Show Table of Contents
11.19. Replicating o=NetscapeRoot for Admin Server Failover
Replication usually occurs between Directory Server user databases to distribute directory data, but it is also possible to use replication to provide failover support for the Admin Server database,
o=NetscapeRoot.
- Install and configure the first Directory Server instance.The
setup-ds-admin.plscript has an option,-f, which references aninf. Theinfcan be used to import LDIF files through theConfigFileparameter, and the LDIF files can create databases, suffixes, and replication entries. (Theinffile is described in more detail in the Directory Server Installation Guide.)[root@server ~]# setup-ds-admin.pl -f /tmp/server1.inf
To configure theo=NetscapeRootdatabase onserver1as a multi-master supplier replica, use the following statements in theinffile:[slapd] ... ConfigFile = repluser.ldif Example 11.1, “Example Supplier Bind DN Entry” ConfigFile = changelog.ldif Example 11.2, “Example Changelog Entry” ConfigFile = replica.ldif Example 11.3, “Example Supplier Replica Entry” ConfigFile = replagreement.ldif Example 11.4, “Example Replication Agreement Entry” ...
- Install and configure the second Directory Server instance. For the second server,
server2.example.com, use thesetup-ds.plcommand, which installs a Directory Server instance without installing a local Admin Server.[root@server ~]# setup-ds.pl -f /tmp/server2.inf
With server2, use theinffile to create and configure ao=NetscapeRootdatabase onserver2as a multi-master supplier replica:[slapd] ... ConfigFile = netscaperootdb.ldif Example 2.1, “Example Root Suffix Entry” ConfigFile = repluser.ldif Example 11.1, “Example Supplier Bind DN Entry” ConfigFile = changelog.ldif Example 11.2, “Example Changelog Entry” ConfigFile = replica.ldif Example 11.3, “Example Supplier Replica Entry” ConfigFile = replagreement.ldif Example 11.4, “Example Replication Agreement Entry” ...
- Initialize the
o=NetscapeRootdatabase onserver2fromserver1. Add thensds5replicarefreshattribute to the replication agreement onserver1.[root@server ~]# ldapmodify -D "cn=directory manager" -W -x -h supplier1.example.com dn: cn=ExampleAgreement1,cn=replica,cn=o=NetscapeRoot,cn=mapping tree,cn=config changetype: modify replace: nsds5beginreplicarefresh nsds5beginreplicarefresh: start
- Run the
register-ds-admin.plto create a local Admin Server onserver2and switch the configuration directory forserver2to its owno=NetscapeRootdatabase fromserver1.[root@server ~]# register-ds-admin.pl
- Add the following access control instructions (ACI) on
server2, to enable members of theConfiguration Administrators Group, the server instance entrySIE group, and theadminuser, to run on suffixes belonging toserver2. For example, to run on thedc=example,dc=comsuffix, enter:[root@server ~]# ldapmodify -D "cn=directory manager" -W -x -h server2.example.com dn: dc=example,dc=com changetype: modify add: aci aci: (targetattr="*")(version 3.0; acl "Configuration Administrators Group"; allow (all) groupdn="ldap:///cn=Configuration Administrators,ou=Groups, ou=TopologyManagement,o=NetscapeRoot";) - add: aci aci: (targetattr="*")(version 3.0; acl "Configuration Administrator"; allow (all) userdn="ldap:///uid=admin, ou=Administrators,ou=TopologyManagement,o=NetscapeRoot";) - add: aci aci: (targetattr = "*")(version 3.0; acl "SIE Group"; allow (all) groupdn = "ldap:///cn=slapd-instance,cn=Red Hat Directory Server,cn=Server Group, cn=machine_name,ou=example.com,o=NetscapeRoot";)
- Disable the PTA Plug-in on
server2so that it does not pass bind operations for the administrative users in itso=NetscapeRoottoserver1.

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.