File: ch03.html

package info (click to toggle)
ldap-account-manager 3.7-2
  • links: PTS
  • area: main
  • in suites: wheezy
  • size: 34,660 kB
  • sloc: php: 49,813; perl: 305; makefile: 169; sh: 156; pascal: 132; xml: 111
file content (126 lines) | stat: -rw-r--r-- 27,543 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Chapter3.Managing entries in your LDAP directory</title><link rel="stylesheet" type="text/css" href="style.css"><meta name="generator" content="DocBook XSL Stylesheets V1.76.1"><link rel="home" href="index.html" title="LDAP Account Manager - Manual"><link rel="up" href="index.html" title="LDAP Account Manager - Manual"><link rel="prev" href="ch02s02.html" title="Server profiles"><link rel="next" href="ch03s02.html" title="Groups"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Chapter3.Managing entries in your LDAP directory</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="ch02s02.html">Prev</a></td><th width="60%" align="center"></th><td width="20%" align="right"><a accesskey="n" href="ch03s02.html">Next</a></td></tr></table><hr></div><div class="chapter" title="Chapter3.Managing entries in your LDAP directory"><div class="titlepage"><div><div><h2 class="title"><a name="idp5468800"></a>Chapter3.Managing entries in your LDAP directory</h2></div></div></div><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="section"><a href="ch03.html#idp5492224">Users</a></span></dt><dd><dl><dt><span class="section"><a href="ch03.html#idp5493120">Personal</a></span></dt><dt><span class="section"><a href="ch03.html#idp5535440">Unix</a></span></dt><dt><span class="section"><a href="ch03.html#idp5542000">Shadow</a></span></dt><dt><span class="section"><a href="ch03.html#idp5545008">Password self reset (LAM Pro)</a></span></dt><dt><span class="section"><a href="ch03.html#idp5556976">Hosts</a></span></dt><dt><span class="section"><a href="ch03.html#idp5562112">Samba 3</a></span></dt><dt><span class="section"><a href="ch03.html#idp5568320">Filesystem quota (lamdaemon)</a></span></dt><dt><span class="section"><a href="ch03.html#idp5573072">Filesystem quota (LDAP)</a></span></dt><dt><span class="section"><a href="ch03.html#idp5577760">Kolab</a></span></dt><dt><span class="section"><a href="ch03.html#idp5581856">Asterisk</a></span></dt><dt><span class="section"><a href="ch03.html#idp5583632">EDU person</a></span></dt><dt><span class="section"><a href="ch03.html#idp5586576">Password policy (LAM Pro)</a></span></dt><dt><span class="section"><a href="ch03.html#idp5591904">FreeRadius</a></span></dt><dt><span class="section"><a href="ch03.html#idp5599728">Heimdal Kerberos (LAM Pro)</a></span></dt><dt><span class="section"><a href="ch03.html#idp5608576">Mail routing</a></span></dt><dt><span class="section"><a href="ch03.html#idp5611680">SSH keys</a></span></dt><dt><span class="section"><a href="ch03.html#idp5615344">Authorized services</a></span></dt><dt><span class="section"><a href="ch03.html#idp5620400">IMAP mailboxes</a></span></dt><dt><span class="section"><a href="ch03.html#s_account">Account</a></span></dt></dl></dd><dt><span class="section"><a href="ch03s02.html">Groups</a></span></dt><dd><dl><dt><span class="section"><a href="ch03s02.html#idp5634864">Unix</a></span></dt><dt><span class="section"><a href="ch03s02.html#idp5637888">Unix groups with rfc2307bis schema (LAM Pro)</a></span></dt><dt><span class="section"><a href="ch03s02.html#idp5644880">Samba 3</a></span></dt><dt><span class="section"><a href="ch03s02.html#idp5647840">Quota</a></span></dt></dl></dd><dt><span class="section"><a href="ch03s03.html">Hosts</a></span></dt><dd><dl><dt><span class="section"><a href="ch03s03.html#idp5652256">Account</a></span></dt><dt><span class="section"><a href="ch03s03.html#idp5654032">Device (LAM Pro)</a></span></dt><dt><span class="section"><a href="ch03s03.html#idp5657120">Samba 3</a></span></dt><dt><span class="section"><a href="ch03s03.html#idp5661680">IP addresses (LAM Pro)</a></span></dt><dt><span class="section"><a href="ch03s03.html#idp5667792">MAC addresses</a></span></dt></dl></dd><dt><span class="section"><a href="ch03s04.html">Samba 3 domains</a></span></dt><dt><span class="section"><a href="ch03s05.html">Group of (unique) names (LAM Pro)</a></span></dt><dt><span class="section"><a href="ch03s06.html">Asterisk</a></span></dt><dt><span class="section"><a href="ch03s07.html">Zarafa (LAM Pro)</a></span></dt><dd><dl><dt><span class="section"><a href="ch03s07.html#idp5699056">Configuration</a></span></dt></dl></dd><dt><span class="section"><a href="ch03s08.html">DHCP</a></span></dt><dt><span class="section"><a href="ch03s09.html">Aliases (LAM Pro)</a></span></dt><dt><span class="section"><a href="ch03s10.html">Mail aliases</a></span></dt><dt><span class="section"><a href="ch03s11.html">NIS net groups</a></span></dt><dt><span class="section"><a href="ch03s12.html">NIS objects (LAM Pro)</a></span></dt><dt><span class="section"><a href="ch03s13.html">Automount objects (LAM Pro)</a></span></dt><dt><span class="section"><a href="ch03s14.html">Password policies (LAM Pro)</a></span></dt><dt><span class="section"><a href="ch03s15.html">Custom scripts (LAM Pro)</a></span></dt><dt><span class="section"><a href="ch03s16.html">Sudo roles (LAM Pro)</a></span></dt><dt><span class="section"><a href="ch03s17.html">General information</a></span></dt><dt><span class="section"><a href="ch03s18.html">Tree view (LDAP browser)</a></span></dt><dt><span class="section"><a href="ch03s19.html">Typical usage scenarios</a></span></dt></dl></div><p>This chapter will give you instructions how to manage the different
    LDAP entries in your directory.</p><p>Please note that not all account types are manageable with the free
    LAM release. LAM Pro provides some more account types and modules to
    support additional LDAP object classes.</p><p><span class="bold"><strong>Additional types:</strong></span></p><div class="itemizedlist"><ul class="itemizedlist" type="disc"><li class="listitem"><p>Group of names</p></li><li class="listitem"><p>Aliases</p></li><li class="listitem"><p>NIS objects</p></li><li class="listitem"><p>Sudo roles</p></li></ul></div><p><span class="bold"><strong>Additional modules:</strong></span></p><div class="itemizedlist"><ul class="itemizedlist" type="disc"><li class="listitem"><p>Group of names (groupOfNames)</p></li><li class="listitem"><p>Group of unique names (groupOfUniqueNames)</p></li><li class="listitem"><p>Unix (rfc2307bisPosixGroup)</p></li><li class="listitem"><p>Alias (aliasEntry)</p></li><li class="listitem"><p>User name (uidObject)</p></li><li class="listitem"><p>NIS object (nisObject)</p></li><li class="listitem"><p>Custom scripts (customScripts)</p></li><li class="listitem"><p>Sudo role (sudoRole)</p></li></ul></div><p><span class="bold"><strong>Basic page layout:</strong></span></p><p>After the login LAM will present you its main page. It consists of a
    header part which is equal for all pages and the content area which covers
    most the of the page.</p><p>The header part includes the links to manage all account types (e.g.
    users and groups) and open the tree view (LDAP browser). There is also the
    logout link and a tools entry.</p><p>When you login the you will see an account listing in the content
    area.</p><div class="screenshot"><div class="mediaobject"><img src="images/mainpage.png"></div></div><p>Here you can create, delete and modify accounts. Use the action
    buttons at the left or double click on an entry to edit it.</p><p>The suffix selection box allows you to list only the accounts which
    are located in a subtree of your LDAP directory.</p><div class="screenshot"><div class="mediaobject"><img src="images/listConfig.png"></div></div><p>You can change the number of shown entries per page with "Change
    settings". Depending on the account type there may be additional settings.
    E.g. the user list can convert group numbers to group names.</p><p>When you select to edit an entry then LAM will show all its data on
    a tabbed view. There is one tab for each functional part of the account.
    You can set default values by loading an <a class="link" href="ch04.html#a_accountProfile" title="Profile editor">account profile</a>.</p><div class="screenshot"><div class="mediaobject"><img src="images/editView.png"></div></div><div class="section" title="Users"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="idp5492224"></a>Users</h2></div></div></div><p></p><div class="section" title="Personal"><div class="titlepage"><div><div><h3 class="title"><a name="idp5493120"></a>Personal</h3></div></div></div><p>This module is the most common basis for user accounts in LAM.
        You can use it stand-alone to manage address book entries or in
        combination with Unix, Samba or other modules.</p><p>The Personal module provides support for managing various
        personal data of your users including mail addresses and telephone
        numbers. You can also add photos of your users. If you do not need to
        manage all attributes then you can deactivate them in your server
        profile.</p><div class="screenshot"><div class="mediaobject"><img src="images/mod_personal.png"></div></div><p></p><div class="table"><a name="idp5496960"></a><p class="title"><b>Table3.1.LDAP attribute mappings</b></p><div class="table-contents"><table summary="LDAP attribute mappings" border="1"><colgroup><col><col></colgroup><thead><tr><th align="center">Attribute name</th><th align="center">Name inside LAM</th></tr></thead><tbody><tr><td>businessCategory</td><td>Business category</td></tr><tr><td>carLicense</td><td>Car license</td></tr><tr><td>cn/commonName</td><td>Common name</td></tr><tr><td>departmentNumber</td><td>Department(s)</td></tr><tr><td>description</td><td>Description</td></tr><tr><td>employeeNumber</td><td>Employee number</td></tr><tr><td>employeeType</td><td>Employee type</td></tr><tr><td>facsimileTelephoneNumber/fax</td><td>Fax number</td></tr><tr><td>givenName/gn</td><td>First name</td></tr><tr><td>homePhone</td><td>Home telephone number</td></tr><tr><td>initials</td><td>Initials</td></tr><tr><td>jpegPhoto</td><td>Photo</td></tr><tr><td>l</td><td>Location</td></tr><tr><td>mail/rfc822Mailbox</td><td>Email address</td></tr><tr><td>manager</td><td>Manager</td></tr><tr><td>mobile/mobileTelephoneNumber</td><td>Mobile number</td></tr><tr><td>organizationName/o</td><td>Organisation</td></tr><tr><td>physicalDeliveryOfficeName</td><td>Office name</td></tr><tr><td>postalAddress</td><td>Postal address</td></tr><tr><td>postalCode</td><td>Postal code</td></tr><tr><td>postOfficeBox</td><td>Post office box</td></tr><tr><td>registeredAddress</td><td>Registered address</td></tr><tr><td>roomNumber</td><td>Room number</td></tr><tr><td>sn/surname</td><td>Last name</td></tr><tr><td>st</td><td>State</td></tr><tr><td>street/streetAddress</td><td>Street</td></tr><tr><td>telephoneNumber</td><td>Telephone number</td></tr><tr><td>title</td><td>Job title</td></tr><tr><td>uid/userid</td><td>User name</td></tr><tr><td>userPassword</td><td>Password</td></tr></tbody></table></div></div><br class="table-break"></div><div class="section" title="Unix"><div class="titlepage"><div><div><h3 class="title"><a name="idp5535440"></a>Unix</h3></div></div></div><p>The Unix module manages Unix user accounts including group
        memberships.</p><p></p><div class="screenshot"><div class="mediaobject"><img src="images/mod_unixUser.png"></div></div><p>You can also create home directories for your users if you setup
        <a class="link" href="apd.html" title="AppendixD.Setup for home directory and quota management">lamdaemon</a>. This allows you to
        create the directories on the local or remote servers.</p><p>It is also possible to check the status of the user's home
        directories. If needed the directories can be created or removed at
        any time.</p><div class="screenshot"><div class="mediaobject"><img src="images/mod_unixUserHomedir.png"></div></div></div><div class="section" title="Shadow"><div class="titlepage"><div><div><h3 class="title"><a name="idp5542000"></a>Shadow</h3></div></div></div><p>LAM supports the management of the LDAP substitution of
        /etc/shadow. Here you can setup password policies for your Unix
        accounts and also view the last password change of a user.</p><div class="screenshot"><div class="mediaobject"><img src="images/mod_shadow.png"></div></div></div><div class="section" title="Password self reset (LAM Pro)"><div class="titlepage"><div><div><h3 class="title"><a name="idp5545008"></a>Password self reset (LAM Pro)</h3></div></div></div><p>LAM Pro allows your users to reset their passwords by answering
        a security question. The reset link is displayed on the <a class="link" href="ch06s03.html#PasswordSelfReset" title="Password self reset">self service page</a>. Additionally,
        you can set question + answer in the admin interface.</p><p><span class="bold"><strong>Schema</strong></span></p><p>Please install the schema that comes with LAM Pro:
        docs/schema/passwordSelfReset.schema or
        docs/schema/passwordSelfReset.ldif</p><p>This allows to set a security question + answer for each
        account.</p><p><span class="bold"><strong>Activate password self reset
        module</strong></span></p><p>Please activate the password self reset module in your LAM Pro
        server profile.</p><div class="screenshot"><div class="mediaobject"><img src="images/passwordSelfReset7.png"></div></div><p>Now select the tab "Module settings" and specify the list of
        possible security questions. Only these questions will be selectable
        when you later edit accounts.</p><div class="screenshot"><div class="mediaobject"><img src="images/passwordSelfReset8.png"></div></div><p><span class="bold"><strong>Edit users</strong></span></p><p>After everything is setup please login to LAM Pro and edit your
        users. You will see a new tab called "Password self reset". Here you
        can activate/remove the password self reset function for each user.
        You can also change the security question and answer.</p><div class="screenshot"><div class="mediaobject"><img src="images/passwordSelfReset9.png"></div></div></div><div class="section" title="Hosts"><div class="titlepage"><div><div><h3 class="title"><a name="idp5556976"></a>Hosts</h3></div></div></div><p>You can specify a list of valid host names where the user may
        login. If you add the value "*" then the user may login to any host.
        This can be further restricted by adding explicit deny entries which
        are prefixed with "!" (e.g. "!hr_server").</p><p>Please note that your PAM settings need to support host
        restrictions. This feature is enabled by setting <span class="bold"><strong>pam_check_host_attr yes</strong></span> in your <span class="bold"><strong>/etc/pam_ldap.conf</strong></span>. When it is enabled then the
        account facility of pam_ldap will perform the checks and return an
        error when no proper host attribute is present. Please note that users
        without host attribute cannot login to such a configured
        server.</p><div class="screenshot"><div class="mediaobject"><img src="images/hostObject.png"></div></div></div><div class="section" title="Samba 3"><div class="titlepage"><div><div><h3 class="title"><a name="idp5562112"></a>Samba 3</h3></div></div></div><p>LAM supports full Samba 3 user management including logon hours
        and terminal server options.</p><div class="screenshot"><div class="mediaobject"><img src="images/mod_samba3User1.png"></div></div><div class="screenshot"><div class="mediaobject"><img src="images/mod_samba3User2.png"></div></div><div class="screenshot"><div class="mediaobject"><img src="images/mod_samba3User3.png"></div></div></div><div class="section" title="Filesystem quota (lamdaemon)"><div class="titlepage"><div><div><h3 class="title"><a name="idp5568320"></a>Filesystem quota (lamdaemon)</h3></div></div></div><p>You can manage file system quotas with LAM. This requires to
        setup <a class="link" href="apd.html" title="AppendixD.Setup for home directory and quota management">lamdaemon</a>. LAM connects to
        your server via SSH and manages the disk filesystem quotas. The quotas
        are stored directly on the filesystem. This is the default mechanism
        to store quotas for most systems.</p><p>Please add the module "Quota (quota)" for users to your LAM
        server profile to enable this feature.</p><p>If you store the quota information directly inside LDAP please
        see the next section.</p><div class="screenshot"><div class="mediaobject"><img src="images/mod_quotaUser.png"></div></div></div><div class="section" title="Filesystem quota (LDAP)"><div class="titlepage"><div><div><h3 class="title"><a name="idp5573072"></a>Filesystem quota (LDAP)</h3></div></div></div><p>You can store your filesystem quotas directly in LDAP. See
        <a class="ulink" href="http://sourceforge.net/projects/linuxquota/" target="_top">Linux
        DiskQuota</a> for details since it requires quota tools that
        support LDAP. You will need to install the quota LDAP schema to manage
        the object class "systemQuotas".</p><p>Please add the module "Quota (systemQuotas)" for users to your
        LAM server profile to enable this feature.</p><p>If you store the quota information on the filesystem please see
        the previous section.</p><div class="screenshot"><div class="mediaobject"><img src="images/mod_systemQuotas.png"></div></div></div><div class="section" title="Kolab"><div class="titlepage"><div><div><h3 class="title"><a name="idp5577760"></a>Kolab</h3></div></div></div><p>This module supports to manage Kolab accounts with LAM. E.g. you
        can set the user's mail quota and define invitation policies.</p><p>Please enter an email address at the Personal page and set a
        Unix password first. Both are required that Kolab accepts the
        accounts.</p><p>Kolab users should not be directly deleted with LAM. You can
        mark an account for deletion which then is done by the Kolab server
        itself. This makes sure that the mailbox etc. is also deleted.</p><div class="screenshot"><div class="mediaobject"><img src="images/mod_kolab.png"></div></div></div><div class="section" title="Asterisk"><div class="titlepage"><div><div><h3 class="title"><a name="idp5581856"></a>Asterisk</h3></div></div></div><p>LAM supports Asterisk accounts, too. See the <a class="link" href="ch03s06.html" title="Asterisk">Asterisk</a> section for details.</p></div><div class="section" title="EDU person"><div class="titlepage"><div><div><h3 class="title"><a name="idp5583632"></a>EDU person</h3></div></div></div><p>EDU person accounts are mainly used in university networks. You
        can specify the principal name, nick names and much more.</p><div class="screenshot"><div class="mediaobject"><img src="images/mod_eduPerson.png"></div></div></div><div class="section" title="Password policy (LAM Pro)"><div class="titlepage"><div><div><h3 class="title"><a name="idp5586576"></a>Password policy (LAM Pro)</h3></div></div></div><p>OpenLDAP supports the <a class="ulink" href="http://linux.die.net/man/5/slapo-ppolicy" target="_top">ppolicy</a> overlay
        to manage password policies for LDAP entries. LAM Pro supports <a class="link" href="ch03s14.html" title="Password policies (LAM Pro)">managing the policies</a> and assigning them to
        user accounts.</p><p>Please add the account type "Password policies" to your LAM
        server profile and activate the "Password policy" module for the user
        type.</p><div class="screenshot"><div class="mediaobject"><img src="images/ppolicyUser.png"></div></div><p>You can assign any password policy which is found in the LDAP
        suffix of the "Password policies" type. When you set the policy to
        "default" then OpenLDAP will use the default policy as defined in your
        slapd.conf file.</p></div><div class="section" title="FreeRadius"><div class="titlepage"><div><div><h3 class="title"><a name="idp5591904"></a>FreeRadius</h3></div></div></div><p>FreeRadius is a software that implements the RADIUS
        authentication protocol. LAM allows you to mange several of the
        FreeRadius attributes.</p><p>To activate the FreeRadius plugin please activate the FreeRadius
        user module in your server profile:</p><div class="screenshot"><div class="mediaobject"><img src="images/mod_freeRadius1.png"></div></div><p>You can disable unneeded fields on the tab "Module
        settings":</p><div class="screenshot"><div class="mediaobject"><img src="images/mod_freeRadius2.png"></div></div><p>Now you will see the tab "FreeRadius" when editing users. The
        extension can be (de)activated for each user. You can setup e.g.
        realm, IP and expiration date.</p><div class="screenshot"><div class="mediaobject"><img src="images/mod_freeRadius3.png"></div></div></div><div class="section" title="Heimdal Kerberos (LAM Pro)"><div class="titlepage"><div><div><h3 class="title"><a name="idp5599728"></a>Heimdal Kerberos (LAM Pro)</h3></div></div></div><p>You can manage your Heimdal Kerberos accounts with LAM Pro.
        Please add the user module "Heimdal Kerberos" to activate this
        feature.</p><p><span class="bold"><strong>Setup password changing</strong></span></p><p>LAM Pro cannot generate the password hashes itself because
        Heimdal uses a propietary format for them. Therefore, LAM Pro needs to
        call e.g. kadmin to set the password.</p><p>The wildcards @@password@@ and @@principal@@ are replaced with
        password and principal name. Please use keytab authentication for this
        command since it must run without any interaction.</p><p>Example to create a keytab: ktutil -k /root/lam.keytab add -p
        lam@LAM.LOCAL -e aes256-cts-hmac-sha1-96 -V 1</p><p>Security hint: Please secure your LAM Pro server since the new
        passwords will be visible for a short term in the process list during
        password change.</p><div class="screenshot"><div class="mediaobject"><img src="images/mod_kerberos2.png"></div></div><p><span class="bold"><strong>User management</strong></span></p><p>You can specify the principal/user name, ticket lifetimes and
        expiration dates.</p><div class="screenshot"><div class="mediaobject"><img src="images/mod_kerberos1.png"></div></div></div><div class="section" title="Mail routing"><div class="titlepage"><div><div><h3 class="title"><a name="idp5608576"></a>Mail routing</h3></div></div></div><p>LAM supports to manage mail routing for user accounts. You can
        specify a routing address, the mail server and a number of local
        addresses to route. This feature can be activated by adding the "Mail
        routing" module to the user account type in your server
        profile.</p><div class="screenshot"><div class="mediaobject"><img src="images/mailRouting.png"></div></div></div><div class="section" title="SSH keys"><div class="titlepage"><div><div><h3 class="title"><a name="idp5611680"></a>SSH keys</h3></div></div></div><p>You can manage your public keys for SSH in LAM if you installed
        the <a class="ulink" href="http://code.google.com/p/openssh-lpk/" target="_top">LPK patch for
        SSH</a>. Activate the "SSH public key" module for users in the
        server profile and you can add keys to your user entries.</p><div class="screenshot"><div class="mediaobject"><img src="images/ldapPublicKey.png"></div></div></div><div class="section" title="Authorized services"><div class="titlepage"><div><div><h3 class="title"><a name="idp5615344"></a>Authorized services</h3></div></div></div><p>You can setup PAM to check if a user is allowed to run a
        specific service (e.g. sshd) by reading the LDAP attribute
        "authorizedService". This way you can manage all allowed services via
        LAM.</p><p></p><p>To activate this PAM feature please setup your <span class="bold"><strong>/etc/libnss-ldap.conf</strong></span> and set
        "pam_check_service_attr" to "yes".</p><p></p><p>Inside LAM you can now set the allowed services. You may also
        setup default services in your account profiles.</p><div class="screenshot"><div class="mediaobject"><img src="images/mod_authorizedServices.png"></div></div></div><div class="section" title="IMAP mailboxes"><div class="titlepage"><div><div><h3 class="title"><a name="idp5620400"></a>IMAP mailboxes</h3></div></div></div><p>LAM may create and delete mailboxes on an IMAP server for your
        user accounts. You will need an IMAP server that supports either SSL
        or TLS for this feature.</p><p>To activate the mailbox management module please add the
        "Mailbox (imapAccess)" module for the type user in your LAM server
        profile:</p><div class="screenshot"><div class="mediaobject"><img src="images/imapAccess1.png"></div></div><p>Now configure the module on the tab "Module settings". Here you
        can specify the IMAP server name, encryption options, the
        authentication for the IMAP connection and the valid mail domains. LAM
        can use either your LAM login password for the IMAP connection or
        display a dialog where you need to enter the password. The mail
        domains specify for which accounts mailboxes may be created/deleted.
        E.g. if you enter "lam-demo.org" then mailboxes can be managed for
        "user@lam-demo.org" but not for "user@example.com".</p><p>You need to install the SSL certificate of the CA that signed
        your server certificate. This is usually done by installing the
        certificate in /etc/ssl/certs. Different Linux distributions may offer
        different ways to do this. For Debian please copy the certificate in
        "/usr/local/share/ca-certificates" and run "update-ca-certificates" as
        root.</p><p>It is not recommended to disable the validation of IMAP server
        certificates.</p><div class="screenshot"><div class="mediaobject"><img src="images/imapAccess2.png"></div></div><p>When you edit an user account then you will now see the tab
        "Mailbox". Here you can create/delete the mailbox for this
        user.</p><div class="screenshot"><div class="mediaobject"><img src="images/imapAccess3.png"></div></div></div><div class="section" title="Account"><div class="titlepage"><div><div><h3 class="title"><a name="s_account"></a>Account</h3></div></div></div><p>This is a very simple module to manage accounts based on the
        object class "account". Usually, this is used for host accounts only.
        Please pay attention that users based on the "account" object class
        cannot have contact information (e.g. telephone number) as with
        "inetOrgPerson".</p><p>You can enter a user/host name and a description for your
        accounts.</p><div class="screenshot"><div class="mediaobject"><img src="images/mod_account.png"></div></div></div></div></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="ch02s02.html">Prev</a></td><td width="20%" align="center"></td><td width="40%" align="right"><a accesskey="n" href="ch03s02.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Server profiles</td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top">Groups</td></tr></table></div></body></html>