How To install OpenDJ
1. Download and copy the “OpenDJ-2.5.0-Xpress1” to server location home/Ubuntu
(Make sure jdk1.6 already installed)
2. Setup script is there. Need to run that script in silent mode
(command line)3. Chnage the owner ship of Ubuntu user for all script and folder.
Chown –R Ubuntu:Ubuntu / OpenDJ-2.5.0-Xpress1/*
4. ubuntu@test.com:~/opendj$ ./setup --cli
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FORGEROCK OPEN IDENTITY STACK DEVELOPMENT LICENSE
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
This license applies to this copy of ForgeRock's Open Identity Stack software,
which includes OpenAM, OpenIDM and OpenDJ software, when used for development
or testing purposes. To obtain a license to use the Open Identity Stack under
conditions other than for testing or development purposes please contact
ForgeRock at sales@forgerock.com.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
If you intend to or do use the ForgeRock Product only for the purposes of
developing, testing, prototyping and/or demonstrating your application, then
ForgeRock grants you a nonexclusive, nontransferable, limited license to use
the ForgeRock Product only for those purposes, and not for any other purpose.
In such case, the ForgeRock product is made available to you AS IS and without
warranty of any kind. ForgeRock may audit your use of the ForgeRock Product for
compliance with these terms and confirmation that a commercial or production
license is not required.
enter into a ForgeRock Software License and Subscription Agreement, pay the
associated Fees, and comply with all terms and conditions of that Agreement.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
You must accept the terms of the
agreement before continuing with the
installation.
Accept the license (Yes/No) [No]:yes
Please wait while the setup program
initializes...
Server? [cn=Directory Manager]:cn=Directory Manager
Please provide the password to use
for the initial root user:*******
Please re-enter the password for
confirmation:********
generating self-signed certificates
for LDAP SSL/StartTLS, the administration
connector, and replication
[localhost]:ldap.test.com
LDAP clients? [1389]: 1389
connections? [4444]: 4444
Options for populating the
database:
1) Only create the base entry
2) Leave the database empty
3) Import data from an LDIF file
4) Load automatically-generated
sample data
On which port would you like the
Directory Server to accept connections from
LDAPS clients? [1636]: 1636Certificate server options:
only)
2) Use an existing certificate
located on a Java Key Store (JKS)
3) Use an existing certificate located
on a JCEKS key store
4) Use an existing certificate
located on a PKCS#12 key store5) Use an existing certificate on a PKCS#11 token
no) [yes]: no
Setup Summary
=============
LDAP Listener Port: 1389
Administration Connector Port: 4444
LDAP Secure Access: Enable StartTLS
Enable SSL on
LDAP Port 1636
Create a new
Self-Signed Certificate
Root User DN: cn=Directory Manager
Directory Data: Create New Base DN
dc=test,dc=com.
Base DN Data: Only Create Base
Entry (dc=test,dc=com)
2) Provide the setup parameters
again
3) Print equivalent
non-interactive command-line
4) Cancel and exit
--cli \
--baseDN dc=weh,dc=com \
--addBaseEntry \
--ldapPort 1389 \
--adminConnectorPort 4444 \
--rootUserDN cn=Directory\ Manager \
--rootUserPassword ****** \
--doNotStart \
--enableStartTLS \
--ldapsPort 1636 \
--generateSelfSignedCertificate \
--hostName localhost \
--no-prompt \
--noPropertiesFile
2) Provide the setup parameters
again
3) Print equivalent
non-interactive command-line
4) Cancel and exit
Configuring Directory Server ..... Done.
Configuring Certificates ..... Done.
Creating Base Entry dc=test,dc=com ..... Done.
5.Now You can check LDAP status from admin console or you can connect
with any LDAP browser.
No comments:
Post a Comment