Show Table of Contents
Plug-in-specific Configuration Parameters Take Precedence over Old-style
URLs for git repositories in
Directory Server Console logins fail using the
Release Notes
Red Hat Directory Server 10
Highlighted features and updates related to Red Hat Directory Server 10 (10.0 - 10.3)
Abstract
This document describes all highlighted features, bug fixes, and known issues in Red Hat Directory Server 10.
Chapter 1. Software Conflicts
Directory Server cannot be installed on any system that has a Red Hat Enterprise Linux Identity Management server (also called IPA server) installed. Likewise, no Red Hat Enterprise Linux Identity Management server can be installed on a system with a Directory Server instance.
Chapter 2. Directory Server 10.3
2.1. System Requirements
This section contains information related to installing and upgrading to Directory Server 10.3, including prerequisites and platform requirements.
2.1.1. Supported Platforms for Directory Server
Red Hat supports Directory Server 10.3 on the following platforms:
- Red Hat Enterprise Linux 7.6 or later
Note
Directory Server 10.3 is supported running on a Red Hat Enterprise Linux virtual guest on a certified hypervisor. For details, see the Which hypervisors are certified to run Red Hat Enterprise Linux? solution article.
2.1.2. Supported Platforms for Directory Server Console
Red Hat supports running the Directory Server Console on the following platforms:
- Red Hat Enterprise Linux 7.6 or later
- Microsoft Windows Server 2016
- Microsoft Windows Server 2012 R2
- Microsoft Windows 10 (64-bit)
- Microsoft Windows 8.1 (64-bit)
2.1.2.1. Required Java Runtime Environment
The Directory Server Console requires one of the following Java Runtime Environments:
- OpenJDK 1.8.0 for Red Hat Enterprise Linux
- Oracle Java Runtime Environment (JRE) 8
- Oracle Java Runtime Environment (JRE) 9
Note
To run Red Hat Directory Server Console on Microsoft Windows, you must install a 64-bit JRE.
2.1.3. Supported Platforms for Windows Synchronization Utility
The Windows Synchronization utility for Directory Server 10.3 is supported for:
- Active Directory on Microsoft Windows Server 2016
- Active Directory on Microsoft Windows Server 2012 R2
2.1.4. Web Application Browser Support
Directory Server 10.3 supports for web-based interfaces, such as Admin Express and online help tools:
- Mozilla Firefox ESR 60 and later
2.2. Highlighted Updates and New Features
This section documents new features and important updates in Directory Server 10.3:
Directory Server rebased to version 1.3.8.4
The 389-ds-base packages have been upgraded to upstream version 1.3.8.4, which provides a number of bug fixes and enhancements over the previous version. For a complete list of notable changes, read the upstream release notes before updating:
2.3. Bug Fixes
This section describes bugs fixed in Directory Server 10.3 that have a significant impact on users:
Bug Fixes in the 389-ds-base Package
Bug fixes in Red Hat Directory Server, that are included in the 389-ds-base package, are documented in Red Hat Enterprise Linux 7.6 Release Notes:
2.4. Known Issues
This section documents known problems and, if applicable, workarounds in Directory Server 10.3:
Previously Unresolved Known Issues in Red Hat Directory Server 10.3
2.5. Deprecated Functionality
This section describes deprecated functionality in Directory Server 10.3:
The Perl and shell scripts for Directory Server have been deprecated
The Perl and shell scripts, which are provided by the 389-ds-base package, have been deprecated. The scripts will be replaced by new utilities in the next major release of Red Hat Directory Server.
The Shell Scripts and Perl Scripts sections in the Red Hat Directory Server Command, Configuration, and File Reference have been updated. The descriptions of affected scripts contain now a note that they are deprecated.
The Directory Server Console has been deprecated
The Java-based Directory Server Console has been deprecated and will be replaced in the next major release of Red Hat Directory Server.
Chapter 3. Directory Server 10.2
3.1. System Requirements
This section contains information related to installing and upgrading to Directory Server 10.2, including prerequisites and platform requirements.
3.1.1. Supported Platforms for Directory Server
Red Hat supports Directory Server 10.2 on the following platforms:
- Red Hat Enterprise Linux 7.5 or later
Note
Directory Server 10.2 is supported running on a Red Hat Enterprise Linux virtual guest on a certified hypervisor. For details, see the Which hypervisors are certified to run Red Hat Enterprise Linux? solution article.
3.1.2. Supported Platforms for Directory Server Console
Red Hat supports running the Directory Server Console on the following platforms:
- Red Hat Enterprise Linux 7.5 or later
- Microsoft Windows Server 2016
- Microsoft Windows Server 2012 R2
- Microsoft Windows 10 (64-bit)
- Microsoft Windows 8.1 (64-bit)
3.1.2.1. Required Java Runtime Environment
The Directory Server Console requires one of the following Java Runtime Environments:
- OpenJDK 1.8.0 for Red Hat Enterprise Linux
- Oracle Java Runtime Environment (JRE) 8
- Oracle Java Runtime Environment (JRE) 9
Note
To run Red Hat Directory Server Console on Microsoft Windows, you must install a 64-bit JRE.
3.1.3. Supported Platforms for Windows Synchronization Utility
The Windows Synchronization utility for Directory Server 10.2 is supported for:
- Active Directory on Microsoft Windows Server 2016
- Active Directory on Microsoft Windows Server 2012 R2
3.1.4. Web Application Browser Support
Directory Server 10.2 supports for web-based interfaces, such as Admin Express and online help tools:
- Mozilla Firefox ESR 52 and later
3.2. Highlighted Updates and New Features
This section documents new features and important updates in Directory Server 10.2:
Directory Server rebased to version 1.3.7.5
The 389-ds-base packages have been upgraded to upstream version 1.3.7.5, which provides a number of bug fixes and enhancements over the previous version. For a complete list of notable changes, read the upstream release notes before updating:
Highlighted Updates and New Features in the 389-ds-base Package
Features in Red Hat Directory Server, that are included in the 389-ds-base package, are documented in Red Hat Enterprise Linux 7.5 Release Notes:
3.3. Bug Fixes
This section describes bugs fixed in Directory Server 10.2 that have a significant impact on users:
Bug Fixes in the 389-ds-base Package
Bug fixes in Red Hat Directory Server, that are included in the 389-ds-base package, are documented in Red Hat Enterprise Linux 7.5 Release Notes:
3.4. Known Issues
This section documents known problems and, if applicable, workarounds in Directory Server 10.2:
Known Issues in the 389-ds-base Package
Known Issues in Red Hat Directory Server, that are included in the 389-ds-base package, are documented in Red Hat Enterprise Linux 7.5 Release Notes:
Previously Unresolved Known Issues in Red Hat Directory Server 10.2
Chapter 4. Directory Server 10.1.1
4.1. System Requirements
This section contains information related to installing and upgrading to Directory Server 10.1.1, including prerequisites and platform requirements.
4.1.1. Supported Platforms for Directory Server
Red Hat supports Directory Server 10.1.1 on the following platforms:
- Red Hat Enterprise Linux 7.4 or later
Note
Directory Server 10.1.1 is supported running on a Red Hat Enterprise Linux virtual guest on a certified hypervisor. For details, see the Which hypervisors are certified to run Red Hat Enterprise Linux? solution article.
4.1.2. Supported Platforms for Directory Server Console
Red Hat supports running the Directory Server Console on the following platforms:
- Red Hat Enterprise Linux 7.4 or later
- Microsoft Windows Server 2016
- Microsoft Windows Server 2012 R2
- Microsoft Windows Server 2012
- Microsoft Windows 10 (64-bit)
- Microsoft Windows 8.1 (64-bit)
4.1.2.1. Required Java Runtime Environment
The Directory Server Console requires:
- OpenJDK 1.8.0 for Red Hat Enterprise Linux
- Oracle Java Runtime Environment (JRE) 8
Note
To run Red Hat Directory Server Console on Microsoft Windows, you must install a 64-bit JRE.
4.1.3. Supported Platforms for Windows Synchronization Utility
The Windows Synchronization utility for Directory Server 10.1.1 is supported for:
- Active Directory on Microsoft Windows Server 2016
- Active Directory on Microsoft Windows Server 2012 R2
4.1.4. Web Application Browser Support
For web-based interfaces, such as Admin Express and online help tools, Directory Server 10.1.1 supports:
- Mozilla Firefox ESR 52 and later
4.2. Highlighted Updates and New Features
This part documents new features and important updates in Directory Server 10.1.1:
Highlighted Updates and New Features in the 389-ds-base Package
Features in Red Hat Directory Server, that are included in the 389-ds-base package, are documented in Red Hat Enterprise Linux 7.4 Release Notes:
4.3. Bug Fixes
This part describes bugs fixed in Directory Server 10.1.1 that have a significant impact on users:
Bug Fixes in the 389-ds-base Package
Bug fixes in Red Hat Directory Server, that are included in the 389-ds-base package, are documented in Red Hat Enterprise Linux 7.4 Release Notes:
4.4. Known Issues
This part documents known problems and, if applicable, workarounds in Directory Server 10.1.1:
Plug-in-specific Configuration Parameters Take Precedence over Old-style nsslapd-pluginarg* Parameters
In Red Hat Directory Server 10, you can configure certain plug-ins, such as
Attribute Uniqueness and Referential Integrity, using either the new plug-in configuration parameters or the old-style nsslapd-pluginarg* parameters. If both parameters types are present in the plug-in configuration, the new configuration parameters take precedence and the old plug-in argument style parameters are ignored.
To avoid problems, Red Hat recommends using the Advanced Editor in the Directory Server Console to configure a plug-in's arguments. For further details, see the corresponding section in the Red Hat Directory Server Administration Guide.
Previously Unresolved Known Issues in Red Hat Directory Server 10.1.1
Chapter 5. Red Hat Directory Server 10.1
5.1. System Requirements
This section contains information related to installing and upgrading Red Hat Directory Server 10.1, including prerequisites and hardware or platform requirements.
5.1.1. Required JRE
Red Hat Directory Server 10.1 requires Oracle Java Runtime Environment (JRE) 1.8.0 or OpenJDK 1.8.0 for Red Hat Enterprise Linux. Note that you only need the JRE for the Directory Server Console.
Important
It is not possible to manage instances of Directory Server older than 8.1 (which used JDK 1.5) with the 10.1 Directory Server Console because they are using different JRE versions. You must migrate any older instance to Directory Server 10.1 if you need to manage that instance with the Directory Server Console.
5.1.2. Supported Platforms for Directory Server
Directory Server 10.1 is supported on the following platforms:
- Red Hat Enterprise Linux 7.3 or later
Note
Red Hat Directory Server 10.1 is supported running on a Red Hat Enterprise Linux virtual guest on a certified hypervisor. For details, see the Which hypervisors are certified to run Red Hat Enterprise Linux? solution article.
5.1.3. Supported Platforms for Directory Server Console
The Directory Server Console is supported on the following platforms:
- Red Hat Enterprise Linux 7.3 or later
- Red Hat Enterprise Linux 6.8 or later
- Microsoft Windows Server 2012 R2
- Microsoft Windows Server 2012
- Microsoft Windows 10 (64-bit)
- Microsoft Windows 8.1 (64-bit)
Note
Note that on Microsoft Windows, 64-bit JRE is required for the Windows Console as Red Hat Directory Server 10.1 only provides 64-bit version of it.
5.1.4. Supported Platforms for Windows Synchronization Tool
The Windows Sync utility runs on these Windows platforms:
- Active Directory on Microsoft Windows Server 2012 R2
- Active Directory on Microsoft Windows Server 2012
- Active Directory on Microsoft Windows Server 2008 R2
5.1.5. Web Application Browser Support
Directory Server 10.1 supports the following browsers to access web-based interfaces, such as Admin Express and online help tools:
- Mozilla Firefox 31.x or later
5.2. Highlighted Updates and New Features
Important
Note that this document only contains release notes for features which are not available in the base Red Hat Enterprise Linux 7.3 release. Many of the new features and bug fixes in Red Hat Directory Server are in the 389-ds-base package, and those are documented in Red Hat Enterprise Linux 7.3 Release Notes.
Directory Server 10.1 has introduced the following new features and important updates to make managing the directory service and its data easier and more secure:
Setup can now complete even if the FQDN cannot be strictly resolved
Previously, when creating a server instance, the setup script checked that the fully qualified domain name (FQDN) can be strictly resolved, and did not continue if that was not the case. This prevented the setup from completing on certain configurations, such as cases where
ns-slapd was located behind a load balancing server.
This update adds a way to circumvent this requirement by setting the
General.StrictHostCheck=false option by using it on the command line when running the setup-ds-admin.pl script, or in the configuration .inf file during a silent setup. If you use this option, the setup script will accept the FQDN specified by General.FullMachineName without checking it against the DNS server.
Directory Console now supports additional operating systems
The Directory Console now supports additional operating systems. For details, see Section 5.1.4, “Supported Platforms for Windows Synchronization Tool”.
Log files are now displayed separately in the Administration Server Console
Previously, the log files displayed in the Administration Server Console under the Configuration tab were named Accesses and Errors. With this update, each log file (Access log, Error log, Audit log and Audit fail log) is displayed separately with an appropriate title, which is clearer and more precise.
5.3. Bug Fixes
Important
Note that this document only contains release notes for features which are not available in the base Red Hat Enterprise Linux 7.3 release. Many of the new features and bug fixes in Red Hat Directory Server are in the 389-ds-base package, and those are documented in Red Hat Enterprise Linux 7.3 Release Notes.
Directory Server 10.1 fixes the following bugs:
Ownership and file mode of certificate files is now correctly reset during upgrade
Previously, the backup process for certificate files during an upgrade did not honor file ownership and file modes. This bug has been fixed and the upgrade process now correctly preserves both.
The Administration Console no longer uses outdated ciphers
Previously, the default cipher suite selected when enabling
SSL using the Administration Console was the outdated fortezza cipher suite. Consequently, the Directory Server logged the following error messages when starting:
SSL alert: Cipher suite fortezza_null is not available in NSS 3.19. Ignoring fortezza_null SSL alert: Cipher suite fortezza is not available in NSS 3.19. Ignoring fortezza SSL alert: Cipher suite fortezza_rc4_128_sha is not available in NSS 3.19. Ignoring fortezza_rc4_128_sha
With this update, the Console does not enable the
fortezza cipher suite by default. As a result, Directory Server does not use outdated ciphers by default in this situation.
An obsolete description for was removed from the help
The Help page on the Server Info screen in the Administration Console previously showed the Security level field, which indicated whether the server used "domestic" (US-based, 128-bit) or "export" (non-US based, 40-bit) ciphers. This field was previously removed from the actual Server Info screen as it was no longer relevant, but was left in the help page by mistake. This update removes all mentions of this field from the help page as well.
Directory Server Console window can no longer be located off-screen at startup
Red Hat Directory Server Console window coordinates are stored in user preferences in the
o=netscaperoot suffix. Previously, if the console was used by the same user on two different systems with different monitor setups, it was possible for the coordinates to be off screen on one of them, and consequently the console window could be hidden after logging in. This update adds a check which compares saved window coordinates with the current screen size, and resets the window location if currently outside the screen, which ensures the window is always visible.
setup-ds-admin.pl no longer fails after running remove-ds-admin.pl due to missing configuration files
Previously, executing the
remove-ds-admin.pl script removed files in the Administration Server configuration directory if no backup was available for them. Consequently, if the user executed the setup-ds-admin.pl script after running remove-ds-admin.pl, the setup script failed. The problem occurred in the following situations:
- when
remove-ds-admin.plwas executed repeatedly - when
remove-ds-admin.plwas executed without executing thesetup-ds-admin.plfirst
Instead of removing the files,
remove-ds-admin.pl now overrides them from backup if one is available. As a result, the script no longer removes files that do not have a backup, and setup-ds-admin.pl no longer fails in this situation.
URLs for git repositories in 389-admin.spec now use HTTPS
Previously, several URLs for the
git.fedorahosted.org repositories in the 389-admin.spec file used the insecure HTTP protocol. The URLs have been updated to use the HTTPS protocol instead. As a result, content from the git repositories is now downloaded securely over HTTPS.
An architecture mismatch between the 64-bit DS Console and the 32-bit JRE no longer causes the Console to become unresponsive
When using the 64-bit version of the Directory Server Console with the 32-bit version of the Java Runtime Environment (JRE), the Console became unresponsive when the user tried to connect to an Administration Server over HTTPS using the Console. This update ensures that the exception causing this bug is handled properly. As a result, the Console logs a meaningful message and exits in the described situation.
5.4. Known Issues
Important
Note that this document only contains release notes for features which are not available in the base Red Hat Enterprise Linux 7.3 release. Many of the new features and bug fixes in Red Hat Directory Server are in the 389-ds-base package, and those are documented in Red Hat Enterprise Linux 7.3 Release Notes.
The following are some of the most important known issues in Directory Server 10.1. If applicable, supported workarounds are also described.
The Directory Server Console is not able to connect to all instances in multi-homed environments
The Directory Server Console is only able to connect to the first instance, if all of the following conditions are met:
- Multiple Directory Server instances are installed on one host.
- Each instance is bound to a different local network interface.
- All instances use the same port number, such as 389.
To work around the problem, run the Directory Server instances on different ports.
For further details, see the corresponding section in the Red Hat Directory Server 10 Installation Guide.
Directory Server Console logins fail using the uid value
The Directory Server Console enables users to log in using the full distinguished name (DN) or the value of the
uid attribute of an account. When using the uid value to log in, the Directory Server Console performs an anonymous bind to locate the entry matching the value. As a consequence, if anonymous binds are disabled, the Directory Server Console is unable to locate the entry, and logging in using the uid value fails. To work around this problem, enter the full DN in the user name field and as a result, logins work like expected.
Stopping and starting a remote Admin Server fails when SELinux is enabled
Due to a limitation of systemd, Admin Express and the Directory Server Console fails to start or stop the Admin Server on remote hosts running SELinux in
enforcing mode. To work around the problem, start and stop the Admin Server on the host that is running the service.
Chapter 6. Red Hat Directory Server 10.0
6.1. System Requirements
This section contains information related to installing and upgrading Red Hat Directory Server 10.0, including prerequisites and hardware or platform requirements.
6.1.1. Required JRE
Red Hat Directory Server 10.0 requires Oracle Java Runtime Environment (JRE) 1.6.0 or OpenJDK 1.6.0 for Red Hat Enterprise Linux. Note that you only need JRE for Directory Server Console.
Important
It is not possible to manage instances of Directory Server older than 8.1 (which used JRE 1.5) with the 10.0 Directory Server Console because they are using different JRE versions. You must migrate any older instance to Directory Server 10.0 if you need to manage that instance with the Directory Server Console.
6.1.2. Supported Platforms for Directory Server
Directory Server 10.0 is supported on the following platforms:
- Red Hat Enterprise Linux 7.1 (64-bit) or later
Note
Red Hat Directory Server 10.0 is supported running on a Red Hat Enterprise Linux virtual guest on a certified hypervisor. For details, see the Which hypervisors are certified to run Red Hat Enterprise Linux? solution article.
6.1.3. Supported Platforms for Directory Server Console
The Directory Server Console is supported on the following platforms:
- Red Hat Enterprise Linux 7.1 (64-bit) or later
6.1.4. Supported Platforms for Windows Synchronization Tool
The Windows Sync utility runs on these Windows platforms:
- Active Directory on Microsoft Windows Server 2008 R2
- Active Directory on Microsoft Windows Server 2012
- Active Directory on Microsoft Windows Server 2012 R2
6.1.5. Web Application Browser Support
Directory Server 10.0 supports the following browsers to access web-based interfaces, such as Admin Express and online help tools:
- Mozilla Firefox 31.x or later
6.2. Highlighted Updates and New Features
Important
Note that this document only contains release notes for features which are not available in the base Red Hat Enterprise Linux 7.1 release. Many of the new features and bug fixes in Red Hat Directory Server are in the 389-ds-base package, and those are documented in Red Hat Enterprise Linux 7.1 Release Notes.
Directory Server 10.0 has introduced the following new features and important updates to make managing the directory service and its data easier and more secure.
- TLS 1.0 or newer is enabled by default
- Due to CVE-2014-3566, SSLv3 and older protocol versions are disabled by default. The Admin Server now accepts more secure SSL protocols like
TLSv1.1andTLSv1.2. You can also define the SSL range that the console will use when communicating with Directory Server instances. - Password administrators
- The Directory Manager can now add the Password Administrator role to a user or a group of users (not to be confused with general password maintenance). A password administrator can perform any user password operations which includes adding pre-hashed passwords, using different storage schemes, or setting passwords of any length or value.For more information, see the related documentation in the Administration Guide.
- The
nsds5ReplicaProtocolTimeoutattribute - When stopping the server, disabling replication, or removing a replication agreement, there is a timeout on how long to wait before stopping replication when the server is under load. The
nsds5ReplicaProtocolTimeoutattribute can be used to configure this timeout and its default value is 120 seconds.For more information, see the related documentation in the Configuration, Command, and File Reference Guide. - The
nsds5ReplicaBackoffMinandnsds5ReplicaBackoffMaxattributes - The new
nsds5ReplicaBackoffMinandnsds5ReplicaBackoffMaxattributes are used in environments with heavy replication traffic, where updates need to be sent as fast as possible. By default, if a remote replica is busy, the replication protocol will go into a "back off" state, and it will retry to send it updates at the next interval of the back-off timer. The default settings maybe not be sufficient under certain circumstances and you can use these attributes to configure the minimum and maximum wait times.For more information, see the related documentation in the Configuration, Command, and File Reference Guide. - Perl scripts support more secure connections
- The new
-Pcommand-line parameter is now available for Perl scripts and takes a protocol name as a parameter. The supported protocols are StartTLS, LDAPS, LDAPI, and LDAP; this sequence also defines the order the script uses if fallback is needed.For more information, see the related documentation in the Configuration, Command, and File Reference Guide. - Instance-specific scripts centralized
- The new
-Zcommand-line parameter takes one parameter, the server instance identifier. The script uses the identifier to get information such as the server location, or necessary configuration settings including port number, root DN, and security settings.For more information, see the related documentation in the Configuration, Command, and File Reference Guide. - The
memberOfplug-in shared configuration - Replicating plug-in configuration helps maintain consistent configuration on the network, which is especially useful in large deployments. The
memberOfplug-in configuration can be stored in a shared configuration entry in any back end or suffix, outside of thecn=configsuffix. In the plug-in entry, thensslapd-pluginConfigAreaattribute is used to specify the location of the shared configuration.For more information, see the related documentation in the Administration Guide. - Plug-in back end transaction support
- There are two new plug-in types available in Red Hat Directory Server 10:
betxnpreoperationandbetxnpostoperation. These types signify that if the plug-in fails to perform its operation, or some error occurs, the entire operation is rolled back and undone, and an error message is returned to the client. - Change in behavior of the
memberOfplug-in - In Red Hat Directory Server 10, the
memberOfplug-in, as well as most other plug-ins, is a back-end transaction plug-in and its default behavior now prevents unexpected failures if a schema is not in place.If thememberOfplug-in fails to update a member entry with thememberOfattribute, the entire operation is aborted. This typically occurs because the entry does not have an object class that allowsmemberOf. Currently, there are two standard object classes that allowmemberOf:inetUserandinetAdmin. Alternatively, a custom object class needs to be created that hasmemberOfamong its allowed attributes. These object class(es) need to be present in any entry that has the potential of being a member of a group, including groups.An additional change concerns scenarios when nested groups are created. Previously, creating nested groups always worked even ifmemberOfwas not added to the bottom group. Now, creating a nested group fails unless the group has an object class that allowsmemberOf. - Improved referential integrity plug-in configuration
- The new-style configuration for the Referential Integrity plug-in uses the more descriptive and convenient
referint*attributes. The configuration using thepluginarg*attributes still works but is deprecated.The second improvement allows you to define scope for handling references to deleted entries. The correctly defined scope prevents performance impacts and provides flexibility of restricting the referential integrity to selected subtrees.For more information, see the related documentation in the Administration Guide. - Dynamic plug-ins
- Directory Server 10.0 supports dynamic plug-ins that can be enabled without restarting the Directory Server. Allowing for dynamically enabled plug-ins makes server administration significantly easier. By using dynamic plug-ins, you can avoid restarting the server multiple times to install and configure the plug-ins.For more information, see the related documentation in the Administration Guide.
- Fine grained ID list size
- The ID scan limit (
nsslapd-idlistscanlimit) can be set per attribute, instead of for the entire database. The limit can be used to pseudo-index attributes that normally could not be indexed without impacting the entire database. This feature is very useful for addressing unavoidable unindexed searches. - Content
SyncReplcontant synchronization plug-in - The new
SyncReplplug-in provides a mechanism for a client to synchronize its copy of a database with the changing content of a Directory Server, according to RFC 4533. In contrast to replication,SyncReplis not oriented on changes or updates but on entries. Complete entries, after being updated, are sent to the client. - Database and changelog compaction
- Previously, when an entry was deleted, a gap remained on the database page, thus growing the database files in size over time. In Red Hat Directory Server 10, the databases, including the changelog, are compacted every 30 days. This interval can also be customized by configuring the
nsslapd-db-compactdb-intervalandnsslapd-changelogcompactdb-intervalattributes. - Read entry controls
- When performing a modify operation, you can specify
pre-readandpost_readcontrols. Thepre-readcontrol returns a copy of the entry before it was modified and thepost-readcontrol returns the entry after the modify. Both controls can be used on the same operation.The benefit of thepost-readcontrol is that you can see the entry after any changes a plug-in applied to it, after the initial update was performed. - Normalized DN cache
- DN normalization is an expensive and unavoidable task that the server needs to do for most operations. Red Hat Directory Server 10 provides normalized DN cache that improves performance.
- Schema replication improvements
- Previously, it was possible that schema definitions could get incorrectly overwritten depending on where new schema definitions were added in the replication deployment. Now, during a replication session, a supplier checks that the consumer schema is a subset of the supplier schema before sending its schema. Then, the consumer checks that the consumer schema is a subset of the supplier schema before accepting the supplier's schema.
- The
Read Entry ControlsLDAP extension - Directory Server now supports an extension to LDAP to allow clients to read the target entry of an update operation, such as
Add,Delete,Modify, orModifyDN. The extension utilizes controls attached to update requests to request and return copies of the target entry. - The LDAP content synchronization operation
- Directory Server now supports the LDAP Content Synchronization Operation, or Sync Operation for short, which allows a client to maintain a synchronized copy of a fragment of a Directory Information Tree (DIT). The Sync Operation is defined as a set of controls and other protocol elements that extend the Search Operation.
- SASL mapping fallback and prioritization
- Previously, in deployments using many SASL mappings or overlapping matching criteria by design, only the first matching SASL mapping was checked. If that mapping failed, the bind operation also failed even if there were other matching mappings that could work. In Red Hat Directory Server 10, the
nsslapd-sasl-mapping-fallbackconfiguration option has been implemented to keep checking all the matching mappings. ThensSaslMapPriorityprioritization option has also been added to be available for each mapping. - SASL mechanism control for authentication
- In some environments, many SASL mechanisms are available but only certain ones are preferred. The
nsslapd-allowed-sasl-mechanismsattribute allows you to define a specific mechanism on a server allowed for authentication. - Command-line replication monitoring
- Red Hat Directory Server 10.0 has the ability to produce a CLI-based report for monitoring replication. The
repl-monitor.plscript accepts both command-line parameters and a configuration file to report easily parsable information, includingReplica Root,Max CSN,Time Lag, orUpdate Status. - Improvements to the
logconv.plscript - When using the
LDAP_DEBUG_TIMINGaccess log level to collect microsecond etime timing,logconv.plis now able to read this data and calculate statistics with microsecond resolution.Instead of previously used flat files for temporary storage when analyzing large access logs,logconv.plnow uses Berkeley DB files using the perlDB_Filemodule and tied hashes and arrays, which considerably improves the script's performance on large logs. - WinSync plug-in improvements for an easier way to configure data to be synchronized
- With the new
winSyncSubtreePairparameter, it is now possible to configure synchronization between multiple subtree pairs. To do this, specifywinSyncSubtreePairmultiple times to define the required Directory Server (DS) and Active Directory (AD) subtrees.Two new parameters offer an easier way to configure which users or groups are synchronized with WinSync: thewinSyncDirectoryFilterparameter sets a filter on DS, and thewinSyncWindowsFilterparameter sets a filter on the AD server. These filters then select the data to be synchronized.For more information, see the related documentation in the Administration Guide. - POSIX WinSync SID enhancements
- The
WinSyncplug-in can now be enhanced to allow more control over which users and groups are synchronized, as well as automatically converting non-POSIX users from Active Directory into POSIX users in Directory Server. - Better control over the MODDN and MODRDN operations
- With the enhanced Access Control Instructions (ACIs), it is possible to define a source tree and a destination tree, allow or deny the MODDN and MODRDN operations, and also specify the source and destination targets in the same ACI. You can, for example, enable users to move an entry from one part of the tree to another, but at the same time forbid them to move an entry from or to other parts of the tree. You can also forbid users to delete or add entries.
- Root DSE searches no longer display operational attributes by default
- Running the
ldapsearchutility with the-s base -b ""options now displays only the user attributes and not the operational attributes. Previously, a root DSE search displayed all attributes by default. To ensure compatibility with earlier versions, you can use thensslapd-return-default-opattrattribute in the root DSE. - Improved behavior of the
remove-ds-admin.plscript - When
remove-ds-admin.plis used to remove all Directory Servers and Admin Server, the script now replaces the following configuration files with their defaults saved in a backup directory:httpd.conf,console.conf,admserv.conf, andnss.conf. This way, a subsequent installation picks these files up seamlessly.Additionally, when the-a(all) parameter is not used, the following files containing security information are preserved:cert8.db,key3.db,secmod.db, andpassword.conf. - The uniqueness plug-in now supports enforcing unique values across sets of attributes
- Previously, Directory Server only supported configuring unique values for a single attribute. As a consequence, administrators were not able to enforce unique values across different attributes. The
uniqueness-attribute-nameis now multi-valued. As a result, you are now able to enforce unique values across sets of attributes. For further details, see the corresponding section in the Directory Server Administration Guide.
6.3. Known Issues
Important
Note that this document only contains release notes for features which are not available in the base Red Hat Enterprise Linux 7.1 release. Many of the new features and bug fixes in Red Hat Directory Server are in the 389-ds-base package, and those are documented in Red Hat Enterprise Linux 7.1 Release Notes.
The following are some of the most important known issues in Directory Server 10.0. If applicable, supported workarounds are also described.
- The Windows Console provided as part of Red Hat Directory Server does not yet support IPv6-only networks.
- Due to a bug in the SELinux policy, Admin server fails to restart remotely from console in Enforcing mode. To work around this problem, you can restart the server in Permissive mode or define a custom SELinux policy to allow access for the Admin server. Instructions on how to create the custom policy are included in details of AVC denial messages in the
sealertutility. - If the
remove-ds-admin.plscript is executed without an installed Admin server, it removes configuration files that were installed from the RPM package. As a consequence, subsequently runsetup-ds-admin.plscript terminates without creating the configuration file backups. To work around this problem, run theyum reinstall 389-admincommand to recover the missing files. - If a pipe file is present but the
ds-logpipe.pyscript is not running, an attempt to restart the Directory Server fails and the system becomes unresponsive. - Global syntax checking attributes should be enforced if the settings are not configured in the local password policy. However, if both global and local password policies are configured, the global policies are not being enforced as the default. To work around this issue, follow these steps:
- Enable global syntax checking.
- Enable fine-grained password checking.
- Edit the local password policy to contain all password syntax attributes. Set the values to something other than the default setting, as listed in the Configuration, Command, and File Reference.
- Edit the local password policy with the required values, even if they are the defaults.
Appendix A. Revision History
Note that revision numbers relate to the edition of this manual, not to version numbers of Red Hat Directory Server.
| Revision History | |||
|---|---|---|---|
| Revision 10.3-1 | Wed Oct 24 2018 | ||
| |||
| Revision 10.2-1 | Tue Apr 10 2018 | ||
| |||
| Revision 10.1-5 | Tue Aug 01 2017 | ||
| |||
| Revision 10.1-4 | Fri Feb 24 2017 | ||
| |||
| Revision 10.1-3 | Wed Jan 11 2017 | ||
| |||
| Revision 10.1-2 | Mon Dec 12 2016 | ||
| |||
| Revision 10.1-1 | Thu Nov 10 2016 | ||
| |||
| Revision 10.1-0 | Wed Nov 02 2016 | ||
| |||
| Revision 10.0-2 | Fri Jun 12 2015 | ||
| |||
| Revision 10.0-1 | Tue Jun 09 2015 | ||
| |||
Legal Notice
Copyright © 2018 Red Hat, Inc.
This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.
