Alternate ldap

Author: s | 2025-04-24

★★★★☆ (4.5 / 1390 reviews)

pop out window

Alternate LDAP from AlternateTools. Alternate LDAP is a simple LDAP client that allows you, for example, to search public LDAP servers for emails and phone numbers peditor Alternate LDAP Registration Key Alternate LDAP A small and easy to use application. A simple LDAP client that allows you e.g. to search public LDAP servers for e

Download igs replicator

Alternate ldap com about: Alternate LDAP: Alternate LDAP 1.203

Manage Certificates for Alternate LDAP over SSL Servers (Oracle ILOM CLI) Alternate LDAP over SSL servers can also have SSL certificates that need to be loaded onto or removed from those servers. Use this task to manage the certificates for the alternate servers. Do one of the following: Remove an existing certificate. For example, to remove the certificate file from alternate server 1, type: -> set /SP/clients/ldapssl/alternateservers/1/cert/ clear_action=trueAre you sure you want to remove the cert (y/n)? y-> Load a certificate file onto an alternate AD server. For example, to load a certificate file onto alternate server 1, type: -> load /SP/clients/ldapssl/cert/ load_uri=URI-> where URI is the uniform resource indicator for the certificate file. For example, to load the certificate file 112115.cert onto alternate server 1, type: -> load /SP/clients/ldapssl/alternateservers/1/cert/ load_uri=ftp://root:changeme@123.45.67.89/privkeystore/112115.certLoad Successful.-> Enable the LDAP over SSL Client (Oracle ILOM CLI) Configure LDAP over SSL Client Properties (Oracle ILOM CLI) Manage an LDAP over SSL Server's Certificate (Oracle ILOM CLI) Configure Alternate LDAP over SSL Servers (Oracle ILOM CLI) LDAP over SSL Groups (Oracle ILOM CLI) Configure an LDAP over SSL Administrator Group (Oracle ILOM CLI) Configure an LDAP over SSL Operator Group (Oracle ILOM CLI) Configure an LDAP over SSL Custom Group (Oracle ILOM CLI) Configure an LDAP over SSL User Domain (Oracle ILOM CLI) Configure an LDAP over SSL Optional User Mapping (Oracle ILOM CLI) Disable the LDAP over SSL Client (Oracle ILOM CLI) Display the Oracle ILOM LDAP over SSL Client Information (Oracle ILOM CLI) Display LDAP Alternate LDAP from AlternateTools. Alternate LDAP is a simple LDAP client that allows you, for example, to search public LDAP servers for emails and phone numbers peditor Alternate LDAP Registration Key Alternate LDAP A small and easy to use application. A simple LDAP client that allows you e.g. to search public LDAP servers for e This procedure, seethe table that follows the procedure.Log in to a host that has an SNMP tool and the ILOMMIBs installed. For example, type:ssh username@snmp_manager_ipaddressPassword: passwordRefer to the following SNMP command examples:To view the IP address of LDAP/SSL alternate server ID number 3, type:% snmpget -v1 -cprivate -mALL SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerIp.3SUN-ILOM-CONTROL-MIB::ilomCtrlLdapSslAlternateServerIp.3 = IpAddress: 10.7.143.236To set the IP address of LDAP/SSL alternate server ID number 3 to10.7.143.246, type:% snmpset -v1 -cprivate -mALL SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerIp.3 a 10.7.143.246SUN-ILOM-CONTROL-MIB::ilomCtrlLdapSslAlternateServerIp.3 = IpAddress: 10.7.143.246% snmpget -v1 -cprivate -mALL SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerIp.3SUN-ILOM-CONTROL-MIB::ilomCtrlLdapSslAlternateServerIp.3 = IpAddress: 10.7.143.246To view and clear the certificate information associated with the alternate server whenit is set to true, type:% snmpget -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertClear.0% snmpset -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertClear.0 i 0To view the alternate server certificate version of the certificate file, type:% snmpget -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertVersion.0To view the serial number of the alternate server certificate file, type:% snmpget -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertSerialNo.0To view the issuer of the alternate server certificate file, type:% snmpget -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertIssuer.0To view the subject of the alternate server certificate file, type:% snmpget -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertSubject.0To view the valid start date of the alternate server certificate file, type:% snmpget -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertValidBegin.0To view the valid end date of the alternate server certificate file, type:% snmpget -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertValidEnd.0The following table describes the LDAP/SSL Alternate Server SNMP MIB objects.MIB ObjectDescriptionAllowed ValuesTypeDefaultilomCtrlLdapSslAlternateServerIdAninteger identifier of the LDAP/SSL alternate server table.1 to 5 Note - This object isnot accessible for reading or writing.IntegerNoneilomCtrlLdapSslAlternateServerIPThe IP address of the LDAP/SSL alternate serverused as directory server for user accounts.ipaddressStringNoneilomCtrlLdapSslAlternateServerPortSpecifies the port number for theLDAP/SSL alternate server. Specifying 0 as the port indicates that auto-select will use thewell-known port number. Specifying 1-65535 explicitly sets the port number.portnumber (range: 0 to 65535)IntegerNoneilomCtrlLdapSslAlternateServerCertStatusAstring indicating the status of the certificate file. This is useful in determiningwhether a certificate file is present or not.status (maximum size: 255 characters)StringNoneilomCtrlLdapSslAlternateServerCertURIThis is theURI of a certificate file needed when Strict Certificate Mode is enabled. Settingthe URI causes the transfer of the file, making the certificate available immediately forcertificate authentication. Additionally, either remove or restore are supported for direct certificate manipulation.URIStringNone Copyright © 2008, 2014, Oracle and/or its affiliates. All rights reserved. Legal Notices

Comments

User2067

Manage Certificates for Alternate LDAP over SSL Servers (Oracle ILOM CLI) Alternate LDAP over SSL servers can also have SSL certificates that need to be loaded onto or removed from those servers. Use this task to manage the certificates for the alternate servers. Do one of the following: Remove an existing certificate. For example, to remove the certificate file from alternate server 1, type: -> set /SP/clients/ldapssl/alternateservers/1/cert/ clear_action=trueAre you sure you want to remove the cert (y/n)? y-> Load a certificate file onto an alternate AD server. For example, to load a certificate file onto alternate server 1, type: -> load /SP/clients/ldapssl/cert/ load_uri=URI-> where URI is the uniform resource indicator for the certificate file. For example, to load the certificate file 112115.cert onto alternate server 1, type: -> load /SP/clients/ldapssl/alternateservers/1/cert/ load_uri=ftp://root:changeme@123.45.67.89/privkeystore/112115.certLoad Successful.-> Enable the LDAP over SSL Client (Oracle ILOM CLI) Configure LDAP over SSL Client Properties (Oracle ILOM CLI) Manage an LDAP over SSL Server's Certificate (Oracle ILOM CLI) Configure Alternate LDAP over SSL Servers (Oracle ILOM CLI) LDAP over SSL Groups (Oracle ILOM CLI) Configure an LDAP over SSL Administrator Group (Oracle ILOM CLI) Configure an LDAP over SSL Operator Group (Oracle ILOM CLI) Configure an LDAP over SSL Custom Group (Oracle ILOM CLI) Configure an LDAP over SSL User Domain (Oracle ILOM CLI) Configure an LDAP over SSL Optional User Mapping (Oracle ILOM CLI) Disable the LDAP over SSL Client (Oracle ILOM CLI) Display the Oracle ILOM LDAP over SSL Client Information (Oracle ILOM CLI) Display LDAP

2025-04-10
User3303

This procedure, seethe table that follows the procedure.Log in to a host that has an SNMP tool and the ILOMMIBs installed. For example, type:ssh username@snmp_manager_ipaddressPassword: passwordRefer to the following SNMP command examples:To view the IP address of LDAP/SSL alternate server ID number 3, type:% snmpget -v1 -cprivate -mALL SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerIp.3SUN-ILOM-CONTROL-MIB::ilomCtrlLdapSslAlternateServerIp.3 = IpAddress: 10.7.143.236To set the IP address of LDAP/SSL alternate server ID number 3 to10.7.143.246, type:% snmpset -v1 -cprivate -mALL SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerIp.3 a 10.7.143.246SUN-ILOM-CONTROL-MIB::ilomCtrlLdapSslAlternateServerIp.3 = IpAddress: 10.7.143.246% snmpget -v1 -cprivate -mALL SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerIp.3SUN-ILOM-CONTROL-MIB::ilomCtrlLdapSslAlternateServerIp.3 = IpAddress: 10.7.143.246To view and clear the certificate information associated with the alternate server whenit is set to true, type:% snmpget -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertClear.0% snmpset -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertClear.0 i 0To view the alternate server certificate version of the certificate file, type:% snmpget -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertVersion.0To view the serial number of the alternate server certificate file, type:% snmpget -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertSerialNo.0To view the issuer of the alternate server certificate file, type:% snmpget -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertIssuer.0To view the subject of the alternate server certificate file, type:% snmpget -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertSubject.0To view the valid start date of the alternate server certificate file, type:% snmpget -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertValidBegin.0To view the valid end date of the alternate server certificate file, type:% snmpget -mALL -v2c -cprivate SNMP_agent_ipaddress ilomCtrlLdapSslAlternateServerCertValidEnd.0The following table describes the LDAP/SSL Alternate Server SNMP MIB objects.MIB ObjectDescriptionAllowed ValuesTypeDefaultilomCtrlLdapSslAlternateServerIdAninteger identifier of the LDAP/SSL alternate server table.1 to 5 Note - This object isnot accessible for reading or writing.IntegerNoneilomCtrlLdapSslAlternateServerIPThe IP address of the LDAP/SSL alternate serverused as directory server for user accounts.ipaddressStringNoneilomCtrlLdapSslAlternateServerPortSpecifies the port number for theLDAP/SSL alternate server. Specifying 0 as the port indicates that auto-select will use thewell-known port number. Specifying 1-65535 explicitly sets the port number.portnumber (range: 0 to 65535)IntegerNoneilomCtrlLdapSslAlternateServerCertStatusAstring indicating the status of the certificate file. This is useful in determiningwhether a certificate file is present or not.status (maximum size: 255 characters)StringNoneilomCtrlLdapSslAlternateServerCertURIThis is theURI of a certificate file needed when Strict Certificate Mode is enabled. Settingthe URI causes the transfer of the file, making the certificate available immediately forcertificate authentication. Additionally, either remove or restore are supported for direct certificate manipulation.URIStringNone Copyright © 2008, 2014, Oracle and/or its affiliates. All rights reserved. Legal Notices

2025-04-24
User2390

The Lightweight Directory Access Protocol (LDAP) is used to access the Corporate Address Book to locate e-mail addresses and other information for use with many of the machine services. LDAP can be configured using CentreWare Internet Services.Before configuring LDAP:Make sure your network supports LDAP services.Obtain the IP address or host name of the LDAP Server. NOTE: The machine may also need a login name and password if the LDAP server is not configured to allow NULL names and passwords.Use an LDAP client to validate the settings before inputting them into the CentreWare Internet Services menus. LDAP clients include Microsoft Outlook Express, Microsoft Outlook, Lotus Notes, and other e-mail clients.To use host names, DNS must be configured on the machine.To configure LDAP:From a computer, open an Internet browser window.Enter the IP address of the Phaser 3635MFP in the Address field, and then press [Enter] on the keyboard. The CentreWare Internet Services window will be displayed.Click on the [Properties] tab.Click on [Connectivity] to expand the list of options.Click on [Protocols] to expand the list.Click on [LDAP Directory]. The LDAP Directory page will be displayed.Under the Server Information section, click on the [IP Address] or [Host Name] radio button.Enter the IP address or host name of the LDAP server.NOTE: If Host Name is selected, the DNS name must be configured within the TCP/IP screen.Enter the LDAP port. The default is 389.Enter the information for an alternate LDAP server, if required, in the Backup IP Address / Host Name and Port field.Click on the

2025-04-01
User6044

ProblemsUsing the Oracle ILOM Fault Management ShellProtocol Management CLI and Web ProceduresSNMP OverviewAbout Simple Network Management ProtocolSNMP ComponentsOracle ILOM SNMP MIBsConfiguring SNMP Settings in Oracle ILOMManaging SNMP Read and Write Access, User Accounts, and SNMP Trap Alerts (CLI)Managing SNMP Read and Write Access, User Accounts, and SNMP Trap Alerts (Web)Downloading SNMP MIBs Using Oracle ILOMManage User Accounts Using SNMPBefore You Begin - User Accounts (SNMP)Configuring User Accounts (SNMP)Configure User Accounts (SNMP)Configure Single Sign On (SNMP)Configuring Active Directory SettingsManage Active Directory Settings (SNMP)Manage Active Directory Administrator Groups (SNMP)Manage Active Directory Operator Group (SNMP)Manage Active Directory Custom Group (SNMP)Manage Active Directory User Domains (SNMP)Manage Active Directory Alternate Server (SNMP)Manage Server Redundancy (SNMP)Manage Active Directory DNS Locator (SNMP)Manage DNS Name Server Settings (SNMP)Configuring ILOM for LDAP (SNMP)Configure LDAP Settings (SNMP)Configuring ILOM for LDAP/SSLManage LDAP/SSL Certificate (SNMP)Manage LDAP/SSL Administrator Group (SNMP)Manage LDAP/SSL Operator Group (SNMP)Manage LDAP/SSL Custom Group (SNMP)Manage LDAP/SSL User Domain (SNMP)Configuring RADIUS Settings (SNMP)Configure RADIUS Settings (SNM))Manage Component Information and Email Alerts (SNMP)Before You Begin - Component Information (SNMP)Viewing Component InformationManaging Clock Settings, Event Log, Syslog Receiver, and Alert RulesConfiguring SMTP Client for Email Alert NotificationsConfiguring Email Alert Settings (SNMP)Configuring Telemetry Harness Daemon (SNMP)Monitor and Manage System Power (SNMP)Before You Begin - Power Management (SNMP)Monitoring the Power Consumption Interfaces (SNMP)Maintaining System Power Policy (SNMP)Managing System Power Properties (SNMP)Manage Oracle ILOM Firmware Updates (SNMP)Update Oracle ILOM Firmware (SNMP)Manage ILOM Backup and Restore Configurations (SNMP)View and Configure Backup and Restore Properties (SNMP)Manage SPARC Diagnostics, POST, and Boot Mode Operations (SNMP)Before You Begin - Manage SPARC Hosts (SNMP)Managing SPARC Diagnostic, POST, and Boot Mode Properties (SNMP)Server Managment Using IPMIIntelligent Platform Management Interface (IPMI)Configuring the IPMI StateUsing IPMItool to Run ILOM CLI CommandsPerforming System Management Tasks (IPMItool) IPMItool Utility and Command SummaryServer Management Using WS-Management and CIMWS-Management and CIM OverviewConfiguring Support for WS-Management in ILOMSupported DMTF SMASH Profiles, CIM Classes and CIM IndicationsOracle's Sun-Supported CIM ClassesDocument Conventions For Oracle's Sun-Supported CIM ClassesOracle_AssociatedIndicatorLEDOracle_AssociatedSensorOracle_ChassisOracle_ComputerSystemOracle_ComputerSystemPackageOracle_ContainerOracle_ElementCapabilitiesOracle_ElementConformsToProfileOracle_EnabledLogicalElementCapabilitiesOracle_HWCompErrorOkIndicationOracle_IndicatorLEDOracle_InstCreationOracle_InstDeletionOracle_LogEntryOracle_LogManagesRecordOracle_MemoryOracle_NumericSensorOracle_PhysicalAssetCapabilitiesOracle_PhysicalComponentOracle_PhysicalElementCapabilitiesOracle_PhysicalMemoryOracle_PhysicalPackageOracle_ProcessorOracle_ProcessorChipOracle_RealizesOracle_RegisteredProfileOracle_RecordLogOracle_ReferencedProfileOracle_SensorOracle_SpSystemComponentOracle_SystemDeviceOracle_ThresholdIndicationOracle_UseOfLogSNMP Command Examplessnmpget Commandsnmpwalk Commandsnmpbulkwalk Commandsnmptable Commandsnmpset Commandsnmptrapd CommandCMM Administration CLI and Web ProceduresOracle ILOM CMM OverviewAbout the Modular System ChassisOracle ILOM CMM Function OverviewOracle ILOM VersionsOracle ILOM CMM Documentation About This DocumentOracle ILOM CMM Initial SetupConnecting to the Oracle ILOM CMM Log In to the Oracle ILOM CMM Using a Network ConnectionActivating CMM Ethernet Ports Changing the Blade SP CLI PromptFirmware Update ProceduresUpdating the Oracle ILOM CMM FirmwareUpdating the NEM FirmwareUpdating Chassis Component Firmware Using the CMMResetting the Oracle ILOM CMMCMM Power ManagementLight Load Efficiency Mode (LLEM) Force Power Supply Fan SpeedDisabling the Power Management PolicyOracle ILOM 3.0 for Specific Sun Blade 6048 CasesSAS Zoning Chassis Blade Storage Resources Zone Management for Chassis-Level SAS-2 Capable ResourcesManageable SAS-2 Zoning-Capable DevicesSun Blade Zone Manager Properties Important SAS Zoning Allocations Considerations Enabling Zoning and Creating SAS-2 Zoning AssignmentsManaging Existing SAS-2 Storage Resource AllocationsResetting Sun Blade Zone Manager Allocations to Factory DefaultsResetting the Zoning Password to Factory Default for Third-Party In-Band Management GlossaryIndex Note - You can use the get and set commands to configure the LDAP/SSL Alternate Serversettings. For a description of the MIB objects used in

2025-04-22
User8968

HCL Sametime uses a number of ports on the server. This topic lists the default ports and their uses.About this task You can use the Sametime System Console to configure the ports on which the Sametime services listen for Connections from clients. The port settings for all services can be accessed from the Configuration Connectivity Networks and Ports options of the Sametime System Console. HTTP Services, Domino Services, LDAP Services, and Sametime intraserver ports The following ports are used by the Sametime HTTP Services, HCL Domino Application Services, and LDAP Services. HTTP Services, Domino Services, LDAP Services, and Sametime intraserver ports Table 1. Table 1. HTTP Services, Domino Services, LDAP Services, and Sametime intraserver ports Default ports used by the Sametime HTTP Services, HCL® Domino Application Services, and LDAP Services are explained in this table. Default Port Purpose Port 80 If the administrator allows HTTP tunneling on port 80 during the Sametime installation, the Community Services multiplexer on the Sametime Community Server listens for HTTP connections from web browsers, Sametime Connect clients, Sametime Meeting Room clients, and Sametime Recorded Meeting clients on port 80.If the administrator does not allow HTTP tunneling on port 80 during the Sametime installation, the Domino HTTP server listens for HTTP Connections on this port. Alternate HTTP port (8088) The administrator can optionally enable HTTP tunneling on port 80. The Domino HTTP server on which Sametime is installed must listen for HTTP Connections on a port other than port 80. The HTTP server can be changed to port 8088 to allow the Community Services to listen on port 80. Note: If the administrator allows HTTP tunneling on port 80 during the Sametime installation, web browsers make HTTP Connections to the Community Services multiplexer on port 80, and the Community Services multiplexer makes an intraserver connection to the Sametime HTTP server on port 8088 on behalf of the web browser. Port 389 This is the port for unsecure communications from the Community server to the LDAP server. Port 443 The Domino HTTP server listens for HTTPS Connections on this port by default. This port is used only if you have set up the Domino HTTP server to use Secure Sockets Layer (SSL) for web browsers. Port 636 The Community server communicates with LDAP securely using this port for directory services. Port 1352 The Domino server on which Sametime is installed listens for Connections from Notes clients and Domino servers on this port. Port 9092 The Event Server port on the Sametime Community Server is used for intraserver Connections between Sametime components. Make sure that this port is not used by other applications on the server. Port 9094 The Token Server port on the Sametime Community Server is used for intraserver Connections between Sametime components. Port 27017 The Community server communicates with MongoDB over this port. MongoDB is used for persistent chat. Community Services ports The following ports are used by the Sametime Community Services. Most of these ports are configurable. Community Services ports Table 2. Table 2.

2025-04-08
User6436

Load balanced PSMs, specify the address of the PSM load balancer. Configure the logon credentials by entering your Vault or LDAP username, according to the authentication process required in your environment. It is not recommended to save your Vault password locally. For authentication details, see Authentication If you do not configure the logon credentials, you will be prompted for them when the connection is made. Configure the Start Program setting to include the connection details to the target system. For details, see Configure an RDP Start Program Configure an RDP File Use the following procedure to configure an RDP file to connect through PSM to the target system. Create an RDP file. Configure the following RDP settings as described below: Setting RDP Parameter Type Description full address s The address of the PSM server through which you want to establish your connection. The PSM address can be entered either as a DNS name, or an IP address in IPV4 format. In an environment with load balanced PSMs, specify the address of the PSM load balancer. alternate shell s The connection details including the target user, target machine and connection component. For details, see Configure an RDP Start Program. username s Enter your Vault or LDAP username, according to the authentication process required in your environment. If you do not configure your username, you will be prompted for it when the connection is made. You will also be prompted for your password. It is not recommended to save your Vault password in the RDP file. For details, see Authentication Repeat for each target system to which you want to connect. Following is an example of an RDP file that was configured to connect through PSM: Connect with MSTSC Use the following procedure to configure MSTSC to connect through PSM to the target machine. Open MSTSC The Remote Desktop Connection window opens. You can also execute MSTSC through the command line using: MSTSC /v: In the Computer field, enter the address of the PSM server, through which you will establish the connection. The PSM address can be entered either as a DNS name, or as an IP address in IPV4 format. In an environment with load balanced PSMs, specify the address of the PSM load balancer. Open Show Options. In the User name field, enter your Vault or LDAP username, according to the authentication process required in your environment. Enter your Vault

2025-04-16

Add Comment