Show Table of Contents
3.4. Custom Setup
Custom setup provides two special configuration options that allow you to add information to the Directory Server databases during the setup period. One imports an LDIF file, which is useful if you have existing information. The other imports sample data that is included with Directory Server; this is useful for testing features of Directory Server and for evaluation.
Note
Run the
setup-ds-admin.pl script as root.
The custom setup has the following steps:
Warning
If Directory Server is already installed on your machine, it is extremely important that you perform a migration, not a fresh installation. Migration is described in Chapter 5, Migrating from Previous Versions.
- After the Directory Server packages are installed as described in Section 3.1, “Installing the Directory Server Packages”, then launch the
setup-ds-admin.plscript.# setup-ds-admin.pl
This script allows parameters to be passed with it or to specify configuration files to use. The options are described more in Section 1.3, “About the setup-ds-admin.pl Script”. - Select
yto accept the Red Hat licensing terms. - The
dsktuneutility runs. Selectyto continue with the setup.dsktunechecks the available disk space, processor type, physical memory, and other system data and settings such as TCP/IP ports and file descriptor settings. If your system does not meet these basic Red Hat Directory Server requirements,dsktunereturns a warning.dsktunewarnings do not block the setup process; simply enteryto go to the next step. - Next, choose the setup type. Accept the default, option
3, to perform a custom setup. - Set the computer name of the machine on which the Directory Server is being configured. This defaults to the fully-qualified domain name (FQDN) for the host. For example:
Computer name [ldap.example.com]:
The given host name must be a fully-qualified domain name that can be resolved usinggethostname()and then can be reverse-resolved by IP address (IPv4 or IPv6) back to the original host name. If either name resolution attempt fails, then the setup script returns a warning message and prompts you to continue.Note
The Directory Server requires the fully-qualified domain name to set up the servers, as described in Section 1.2.1, “Resolving the Fully-qualified Domain Name”. The setup script uses the system'sgethostname()function to obtain the host name (such asldap) and the/etc/resolv.conffile to identify the domain name (such asexample.com).Therefore, if there are aliases in the/etc/hostsfile that do not match the specified domains in the/etc/resolv.confsettings, the setup script cannot correctly generate the fully-qualified domain name as it is used by DNS, and the default options in the prompts are wrong.The host name is very important. It is used generate the Directory Server instance name, the admin domain, and the base suffix, among others. If you are using SSL/TLS or Kerberos, the computer name must be the exact name that clients use to connect to the system. If you will use DNS, make sure the name resolves to a valid IP address (IPv4 or IPv6) and that IP address resolves back to this name. - Set the user and group as which the Directory Server process will run. The default is
nobody:nobody. However, Red Hat strongly recommends to use a different user and group name such asdirsrv. For example:System User [nobody]: dirsrv System Group [nobody]: dirsrv
- The next step allows you to register your Directory Server with an existing Directory Server instance, called the Configuration Directory Server. This registers the new instance so it can be managed by the Console. If this is the first Directory Server instance set up on your network, it is not possible to register it with another directory. Select
nto set up this Directory Server as a Configuration Directory Server and move to the next custom install step, setting up the administrator user.Note
To register the Directory Server instance with an existing Configuration Directory Server, selectyes. This continues with the registration process rather than the regular custom setup process.Registering a new instance with a Configuration Directory Server requires you to supply information about the Configuration Directory Server:- The Configuration Directory Server URL, such as
ldap://ldap.example.com:389/o=NetscapeRootTo use TLS/SSL, set the protocol asldaps://instead ofldap://For LDAPS, use the secure port (636) instead of the standard port (389), and provide a CA certificate. - The Configuration Directory Server administrator's user ID; by default, this is
admin. - The administrator user's password.
- The Configuration Directory Server Admin domain, such as
example.com. - The CA certificate to authenticate to the Configuration Directory Server. This is only required if the Directory Server instance will connect to the Configuration Directory Server over LDAPS. This should be the full path and filename the CA certificate in PEM/ASCII format.
- Set the administrator user name. The default is
admin. - Set the administrator password and confirm it.
- Set the administration domain. This defaults to the host's domain. For example:
Administration Domain [example.com]:
- Enter the Directory Server port number. The default is
389, but if that port is in use, thesetupprogram supplies a randomly generated one.Directory server network port [389]: 1066
- Enter the Directory Server identifier; this defaults to the host name.
Directory server identifier [example]:
The server identifier must not contain a period (.) or space character. - Enter the directory suffix. This defaults to
dc=domain name. For example:Suffix [dc=example,dc=com]:
- Set the Directory Manager user name. The default is
cn=Directory Manager. - Set the Directory Manager password and confirm it.
Important
When resetting the Directory Manager's password from the command line, do not use curly braces ({}) in the password. The root password is stored in the format {password-storage-scheme}hashed_password. Any characters in curly braces are interpreted by the server as the password storage scheme for the root password. If that text is not a valid storage scheme or if the password that follows is not properly hashed, then the Directory Manager cannot bind to the server. - Select whether you want to install sample entries with the Directory Server instance. This means that an example LDIF, with preconfigured users, groups, roles, and other entries, is imported into the Directory Server database. This option is helpful for evaluation or testing Directory Server features.This is not required.
- Select whether to populate the Directory Server with data; this means whether to import an LDIF file with existing data into the Directory Server database. If the answer is yes, then supply a path to the LDIF file or select the suggested file. If the LDIF file requires custom schema, perform a silent setup instead, and use the
SchemaFiledirective in the.infto specify additional schema files. See Section 4.6.5.1, “.inf File Directives” for information on.infdirectives.The default option isnone, which does not import any data. - Enter the Admin Server port number. The default is
9830, but if that port is in use, thesetupprogram supplies a randomly generated one.Administration port [9830]:
- Set an IP address (IPv4 or IPv6) for the new Admin Server to use. The Admin Server uses a web server, and this parameter is set in the
console.conffile for the server. Setting this parameter restricts the Admin Server to that single IP. Leaving it blank, the default, allows the Admin Server to acquire any IP address. - Set the user as which the Admin Server process will run. The default is
nobody. However, Red Hat strongly recommends to use a different user name such asdirsrv. For example:Run Administration Server as [nobody]: dirsrv
- The last screen asks if you are ready to set up your servers. Select
yes.Are you ready to set up your servers? [yes]: Creating directory server . . . Your new DS instance 'example3' was successfully created. Creating the configuration directory server . . . Beginning Admin Server reconfiguration . . . Creating Admin Server files and directories . . . Updating adm.conf . . . Updating admpw . . . Registering admin server with the configuration directory server . . . Updating adm.conf with information from configuration directory server . . . Updating the configuration for the httpd engine . . . Restarting admin server . . . The admin server was successfully started. Admin server was successfully reconfigured and started. Exiting . . . Log file is '/tmp/setupul88C1.log'
When the
setup-ds-admin.pl script is done, then the Directory Server is configured and running. Log into the Directory Server Console to begin setting up the directory service:
- Get the Admin Server port number from the
Listenparameter in theconsole.confconfiguration file.# grep \^Listen /etc/dirsrv/admin-serv/console.conf Listen 0.0.0.0:
9830 - Using the Admin Server port number, launch the Console.
# redhat-idm-console -a http://localhost:9830
Note
If you do not pass the Admin Server port number with the
redhat-idm-console command, then you are prompted for it at the Console login screen.

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.