Home
last modified time | relevance | path

Searched refs:DN (Results 1 – 25 of 166) sorted by relevance

1234567

/netbsd-src/external/bsd/openldap/dist/tests/scripts/
H A Dtest026-dn68 DN="OU=Sales+CN=J. Smith,DC=example,DC=net"
69 echo "Searching database for DN=\"$DN\"..."
70 echo "# Searching database for DN=\"$DN\"..." >> $SEARCHOUT
72 "(member=$DN)" >> $SEARCHOUT 2>&1
81 DN="testUUID=597ae2f6-16a6-1027-98f4-ABCDEFabcdef,DC=Example"
82 echo "Searching database for entryUUID-named DN=\"$DN\"..."
83 echo "# Searching database for entryUUID-named DN=\"$DN\"..." >> $SEARCHOUT
85 "(member=$DN)" \
95 DN="dc=example,dc=com"
96 echo "Searching database for nameAndOptionalUID=\"$DN\"..."
[all …]
H A Dtest032-chain156 DN="cn=Mark Elliot,ou=Alumni Association,ou=People,$BASEDN"
157 echo "Comparing \"$DN\" on server $n..."
158 $LDAPCOMPARE -H $URI "$DN" "cn:Mark Elliot" \
168 DN="ou=Other,$BASEDN"
169 echo "Comparing \"$DN\" on server $n with manageDSAit control..."
170 $LDAPCOMPARE -H $URI -M "$DN" "ou:Other" \
/netbsd-src/external/bsd/openldap/dist/tests/data/
H A Ddn.out11 description: RFC 1779 compliant DN string representation
16 description: RFC 2253 compliant DN string representation
58 description: "member" values contain specific DN forms;
59 description: "seeAlso" values contain DN forms already defined as "member",
62 description: "seeAlso" DN string representations used above.
85 only DN portion
86 description: #'1'B // empty "" DN
87 description: #'0010'B // empty "" DN with leading '0's
88 description: dc=example,dc=com#'1000'B // with DN portion
89 description: dc=example,dc=com#''B // with DN portion + bitstring with no bits
[all …]
H A Dtest-dn.ldif11 description: RFC 2253 compliant DN string representation
16 # at least one member must be present; thus we use the entry's DN
18 # specific DN forms
28 # DN forms already defined as "member" in a different string representation
33 description: "member" values contain specific DN forms;
34 description: "seeAlso" values contain DN forms already defined as "member",
37 description: "seeAlso" DN string representations used above.
178 description: RFC 1779 compliant DN string representation
216 # Other DN-related syntaxes
230 description: cn=Name and Optional UID,ou=Related Syntaxes,dc=example,dc=com // only DN portion
[all …]
/netbsd-src/external/bsd/openldap/dist/doc/guide/admin/
H A Dsasl.sdf96 mapping authentication identities to LDAP {{TERM:DN}}'s, which
139 associates an authentication request DN of the form:
147 {{EX:kurt@EXAMPLE.COM}} would have the associated DN:
152 associated DN:
157 The authentication request DN can be used directly in ACLs and
159 LDAP DN format. Or alternatively, the authentication DN could be
164 an extra component in the authorization DN, regardless of any
214 DN}} of the form
219 authentication request DN would be:
223 This authentication request DN can be used directly ACLs or,
[all …]
H A Daccess-control.sdf41 > [dn[.<basic-style>]=<regex> | dn.<scope-style>=<DN>]
48 > | dn[.<basic-style>]=<regex> | dn.<scope-style>=<DN>]
76 commonly selected in two ways: by DN and by filter. The following
77 qualifiers select entries by DN:
81 > to dn.<scope-style>=<DN>
85 the target entry's {{normalized DN}}. (The second form is not
87 select entries which are within the requested scope of DN. The
88 <DN> is a string representation of the Distinguished Name, as
93 provided DN, {{EX:one}} matches the entries whose parent is the
94 provided DN, {{EX:subtree}} matches all entries in the subtree whose
[all …]
H A Dslapdconfig.sdf315 DN.
333 H4: rootdn <DN>
335 This directive specifies the DN that is not subject to
337 operations on this database. The DN need not refer to
339 DN may refer to a SASL identity.
355 This directive can be used to specifies a password for the DN for
356 the rootdn (when the rootdn is set to a DN within the database).
374 This directive specifies the DN suffix of queries that will be
383 Queries with a DN ending in "dc=example,dc=com"
396 > searchbase=<base DN>
[all …]
H A Dtls.sdf27 The {{TERM:DN}} of a server certificate must use the {{EX:CN}}
36 The DN of a client certificate can be used directly as an
37 authentication DN.
39 is also based on X.500, both use the same DN formats and
40 generally the DN in a user's X.509 certificate should be
41 identical to the DN of their LDAP entry. However, sometimes
/netbsd-src/external/bsd/openldap/dist/servers/slapd/back-ldap/
H A DTODO.proxy16 It could do some rewriting to map everything that comes in with a base DN
18 everything that comes in with a base DN of "o=Branch 2, dc=company, dc=net"
20 base. Everything that comes in with a base DN of "dc=company, dc=net" should
38 exact DN exact parent ancestor
50 The backend must rely on a DN fetching mechanism. Each operation requires
61 Two layers of depth in DN fetching are envisaged.
63 retrieved entries. The cache relates each RDN (i.e. the DN apart from the
77 Again, the lag between the fetching of the required DN and the actual
84 cache-level DN fetch.
93 by performing a cache DN fetch of the base first.
[all …]
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/hx509/data/
H A Dnist-data2148 # 4.13.1 Valid DN nameConstraints Test1 - Validate Successfully
150 # 4.13.2 Invalid DN nameConstraints Test2 - Reject - name constraints violation
152 # 4.13.3 Invalid DN nameConstraints Test3 - Reject - name constraints violation
154 # 4.13.4 Valid DN nameConstraints Test4 - Validate Successfully
156 # 4.13.5 Valid DN nameConstraints Test5 - Validate Successfully
158 # 4.13.6 Valid DN nameConstraints Test6 - Validate Successfully
160 # 4.13.7 Invalid DN nameConstraints Test7 - Reject - name constraints violation
162 # 4.13.8 Invalid DN nameConstraints Test8 - Reject - name constraints violation
164 # 4.13.9 Invalid DN nameConstraints Test9 - Reject - name constraints violation
166 # 4.13.10 Invalid DN nameConstraints Test10 - Reject - name constraints violation
[all …]
/netbsd-src/external/bsd/openldap/dist/doc/rfc/
H A Drfc4514.txt45 The structure of a DN [X.501] is described in terms of ASN.1 [X.680].
70 RECOMMENDED algorithm for converting a DN from its ASN.1 structured
71 representation to a string. Section 3 details how to convert a DN
74 While other documents may define other algorithms for converting a DN
357 Implementations MAY recognize other DN string representations.
358 However, as there is no requirement that alternative DN string
360 SHOULD only generate DN strings in accordance with Section 2 of this
630 may be desirable to present non-translated DN strings to users. This
632 DN strings. Issues with presentation of translated DN strings are
636 This appendix provides guidance for applications presenting DN
[all …]
H A Drfc3296.txt100 Distinguished Name (DN) [RFC2253].
152 contain a non-empty DN. The handling of LDAP URLs with absent or
153 empty DN parts or with explicit scope specifier is not defined by
182 component of an entry's DN [RFC2253].
242 Typically the DN of the referral object and the DN of the object in
321 modify, and modify DN operations. If the client requests any of
325 The DN part MUST be modified such that it refers to the appropriate
327 DN to be returned is the same as the target DN, the DN part SHOULD
400 has a DN of "CN=Manager,OU=Roles,O=MNN,C=WW", the server will
407 Note that the DN part of the LDAP URL is modified such that it
[all …]
H A Drfc2377.txt217 distinguished name (DN) would then be
274 different attributes but the same DN) in different (e.g.
312 information encoded in his/her own DN. Names that are totally opaque
318 behind the terms distinguished name (DN) and relative distinguished
328 [3][10]. It is used in the construction of a DN from a domain name.
343 construct the DN
347 from its domain name. It would then use this DN as the root of its
350 The DN itself can be used to identify a directory organization object
354 The subordinates of the DN will be directory objects related to the
418 his/her DN, there is some hope that it will be recognizable when such
[all …]
H A Drfc5020.txt67 is identified by its distinguished name (DN) [RFC4512]. However, as
68 an entry's DN is not an attribute of the entry, it is not possible to
98 current DN.
104 DESC 'DN of the entry'
119 Note that the DN of the entry cannot be modified through this
125 entry's DN, the introduction of this attribute is not believed to
H A Drfc3088.txt85 2.1. DN to Domain Name Mapping
87 The service maps a DN [RFC2253] to a fully qualified domain name
151 the root of the domain tree to a DN. We suggest the root of the
155 DN "DC=example,DC=net", not to "DC=example,DC=net,DC=.". As it is
156 not our intent to introduce or support an alternative domain to DN
161 DN "DC=example,DC=net", not to "DC=example,DC=.,DC=net". As it is
162 not our intent to introduce or support an alternative domain to DN
178 be coded to return invalid DN error.
234 return a referral result if the target (or base) DN can be mapped to
275 If DNS location information is available for the base DN itself, the
/netbsd-src/external/bsd/openldap/dist/doc/drafts/
H A Ddraft-ietf-ldapext-locate-xx.txt73 Name (DN) [2] on which the operation is performed. A client, or a
75 server(s) that hold the naming context containing that DN, since
122 This section defines a method of converting a DN into a DNS domain
128 The output domain name is initially empty. The DN is processed in
138 processing stops, the DN cannot be converted into a domain name.
140 For DN:
166 domain name formed by converting the DN of a naming context mastered
180 server for a particular DN converts that DN to a domain name using
185 for the DN "ou=foo,dc=example,dc=net" that supports the TCP protocol
198 matching SRV records available for the converted DN the client SHOULD
[all …]
H A Ddraft-sermersheim-ldap-distproc-xx.txt162 distinguished name (DN). Operation evaluation is the act of
397 DN of the operation being progressed. This field must be allowed
423 populated with an empty DN.
473 subtree of entries below the base DN, but does not include the base
474 DN itself. This is used here when progressing distributed search
585 This field contains the new target (or base) DN for the operation.
589 the case where an alias has been dereferenced while resolving the DN,
601 than the base DN held in the ChainedRequestValue.operationRequest.
613 DN to name the immediate superior of a context prefix.
620 DSA and DN that has already been contacted while attempting to
[all …]
/netbsd-src/external/bsd/openldap/dist/contrib/slapd-modules/variant/tests/data/
H A Dtest011-out.ldif5 Matched DN: cn=Gern Jensen,ou=Information Technology Division,ou=People,dc=example,dc=com
9 Matched DN: cn=Gern Jensen,ou=Information Technology Division,ou=People,dc=example,dc=com
/netbsd-src/external/bsd/openldap/dist/contrib/slapd-modules/nssov/
H A DREADME83 inherently secure. Two methods of mapping the PAM username to an LDAP DN
86 this case, a DN of the form
88 is fed into the regexp matcher. If a match is produced, the resulting DN
93 If no DN is found, the overlay returns PAM_USER_UNKNOWN. If the DN is
/netbsd-src/crypto/external/bsd/openssl/dist/doc/internal/man3/
H A Dossl_cmp_hdr_init.pod65 is the NULL-DN.
72 If B<nm> is NULL, recipient is set to the NULL DN (the empty list of strings).
113 to the client it set to the NULL-DN. In this case for identification at least
128 ossl_cmp_general_name_is_NULL_DN() returns 1 given a NULL-DN, else 0.
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/
H A DX509_check_host.pod86 to consider the subject DN even if the certificate contains at least
88 address as appropriate); the default is to ignore the subject DN
92 consider the subject DN even if the certificate contains no subject alternative
94 is to use the subject DN when no corresponding subject alternative names are
98 precedence and the subject DN is not checked for matching names.
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/
H A DX509_check_host.pod91 to consider the subject DN even if the certificate contains at least
93 address as appropriate); the default is to ignore the subject DN
97 consider the subject DN even if the certificate contains no subject alternative
99 is to use the subject DN when no corresponding subject alternative names are
103 precedence and the subject DN is not checked for matching names.
H A DX509V3_set_ctx.pod26 contained in a subject DN, the subject DN is taken from I<subject> or I<req>.
/netbsd-src/external/bsd/openldap/dist/servers/slapd/back-relay/
H A DREADME6 The DN rewrite, filter rewrite and attributeType/objectClass
21 database selection and DN rewriting.
71 # old fashioned suffixalias, applied also to DN-valued attributes
/netbsd-src/external/bsd/openldap/dist/servers/slapd/schema/
H A Dcosine.ldif57 4: DN of manager' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115
69 'RFC1274: DN of author of document' EQUALITY distinguishedNameMatch SYNTAX 1
79 1274: DN of secretary' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.146
96 'RFC1274: DN of entry associated with domain' EQUALITY distinguishedNameMatc

1234567