README v1.2.6 2025-01-07
Table of contents
1. General
1.1 Extract the NED package
1.2 Install the NED package
1.2.1 Local install
1.2.2 System install
1.3 Configure the NED in NSO
2. Optional debug and trace setup
3. Dependencies
4. Sample device configuration
5. Built in live-status actions
6. Built in live-status show
7. Limitations
8. How to report NED issues and feature requests
9. How to rebuild a NED
10. Configure the NED to use ssh multi factor authentication1. General
General info and considerations.
1.1 Extract the NED package
1.2 Install the NED package
1.2.1 Local install
1.2.2 System install
1.3 Configure the NED in NSO
1.3.1 <MANDATORY!> Configure/define LDAP-SETTINGS:
1.3.2 From redhat-dir389 v1.2.0 onwards, additional options are available:
1.3.3 Example of ned-settings configuration with tls enabled:
1.3.4 Example of ned-settings configuration with tls disabled:
1.3.5 VERY IMPORTANT! Define managed-dn-list BASE DN or full DN to be managed by the NED.
2. Optional debug and trace setup
3. Dependencies
4. Sample device configuration
NED USAGE EXAMPLE
LDAP entries are managed under ldap-entries list
/ldap-entries list has 4 keys requested to work around the unique dn name combination, as defined in ned settings too:
/ldap-entries list has 4 keys requested to work around the unique dn name combination, as defined in ned settings too:After the key is provided, all the attributes available will be visible:
Attributes list can contain quoted LDIF ready <attribute: value> pairs, quoted if the cli doesn't otherwise accept them.
4.1 VERY IMPORTANT: Ldap Entries usage and management
RedHat Dir389 default configuration seems to allow very relaxed combinations of Ldap Entries attributes name : values.
RedHat directory 389 allows above behavior, and since we don't have any detailed yang design to limit this behavior, it will be allowed in the NED too.
4.2 Initial config, sample
4.3 Create new Ldap Entry:
TO fix above exception, update ned settings with the dn parameters, commit, run a connect/sync-from and retry.
4.4 Delete existing ldap entry
4.5 Modify existing ldap entry - replacing existing attribute value
VERY IMPORTANT !:
To update existing attributes entry, if you wish to just replace the value of a given attribute, you must:
* Example: update password attribute
5. Built in live-status actions
6. Built in live-status show
7. Limitations
8. How to report NED issues and feature requests
9. How to rebuild a NED
10. Configure the NED to use ssh multi factor authentication
10.1 Trouble shooting
Last updated
Was this helpful?

