2. A Quick-Start Guide
The following is a quick start guide to OpenLDAP 2.0 software, including the stand-alone LDAP daemon, slapd(8).
It is meant to step you through the basic steps needed to install and configure OpenLDAP software. It should be used in conjunction with the other chapters of this document, manual pages, and other materials provided with the distribution (e.g. the INSTALL document) or on the OpenLDAP web site (in particular, the OpenLDAP Software FAQ).
If you intend to run OpenLDAP seriously, you should review the all of this document before attempt to install the software.
Note: This quick start guide does not use strong authentication nor any privacy and integrity protection services. These services are described in other chapters of the OpenLDAP Administrator's Guide.
- Get the software
You can obtain a copy of the software by following the instructions on the OpenLDAP download page (http://www.openldap.org/software/download/). It is recommended that new users start with the (latest) release.
- Unpack the distribution
Pick a directory for the LDAP source to live under, change directory to there, and unpack the distribution using the following commands:
gunzip -c openldap-VERSION.tgz | tar xvfB -
then relocate yourself into the distribution directory:
You'll have to replace VERSION with the version name of the release.
- Review documentation
You should now review the COPYRIGHT, LICENSE, README and INSTALL documents provided with the distribution. The COPYRIGHT and LICENSE provide information on acceptable use, copying, and limitation of warranty of OpenLDAP software.
You should also review other chapters of this document. In particular, the Building and Installing OpenLDAP Software chapter of this document provides detailed information on prerequisite software and installation procedures.
- Run configure
You will need to run the provided configure script to configure to the distribution for building on your system. The configure script accepts many command line options that enable or disable optional software features. Usually the defaults are okay, but you may want to change them. To get a complete list of options that configure accepts, use the --help option:
However, given that you using this guide, we'll assume you'll are brave enough to just let configure to determine what's best:
Assuming configure doesn't dislike your system, you can proceed with building the software. If configure did complain, well, you'll likely need to go to the FAQ Installation Section (http://www.openldap.org/faq/ and/or actually read the Building and Installing OpenLDAP Software chapter of this document.
- Build the software.
The next step is to build the software. This step has two parts, first we construct dependencies and then we compile the software:
Both makes should complete without error.
- Test the build.
To ensure a correct build, you should run the test suite (it only takes a few minutes):
Tests which apply to your configuration will run and they should pass. Some tests, such as the replication test, may be skipped.
- Install the software.
You are now ready to install the software, this usually requires super-user privledges:
su root -c 'make install'
Everything should now be installed under /usr/local (or whatever installation prefix was used by configure.
- Edit the configuration file.
Use your favorite editor to edit the provided slapd.conf(5) example (usually installed as /usr/local/etc/openldap/slapd.conf) to contain an LDBM database definition of the form:
Be sure to replace <MY-DOMAIN> and <COM> with the appropriate domain components of your domain name. For example, for example.com, use:
If your domain contains additional components, such as eng.uni.edu.eu, use:
Details regarding configuring slapd(8) can be found in the slapd.conf(5) manual page and the The slapd Configuration File chapter of this document.
- Start SLAPD.
You are now ready to start the stand-alone LDAP server, slapd(8), by running the command:
su root -c /usr/local/libexec/slapd
To check to see if the server is running and configured correctly, you can run a search against it with ldapsearch(1). By default, ldapsearch is installed as /usr/local/bin/ldapsearch:
ldapsearch -x -b '' -s base '(objectclass=*)' namingContexts
Note the use of single quotes around command parameters to prevent special characters from being interpreted by the shell. This should return:
Details regarding running slapd(8) can be found in the slapd(8) manual page and the Running slapd chapter of this document.
- Add initial entries to your directory.
You can use ldapadd(1) to add entries to your LDAP directory. ldapadd expects input in LDIF form. We'll do it in two steps:
- create an LDIF file
- run ldapadd
Use your favorite editor and create an LDIF file that contains:
o: <MY ORGANIZATION>
Be sure to replace <MY-DOMAIN> and <COM> with the appropriate domain components of your domain name. <MY ORGANIZATION> should be replaced with the name of your organization. If you cut and paste, be sure to trim any leading and trailing whitespace from the example.
o: Example Company
Now, you may run ldapadd(1) to insert these entries into your directory.
ldapadd -x -D "cn=Manager,dc=<MY-DOMAIN>,dc=<COM>" -W -f example.ldif
Be sure to replace <MY-DOMAIN> and <COM> with the appropriate domain components of your domain name. You will be prompted for the "secret" specified in slapd.conf. For example, for example.com, use:
ldapadd -x -D "cn=Manager,dc=example,dc=com" -W -f example.ldif
where example.ldif is the file you created above.
Additional informaton regarding directory creation can be found in the Database Creation and Maintenance Tools chapter of this document.
- See if it works.
Now we're ready to verify the added entries are in your directory. You can use any LDAP client to do this, but our example uses the ldapsearch(1) tool. Remember to replace dc=example,dc=com with the correct values for your site:
ldapsearch -x -b 'dc=example,dc=com' '(objectclass=*)'
This command will search for and retrieve every entry in the database.
You are now ready to add more entries using ldapadd(1) or another LDAP client, experiment with various configuration options, backend arrangements, etc.
Note that by default, the slapd(8) database grants read access to everybody excepting the super-user (as specified by the rootdn configuration directive). It is highly recommended that you establish controls to restrict access to authorized users. Access controls are discussed in the Access Control section of the The slapd Configuration File chapter.
The following chapters provide more detailed information on making, installing, and running slapd(8).