diff --git a/INSTALL.md b/INSTALL.md index de13ef5..6171da4 100644 --- a/INSTALL.md +++ b/INSTALL.md @@ -8,11 +8,11 @@ Step by step approach on how to setup and run an openLDAP server on a systemd-le build ldapdock from the dockerfile and run into it, creating the proper volumes to save databases data, config data, and certs data ``` -> docker build -t ldapdock /path/to/dockerfile +> docker build -t ldapdock --build-arg LDAP_HOST=example.com . ``` ``` -> docker run -i -t -p 389:389 -p 636:636 -h example.com -v ldap_data:/var/lib/ldap -v ldap_config:/etc/ldap/slapd.d -v ldap_certs:/etc/ldap/certs -v $(pwd)/host-certs:/export-certs ldapdock +> docker run -i -t -p 389:389 -p 636:636 -h ${LDAP_HOST:-example.com} -v ldap_data:/var/lib/ldap -v ldap_config:/etc/ldap/slapd.d -v ldap_certs:/etc/ldap/certs -v $(pwd)/host-certs:/export-certs ldapdock ``` ## _2- Run the openLDAP server and populate a directory_ @@ -92,9 +92,9 @@ changetype: add objectClass: olcOverlayConfig objectClass: olcPPolicyConfig olcOverlay: ppolicy -olcPPolicyDefault: cn=default,ou=policies,dc=example,dc=com EOF ``` + ``` ldapadd -Q -Y EXTERNAL -H ldapi:/// -f enable_ppolicy.ldif ``` @@ -297,7 +297,7 @@ Server template ``` root@example:/etc/ldap/certs# cat > ldap01.info < sudo cp mycacert.crt /usr/local/share/ca-certificates/ > sudo update-ca-certificates ``` -In both cases by default the login "user" and password are:\ +In both cases, providing -h ${LDAP_HOST}, by default the login "user" and password are:\ BIND DN=cn=admin,dc=example,dc=com\ BIND password=admin