectClass=ipHost)(cn=\$1))
1499 _U_DN="cn=${_U_CN}, ${_C_DN}"
1506 cn: ${_U_CN}
1569 aci: (targetattr="userPassword")(version 3.0; acl host-read-pwd; allow (read,search) userdn="ldap:///cn=*+ipHostNumber=*,ou=Hosts,${LDAP_BASEDN}" and authmethod="sasl GSSAPI";)
1596 ${EVAL} "${LDAPSEARCH} ${LDAP_ARGS} -b cn=schema -s base \"objectclass=*\" ${ATTR} | ${GREP} -i \"${2}\" ${VERB}"
1658 eval "${LDAPSEARCH} ${LDAP_ARGS} -b \"cn=${ANS},ou=profile,${LDAP_BASEDN}\" -s base \"objectclass=*\" ${VERB}"
1683 get_confirm_nodef "Are you sure you want to overwrite profile cn=${ANS}?"
1948 # Get current timeout value from cn=config.
1949 eval "${LDAPSEARCH} ${LDAP_ARGS} -b \"cn=config\" -s base \"objectclass=*\" nsslapd-timelimit > ${TMPDIR}/chk_timeout 2>&1"
1967 # Get current sizelimit value from cn=config.
1968 eval "${LDAPSEARCH} ${LDAP_ARGS} -b \"cn=config\" -s base \"objectclass=*\" nsslapd-sizelimit > ${TMPDIR}/chk_sizelimit 2>&1"
2416 LDAP_ADMINDN="cn=admin,ou=profile,${LDAP_BASEDN}" # default
2452 # Get cn and sn names from LDAP_ADMINDN.
2458 cn: ${cn_tmp}
2583 aci: (target="ldap:///${LDAP_BASEDN}")(targetattr="shadowLastChange||shadowMin||shadowMax||shadowWarning||shadowInactive||shadowExpire||shadowFlag||userPassword||loginShell||homeDirectory||gecos")(version 3.0; acl ${HOST_ACI_NAME}; allow (write,compare,read,search) authmethod="sasl GSSAPI" and userdn = "ldap:///cn=*+ipHostNumber=*,ou=Hosts,${LDAP_BASEDN}";)
2613 ${EVAL} "${LDAPSEARCH} ${LDAP_ARGS} -b \"cn=${LDAP_PROFILE_NAME},ou=profile,${LDAP_BASEDN}\" -s base \"objectclass=*\" > $PROFILE_OUT 2>&1"
2614 ${GREP} -i cn $PROFILE_OUT >/dev/null 2>&1
2788 LDAP_PROXYAGENT="cn=proxyagent,ou=profile,${LDAP_BASEDN}" # default
3013 # defined under "cn=mapping tree,cn=config". The
3030 "-b \"cn=\\\"${cur_suffix}\\\",cn=mapping tree,cn=config\" " \
3258 allow (all) groupdn = "ldap:///cn=Configuration Administrators,
3273 # NOTE: -b 'cn=mapping tree,cn=config' -s one 'cn=\"$1\"' won't work
3274 # in case of 'cn' value in LDAP is not quoted by '"',
3275 # -b 'cn=\"$1\",cn=mapping tree,cn=config' works in all cases
3277 -b 'cn=\"${LDAP_SUFFIX}\",cn=mapping tree,cn=config' \
3289 -b 'cn=ldbm database,cn=plugins,cn=config' \
3321 -b 'cn=ldbm database,cn=plugins,cn=config' \
3322 -s one 'cn=${IDS_DATABASE}*' cn"` 2>/dev/null
3329 ${ECHO} "${_LDBM_DBS}" | ${GREP} -i "^cn=${_name}$" >/dev/null 2>&1 ||
3367 dn: cn="${LDAP_SUFFIX}",cn=mapping tree,cn=config
3371 cn: ${LDAP_SUFFIX}
3375 dn: cn=${IDS_DATABASE},cn=ldbm database,cn=plugins,cn=config
3379 cn: ${IDS_DATABASE}
3609 # modify_cn(): Change the cn from MUST to MAY in ipNetwork.
3616 dn: cn=schema
3619 objectclasses: ( 1.3.6.1.1.1.2.7 NAME 'ipNetwork' DESC 'Standard LDAP objectclass' SUP top STRUCTURAL MUST ipNetworkNumber MAY ( ipNetmaskNumber $ manager $ cn $ l $ description ) X-ORIGIN 'RFC 2307' )
3623 # Modify the cn for ipNetwork.
3626 ${ECHO} " ERROR: update of cn for ipNetwork failed!"
3640 dn: cn=config
3656 ${ECHO} " ${STEP}. Changed timelimit to ${IDS_TIMELIMIT} in cn=config."
3668 dn: cn=config
3684 ${ECHO} " ${STEP}. Changed sizelimit to ${IDS_SIZELIMIT} in cn=config."
3698 dn: cn=config
3706 dn: cn=Password Policy,cn=config
3723 ${ECHO} " ${STEP}. Changed passwordstoragescheme to \"crypt\" in cn=config."
3743 _EXT="cn=index,cn=${IDS_DATABASE},cn=ldbm database,cn=plugins,cn=config"
3754 ${EVAL} "${LDAPSEARCH} ${LDAP_ARGS} -b \"cn=${i},${_EXT}\" -s base \
3764 dn: cn=${i},${_EXT}
3767 cn: ${i}
3795 dn: cn=${TASKNAME}, cn=index, cn=tasks, cn=config
3799 cn: ${TASKNAME}
3817 -b \"cn=${TASKNAME}, cn=index, cn=tasks, cn=config\" -s base \
3850 _EXT="cn=index,cn=${IDS_DATABASE},cn=ldbm database,cn=plugins,cn=config"
3862 ${EVAL} "${LDAPSEARCH} ${LDAP_ARGS} -b \"cn=${i},${_EXT}\" \
3872 dn: cn=${i},${_EXT}
3875 cn: ${i}
3904 dn: cn=${TASKNAME}, cn=index, cn=tasks, cn=config
3908 cn: ${TASKNAME}
3926 -b \"cn=${TASKNAME}, cn=index, cn=tasks, cn=config\" -s base \
3974 _INDEX17="${LDAP_DOMAIN}.getipnent;${LDAP_DOMAIN}_ipn_vlv_index;ou=networks;&(objectClass=ipNetwork)(cn=*)"
3984 _EXT="cn=${IDS_DATABASE},cn=ldbm database,cn=plugins,cn=config"
4000 eval "${LDAPSEARCH} -v ${LDAP_ARGS} -b \"cn=config\" -s base \"objectclass=*\" nsslapd-instancedir | ${GREP} 'nsslapd-instancedir=' | cut -d'=' -f2- > ${TMPDIR}/instance_name 2>&1"
4019 _jEXT="cn=${j},${_EXT}"
4022 ${LDAPSEARCH} ${SERVER_ARGS} -b "cn=${i},${_jEXT}" -s base "objectclass=*" > /dev/null 2>&1
4041 cn: ${j}
4047 dn: cn=${i},${_jEXT}
4048 cn: ${i}
4049 vlvSort: cn uid
4103 ${EVAL} "${LDAPSEARCH} ${SERVER_ARGS} -b cn=schema -s base \
4111 ${EVAL} "${LDAPSEARCH} ${SERVER_ARGS} -b cn=schema -s base \
4130 dn: cn=schema
4256 dn: cn=schema
4259 objectclasses: ( 1.3.6.1.1.1.2.14 NAME 'NisKeyObject' SUP top MUST ( cn $ nisPublickey $ nisSecretkey ) MAY ( uidNumber $ description ) )
4261 dn: cn=schema
4266 dn: cn=schema
4271 dn: cn=schema
4276 dn: cn=schema
4279 objectclasses: ( 1.3.6.1.4.1.42.2.27.5.2.7 NAME 'SolarisNamingProfile' SUP top MUST ( cn $ SolarisLDAPservers $ SolarisSearchBaseDN ) MAY ( SolarisBindDN $ SolarisBindPassword $ SolarisAuthMethod $ SolarisTransportSecurity $ SolarisCertificatePath $ SolarisCertificatePassword $ SolarisDataSearchDN $ SolarisSearchScope $ SolarisSearchTimeLimit $ SolarisPreferredServer $ SolarisPreferredServerOnly $ SolarisCacheTTL $ SolarisSearchReferral ) )
4281 dn: cn=schema
4284 objectclasses: ( 2.16.840.1.113730.3.2.4 NAME 'mailGroup' SUP top MUST mail MAY ( cn $ mgrpRFC822MailMember ) )
4286 dn: cn=schema
4289 objectclasses: ( 1.3.6.1.4.1.42.2.27.1.2.5 NAME 'nisMailAlias' SUP top MUST cn MAY rfc822mailMember )
4291 dn: cn=schema
4294 objectclasses: ( 1.3.6.1.4.1.42.2.27.1.2.6 NAME 'nisNetId' SUP top MUST cn MAY ( nisNetIdUser $ nisNetIdGroup $ nisNetIdHost ) )
4296 dn: cn=schema
4301 dn: cn=schema
4306 dn: cn=schema
4309 objectclasses: ( 1.3.6.1.4.1.42.2.27.5.2.4 NAME 'SolarisAuthAttr' SUP top MUST cn MAY ( SolarisAttrReserved1 $ SolarisAttrReserved2 $ SolarisAttrShortDesc $ SolarisAttrLongDesc $ SolarisAttrKeyValue ) )
4311 dn: cn=schema
4314 objectclasses: ( 1.3.6.1.4.1.42.2.27.5.2.5 NAME 'SolarisProfAttr' SUP top MUST cn MAY ( SolarisAttrReserved1 $ SolarisAttrReserved2 $ SolarisAttrLongDesc $ SolarisAttrKeyValue ) )
4316 dn: cn=schema
4321 dn: cn=schema
4326 dn: cn=schema
4329 objectclasses: ( 1.3.6.1.4.1.11.1.3.1.2.4 NAME 'DUAConfigProfile' SUP top DESC 'Abstraction of a base configuration for a DUA' MUST cn MAY ( defaultServerList $ preferredServerList $ defaultSearchBase $ defaultSearchScope $ searchTimeLimit $ bindTimeLimit $ credentialLevel $ authenticationMethod $ followReferrals $ serviceSearchDescriptor $ serviceCredentialLevel $ serviceAuthenticationMethod $ objectclassMap $ attributeMap $ profileTTL ) )
4331 dn: cn=schema
4336 dn: cn=schema
4341 dn: cn=schema
4346 dn: cn=schema
4351 dn: cn=schema
4356 dn: cn=schema
4361 dn: cn=schema
4366 dn: cn=schema
4371 dn: cn=schema
4374 objectclasses: ( 1.3.6.1.4.1.42.2.27.5.2.12 NAME 'nisplusTimeZoneData' DESC 'NIS+ timezone table data' SUP top STRUCTURAL MUST cn MAY ( nisplusTimeZone $ description ) )
4376 dn: cn=schema
4381 dn: cn=schema
4432 aci: (targetattr = "cn||uid||uidNumber||gidNumber||homeDirectory||shadowLastChange||shadowMin||shadowMax||shadowWarning||shadowInactive||shadowExpire||shadowFlag||memberUid||SolarisAttrKeyValue||SolarisAttrReserved1||SolarisAttrReserved2||SolarisUserQualifier")(version 3.0; acl ${ACI_NAME}; deny (write) userdn = "ldap:///self";)
4612 userdn != "ldap:///cn=*+ipHostNumber=*,ou=Hosts,${LDAP_BASEDN}";)
4645 dn: oid=2.16.840.1.113730.3.4.9,cn=features,cn=config
4718 ${EVAL} "${LDAPSEARCH} ${SERVER_ARGS} -b cn=schema -s base \"objectclass=*\" \
4721 ${EVAL} "${LDAPSEARCH} ${SERVER_ARGS} -b cn=schema -s base \"objectclass=*\" \
4981 # Get cn and sn names from LDAP_PROXYAGENT.
4987 cn: ${cn_tmp}
5133 eval "${LDAPSEARCH} ${LDAP_ARGS} -b \"cn=${LDAP_PROFILE_NAME},ou=profile,${LDAP_BASEDN}\" -s base \"objectclass=*\" ${VERB}"
5137 cn=${LDAP_PROFILE_NAME},ou=profile,${LDAP_BASEDN}
5269 # Modify slapd.oc.conf to ALLOW cn instead of REQUIRE.