Use the chldapserver command to modify a Lightweight Directory Access Protocol (LDAP) server.
If -sslcert is specified, the server certificate is verified while authenticating. The SSL certificate must exist on the current node. If -nosslcert is specified, any certificate file is deleted and the server certificate is not checked.
The -basedn parameter indicates the distinguished name (DN) to use as a base from which to search for users in the LDAP directory. If Transport Layer Security (TLS) is enabled and -sslcert is specified, the server certificate is verified during authentication. The secure socket layer (SSL) certificate must exist on the node being used. Otherwise, a server certificate is not checked.
The system must be configured with an appropriate version IP address when -ip is specified. The IP address specified with the -ip parameter must be of a version supported by the system. The certificate file must be in valid PEM format and have a maximum length of 12 kilobytes.
Distinguished names must be a sequence of attribute=value pairs separated by a comma (,), semi-colon(;), or plus sign (+) escaping special characters with \ where appropriate, and specified UTF-8 characters using their byte encoding. For example, , for commas or \C4\87 for the UTF-8 character c acute.
This command runs whether or not LDAP authentication is enabled.
chldapserver -ip 192.135.60.3 -port 400 ldapserver0
The resulting output:
No feedback
chldapserver -sslcert /tmp/activedirectorycert.pem 0
The resulting output:
No feedback
chldapserver -nosslcert 0
The resulting output:
No feedback