Actions
Examples in this documentation depend on features activated in the The code samples demonstrate how to contact the server over HTTPS using the deployment CA certificate. Before trying the samples, generate the CA certificate in PEM format from the server deployment ID and password:
|
Authenticate
You can use _action=authenticate
to get a bearer token valid for multiple HDAP requests.
For details, refer to Bearer auth.
Change your password
This action requires HTTPS to avoid sending the password over an insecure connection. |
Use HTTPS POST with _action=modifyPassword
in the query string
and a JSON object with the old and new passwords in the following fields:
oldPassword
-
The value of this field is the current password as a UTF-8 string.
newPassword
-
The value of this field is the new password as a UTF-8 string.
On success, the HTTP status code is 200 OK, and the response body is an empty JSON resource:
-
Curl
-
JavaScript
-
Python
-
Ruby
$ curl \
--request POST \
--cacert ca-cert.pem \
--user dc=com/dc=example/ou=People/uid=bjensen:hifalutin \
--header 'Content-Type: application/json' \
--data '{"oldPassword": "hifalutin", "newPassword": "chngthspwd"}' \
'https://localhost:8443/hdap/dc=com/dc=example/ou=People/uid=bjensen?_action=modifyPassword'
{}
(async () => {
const { authenticate, doRequest, getOptions } = require('./utils')
const options = getOptions({
path: '/hdap/dc=com/dc=example/ou=People/uid=bjensen?_action=modifyPassword&dryRun=true',
method: 'POST',
credentials: 'dc=com/dc=example/ou=People/uid=bjensen:hifalutin',
body: { "oldPassword": "hifalutin", "newPassword": "chngthspwd" }
})
const jwt = await authenticate(options)
options.headers['Authorization'] = 'Bearer ' + jwt
const response = await doRequest('HDAP: dry-run change password', options)
console.log(response)
})().catch(error => { console.error(error) })
Source files for this sample: action-change-password.js, utils.js
Remove the dry-run
parameter to perform the operation.
#!/usr/bin/env python3
import requests
import utils
body = { 'oldPassword': 'hifalutin', 'newPassword': 'chngthspwd' }
jwt = utils.authenticate('dc=com/dc=example/ou=People/uid=bjensen', 'hifalutin')
headers = { 'Content-Type': 'application/json', 'Authorization': f'Bearer {jwt}' }
params = { '_action': 'modifyPassword', 'dryRun': True }
response = requests.post(
f'https://{utils.host}:{utils.port}/hdap/dc=com/dc=example/ou=People/uid=bjensen',
headers=headers,
json=body,
params=params,
verify=utils.ca_pem)
print('Status code: %d\nJSON: %s' % (response.status_code, response.json()))
Source files for this sample: utils.py, action-change-password.py
Remove the dryRun
parameter to perform the operation.
require_relative 'utils.rb'
require 'faraday'
require 'json'
utils = Utils.new('dc=com/dc=example/ou=People/uid=bjensen', 'hifalutin')
options = { ca_file: utils.ca_pem }
jwt = utils.authenticate
query = { '_action': 'modifyPassword', 'dryRun': true }
hdap = Faraday.new(url: "https://#{utils.host}:#{utils.port}/hdap/", params: query, ssl: options) do |f|
f.headers['Content-Type'] = 'application/json'
f.request :authorization, 'Bearer', jwt
end
body = { "oldPassword" => "hifalutin", "newPassword" => "chngthspwd" }
response = hdap.post do |h|
h.path = 'dc=com/dc=example/ou=People/uid=bjensen'
h.body = JSON.generate(body)
end
puts "Status code: #{response.status}\nJSON: #{response.body}"
Source files for this sample: utils.rb, action-change-password.rb
HDAP Ruby examples require Ruby 3.2 and the faraday
and json
gems.
Check password quality
Use the passwordQualityAdvice
and dryRun
query string parameters to get details when a password update fails,
to test passwords, and to test password policies:
-
The
passwordQualityAdvice
parameter relies on the LDAP password quality advice control, OID1.3.6.1.4.1.36733.2.1.5.5
. Users modifying their password must have access to request the control.The password quality advice control and the
passwordQualityAdvice
parameter have interface stability: Evolving. -
The
dryRun
parameter relies on the LDAP no-op control, OID1.3.6.1.4.1.4203.1.10.2
.
The following example shows a password update failure. The status code is HTTP 400 Bad Request and the response JSON describes what passed and what failed:
-
Curl
-
JavaScript
-
Python
-
Ruby
$ curl \
--request POST \
--cacert ca-cert.pem \
--user dc=com/dc=example/ou=People/uid=bjensen:hifalutin \
--header 'Content-Type: application/json' \
--data '{"oldPassword": "hifalutin", "newPassword": "t00shrt"}' \
'https://localhost:8443/hdap/dc=com/dc=example/ou=People/uid=bjensen?_action=modifyPassword&passwordQualityAdvice=true&dryRun=true'
{
"code" : 400,
"reason" : "Bad Request",
"message" : "Constraint Violation: The provided new password failed the validation checks defined in the server: The provided password is shorter than the minimum required length of 8 characters",
"detail" : {
"passwordQualityAdvice" : {
"attributeType" : "userPassword",
"failingCriteria" : [ {
"parameters" : {
"max-password-length" : 0,
"min-password-length" : 8
},
"type" : "length-based"
} ],
"passingCriteria" : [ {
"parameters" : {
"case-sensitive-validation" : false,
"check-substrings" : true,
"min-substring-length" : 5,
"test-reversed-password" : false
},
"type" : "dictionary"
} ]
}
}
}
(async () => {
const { authenticate, doRequest, getOptions } = require('./utils')
const options = getOptions({
path: '/hdap/dc=com/dc=example/ou=People/uid=bjensen?_action=modifyPassword&passwordQualityAdvice=true&dryRun=true',
method: 'POST',
credentials: 'dc=com/dc=example/ou=People/uid=bjensen:hifalutin',
body: { "oldPassword": "hifalutin", "newPassword": "t00shrt" }
})
const jwt = await authenticate(options)
options.headers['Authorization'] = 'Bearer ' + jwt
const response = await doRequest('HDAP: dry-run check password quality', options)
console.log(response)
})().catch(error => { console.error(error) })
Source files for this sample: action-check-password-quality.js, utils.js
Remove the dryRun
parameter to perform the operation.
#!/usr/bin/env python3
import requests
import utils
body = { 'oldPassword': 'hifalutin', 'newPassword': 't00shrt' }
jwt = utils.authenticate('dc=com/dc=example/ou=People/uid=bjensen', 'hifalutin')
headers = { 'Content-Type': 'application/json', 'Authorization': f'Bearer {jwt}' }
params = { '_action': 'modifyPassword', 'passwordQualityAdvice': True, 'dryRun': True }
response = requests.post(
f'https://{utils.host}:{utils.port}/hdap/dc=com/dc=example/ou=People/uid=bjensen',
headers=headers,
json=body,
params=params,
verify=utils.ca_pem)
print('Status code: %d\nJSON: %s' % (response.status_code, response.json()))
Source files for this sample: utils.py, action-check-password-quality.py
Remove the dryRun
parameter to perform the operation.
Remove the dry-run
parameter to perform the operation.
require_relative 'utils.rb'
require 'faraday'
require 'json'
utils = Utils.new('dc=com/dc=example/ou=People/uid=bjensen', 'hifalutin')
options = { ca_file: utils.ca_pem }
jwt = utils.authenticate
query = { '_action': 'modifyPassword', 'passwordQualityAdvice': true, 'dryRun': true }
hdap = Faraday.new(url: "https://#{utils.host}:#{utils.port}/hdap/", params: query, ssl: options) do |f|
f.headers['Content-Type'] = 'application/json'
f.request :authorization, 'Bearer', jwt
end
body = { "oldPassword" => "hifalutin", "newPassword" => "t00shrt" }
response = hdap.post do |h|
h.path = 'dc=com/dc=example/ou=People/uid=bjensen'
h.body = JSON.generate(body)
end
puts "Status code: #{response.status}\nJSON: #{response.body}"
Source files for this sample: utils.rb, action-check-password-quality.rb
HDAP Ruby examples require Ruby 3.2 and the faraday
and json
gems.
"max-password-length" : 0
means DS does not enforce an upper bound.
You can use passwordQualityAdvice
without the dryRun
parameter.
On failure, you get diagnostic information as shown in the preceding example.
On success, the HTTP status code is 200 OK and the response body is an empty JSON resource.
Reset a password
When one user changes another user’s password, DS considers it a password reset. Password policies can require users to change their passwords again after a password reset.
This action requires HTTPS to avoid sending the password over an insecure connection. |
The example demonstrates a password administrator changing a user’s password.
The password administrator must have the password-reset
privilege;
otherwise, the reset fails due to insufficient access:
-
Curl
-
JavaScript
-
Python
-
Ruby
$ curl \
--request PATCH \
--cacert ca-cert.pem \
--user uid=admin:password \
--header 'Content-Type: application/json' \
--data '[{
"operation": "add",
"field": "ds-privilege-name",
"value": "password-reset"
}]' \
'https://localhost:8443/hdap/dc=com/dc=example/ou=People/uid=kvaughan?_prettyPrint=true'
(async () => {
const { authenticate, doRequest, getOptions } = require('./utils')
const options = getOptions({
path: '/hdap/dc=com/dc=example/ou=People/uid=kvaughan?_fields=_id,ds-privilege-name',
method: 'PATCH',
credentials: 'uid=admin:password',
body: [{
"operation": "add",
"field": "ds-privilege-name",
"value": "password-reset"
}]
})
const jwt = await authenticate(options)
options.headers['Authorization'] = 'Bearer ' + jwt
const response = await doRequest('HDAP: assign the password-reset privilege', options)
console.log(response)
})().catch(error => { console.error(error) })
Source files for this sample: action-password-reset.js, utils.js
#!/usr/bin/env python3
import requests
import utils
jwt = utils.authenticate('uid=admin', 'password')
headers = { 'Content-Type': 'application/json', 'Authorization': f'Bearer {jwt}' }
patch = [{
'operation': 'add',
'field': 'ds-privilege-name',
'value': 'password-reset'
}]
response = requests.patch(
f'https://{utils.host}:{utils.port}/hdap/dc=com/dc=example/ou=People/uid=kvaughan',
headers=headers,
json=patch,
verify=utils.ca_pem)
print('Status code: %d\nJSON: %s' % (response.status_code, response.json()))
Source files for this sample: utils.py, action-password-reset.py
require_relative 'utils.rb'
require 'faraday'
require 'json'
utils = Utils.new('uid=admin', 'password')
options = { ca_file: utils.ca_pem }
jwt = utils.authenticate
query = { '_fields': '_id,ds-privilege-name' }
hdap = Faraday.new(url: "https://#{utils.host}:#{utils.port}/hdap/", params: query, ssl: options) do |f|
f.headers['Content-Type'] = 'application/json'
f.request :authorization, 'Bearer', jwt
end
body = [{
"operation" => "add",
"field" => "ds-privilege-name",
"value" => "password-reset"
}]
response = hdap.patch do |h|
h.path = 'dc=com/dc=example/ou=People/uid=kvaughan'
h.body = JSON.generate(body)
end
puts "Status code: #{response.status}\nJSON: #{response.body}"
Source files for this sample: utils.rb, action-password-reset.rb
HDAP Ruby examples require Ruby 3.2 and the faraday
and json
gems.
Use HTTPS POST with _action=resetPassword
in the query string
and an empty JSON document ({}
) as the POST data.
On success, the HTTP status code is 200 OK.
The response body is a JSON resource with a generatedPassword
containing the new password:
-
Curl
-
JavaScript
-
Python
-
Ruby
$ curl \
--request POST \
--cacert ca-cert.pem \
--user dc=com/dc=example/ou=People/uid=kvaughan:bribery \
--header "Content-Type: application/json" \
--data '{}' \
'https://localhost:8443/hdap/dc=com/dc=example/ou=People/uid=bjensen?_action=resetPassword'
{"generatedPassword":"<new-password>"}
(async () => {
const { authenticate, doRequest, getOptions } = require('./utils')
const options = getOptions({
path: '/hdap/dc=com/dc=example/ou=People/uid=bjensen?_action=resetPassword&dryRun=true',
method: 'POST',
body: {}
})
const jwt = await authenticate(options)
options.headers['Authorization'] = 'Bearer ' + jwt
const response = await doRequest('HDAP: dry-run reset password', options)
console.log(response)
})().catch(error => { console.error(error) })
Source files for this sample: action-reset-password.js, utils.js
Remove the dryRun
parameter to perform the operation.
#!/usr/bin/env python3
import requests
import utils
body = {}
jwt = utils.authenticate('dc=com/dc=example/ou=People/uid=kvaughan', 'bribery')
headers = { 'Content-Type': 'application/json', 'Authorization': f'Bearer {jwt}' }
params = { '_action': 'resetPassword', 'dryRun': True }
response = requests.post(
f'https://{utils.host}:{utils.port}/hdap/dc=com/dc=example/ou=People/uid=bjensen',
headers=headers,
json=body,
params=params,
verify=utils.ca_pem)
print('Status code: %d\nJSON: %s' % (response.status_code, response.json()))
Source files for this sample: utils.py, action-reset-password.py
Remove the dryRun
parameter to perform the operation.
require_relative 'utils.rb'
require 'faraday'
require 'json'
utils = Utils.new('dc=com/dc=example/ou=People/uid=kvaughan', 'bribery')
options = { ca_file: utils.ca_pem }
jwt = utils.authenticate
query = { '_action': 'resetPassword', 'dryRun': true }
hdap = Faraday.new(url: "https://#{utils.host}:#{utils.port}/hdap/", params: query, ssl: options) do |f|
f.headers['Content-Type'] = 'application/json'
f.request :authorization, 'Bearer', jwt
end
response = hdap.post do |h|
h.path = 'dc=com/dc=example/ou=People/uid=bjensen'
h.body = JSON.generate('{}')
end
puts "Status code: #{response.status}\nJSON: #{response.body}"
Source files for this sample: utils.rb, action-reset-password.rb
HDAP Ruby examples require Ruby 3.2 and the faraday
and json
gems.
Remove the dryRun
parameter to perform the operation.
The password administrator must communicate the generated password to the user.
Use this in combination with a password policy to force the user to change their password again after a reset.
Account usability action
Use the accountUsability
action to get details about a user’s ability to authenticate.
-
The action depends on the LDAP Account usability control, which has OID
1.3.6.1.4.1.42.2.27.9.5.8
. -
The password administrator must have access to use the LDAP control.
Try the accountUsability
action:
-
Grant the password administrator permission to use the control.
The following example sets a global ACI for Kirsten Vaughan:
$ dsconfig \ set-access-control-handler-prop \ --hostname localhost \ --port 4444 \ --bindDN uid=admin \ --bindPassword password \ --add global-aci:"(targetcontrol=\"AccountUsability\")(version 3.0; acl \"Account usability access\"; allow(read) userdn=\"ldap:///uid=kvaughan,ou=People,dc=example,dc=com\";)" \ --usePkcs12TrustStore /path/to/opendj/config/keystore \ --trustStorePassword:file /path/to/opendj/config/keystore.pin \ --no-prompt
-
Use a password policy that produces results for account usability:
-
Curl
-
JavaScript
-
Python
-
Ruby
$ curl \ --request POST \ --user uid=admin:password \ --cacert ca-cert.pem \ --header 'Content-Type: application/json' \ --data '{ "_id": "dc=com/dc=example/cn=Lockout%20with%20max%20age%20and%20grace%20logins", "objectClass": ["top", "subentry", "ds-pwp-password-policy"], "cn": ["Lockout with max age and grace logins"], "ds-pwp-default-password-storage-scheme": ["PBKDF2-HMAC-SHA256"], "ds-pwp-grace-login-count": 3, "ds-pwp-lockout-duration": "5 m", "ds-pwp-lockout-failure-count": 3, "ds-pwp-lockout-failure-expiration-interval": "10 m", "ds-pwp-max-password-age": "30 d", "ds-pwp-password-attribute": "userPassword", "subtreeSpecification": { "base": "ou=people", "filter": "/uid eq \"bjensen\"" } }' \ 'https://localhost:8443/hdap/dc=com/dc=example?_action=create'
(async () => { const { authenticate, doRequest, getOptions } = require('./utils') const options = getOptions({ path: '/hdap/dc=com/dc=example?_action=create', credentials: 'uid=admin:password', method: 'POST', body: { "_id": "dc=com/dc=example/cn=Lockout%20with%20max%20age%20and%20grace%20logins", "objectClass": ["top", "subentry", "ds-pwp-password-policy"], "cn": ["Lockout with max age and grace logins"], "ds-pwp-default-password-storage-scheme": ["PBKDF2-HMAC-SHA256"], "ds-pwp-grace-login-count": 3, "ds-pwp-lockout-duration": "5 m", "ds-pwp-lockout-failure-count": 3, "ds-pwp-lockout-failure-expiration-interval": "10 m", "ds-pwp-max-password-age": "30 d", "ds-pwp-password-attribute": "userPassword", "subtreeSpecification": { "base": "ou=people", "filter": "/uid eq \"bjensen\"" } } }) const jwt = await authenticate(options) options.headers['Authorization'] = 'Bearer ' + jwt const response = await doRequest('HDAP: add password policy', options) console.log(response) })().catch(error => { console.error(error) })
Source files for this sample: action-add-password-policy.js, utils.js
#!/usr/bin/env python3 import requests import utils body = { '_id': 'dc=com/dc=example/cn=Lockout%20with%20max%20age%20and%20grace%20logins', 'objectClass': ['top', 'subentry', 'ds-pwp-password-policy'], 'cn': ['Lockout with max age and grace logins'], 'ds-pwp-default-password-storage-scheme': ['PBKDF2-HMAC-SHA256'], 'ds-pwp-grace-login-count': 3, 'ds-pwp-lockout-duration': '5 m', 'ds-pwp-lockout-failure-count': 3, 'ds-pwp-lockout-failure-expiration-interval': '10 m', 'ds-pwp-max-password-age': '30 d', 'ds-pwp-password-attribute': 'userPassword', 'subtreeSpecification': { "base": "ou=people", "filter": "/uid eq \"bjensen\"" } } jwt = utils.authenticate('uid=admin', 'password') headers = { 'Content-Type': 'application/json', 'Authorization': f'Bearer {jwt}' } response = requests.post( f'https://{utils.host}:{utils.port}/hdap/dc=com/dc=example', headers=headers, json=body, verify=utils.ca_pem) print('Status code: %d\nJSON: %s' % (response.status_code, response.json()))
Source files for this sample: utils.py, utils.py, action-add-password-policy.py
require_relative 'utils.rb' require 'faraday' require 'json' utils = Utils.new('uid=admin', 'password') options = { ca_file: utils.ca_pem } jwt = utils.authenticate hdap = Faraday.new(url: "https://#{utils.host}:#{utils.port}/hdap/", ssl: options) do |f| f.headers['Content-Type'] = 'application/json' f.request :authorization, 'Bearer', jwt end body = { "_id" => "dc=com/dc=example/cn=Lockout%20with%20max%20age%20and%20grace%20logins", "objectClass" => ["top", "subentry", "ds-pwp-password-policy"], "cn" => ["Lockout with max age and grace logins"], "ds-pwp-default-password-storage-scheme" => ["PBKDF2-HMAC-SHA256"], "ds-pwp-grace-login-count" => 3, "ds-pwp-lockout-duration" => "5 m", "ds-pwp-lockout-failure-count" => 3, "ds-pwp-lockout-failure-expiration-interval" => "10 m", "ds-pwp-max-password-age" => "30 d", "ds-pwp-password-attribute" => "userPassword", "subtreeSpecification" => { "base": "ou=people", "filter": "/uid eq \"bjensen\"" } } response = hdap.post do |h| h.path = 'dc=com/dc=example' h.body = JSON.generate(body) end puts "Status code: #{response.status}\nJSON: #{response.body}"
Source files for this sample: utils.rb, action-add-password-policy.rb
HDAP Ruby examples require Ruby 3.2 and the
faraday
andjson
gems. -
-
Produce some account usability information on a user account:
-
Curl
-
JavaScript
-
Python
-
Ruby
$ curl \ --user dc=com/dc=example/ou=People/uid=bjensen:wrong-password \ --cacert ca-cert.pem \ 'https://localhost:8443/hdap/dc=com/dc=example/ou=People/uid=bjensen?_fields=_id' $ curl \ --user dc=com/dc=example/ou=People/uid=bjensen:wrong-password \ --cacert ca-cert.pem \ 'https://localhost:8443/hdap/dc=com/dc=example/ou=People/uid=bjensen?_fields=_id' $ curl \ --user dc=com/dc=example/ou=People/uid=bjensen:wrong-password \ --cacert ca-cert.pem \ 'https://localhost:8443/hdap/dc=com/dc=example/ou=People/uid=bjensen?_fields=_id'
const { doRequest, getOptions } = require('./utils') const options = getOptions({ path: '/hdap/dc=com/dc=example/ou=People/uid=bjensen?_fields=_id', credentials: 'dc=com/dc=example/ou=People/uid=bjensen:wrong-password' }) doRequest('HDAP: Basic auth with wrong password', options) .then(response => { console.log(response) }) .catch(error => { console.error(error) }) .finally(() => { doRequest('HDAP: Basic auth with wrong password', options) .then(response => { console.log(response) }) .catch(error => { console.error(error) }) .finally(() => { doRequest('HDAP: Basic auth with wrong password', options) .then(response => { console.log(response) }) .catch(error => { console.error(error) }) }) })
Source files for this sample: action-lock-bjensen.js, utils.js
#!/usr/bin/env python3 import requests from requests.auth import HTTPBasicAuth import utils for i in range(3): response = requests.get( f'https://{utils.host}:{utils.port}/hdap/dc=com/dc=example/ou=People/uid=bjensen', auth=HTTPBasicAuth('dc=com/dc=example/ou=People/uid=bjensen', 'wrong-password'), verify=utils.ca_pem) print('Status code: %d\nJSON: %s' % (response.status_code, response.json()))
Source files for this sample: utils.py, action-lock-bjensen.py
require_relative 'utils.rb' require 'faraday' require 'json' utils = Utils.new('', '') options = { ca_file: utils.ca_pem } hdap = Faraday.new(url: "https://#{utils.host}:#{utils.port}/hdap/", ssl: options) do |f| f.headers['Content-Type'] = 'application/json' f.request :authorization, :basic, 'dc=com/dc=example/ou=People/uid=bjensen', 'wrong-password' end 3.times do response = hdap.get('dc=com/dc=example/ou=People/uid=bjensen') puts "Status code: #{response.status}\nJSON: #{response.body}" end
Source files for this sample: utils.rb, action-lock-bjensen.rb
HDAP Ruby examples require Ruby 3.2 and the
faraday
andjson
gems. -
-
Use the action to get account usability information:
-
Curl
-
JavaScript
-
Python
-
Ruby
$ curl \ --request POST \ --user dc=com/dc=example/ou=People/uid=kvaughan:bribery \ --header 'Content-Type: application/json' \ --cacert ca-cert.pem \ --data '{}' \ 'https://localhost:8443/hdap/dc=com/dc=example/ou=People/uid=bjensen?_action=accountUsability' {"status":"locked","unlockIn":299}
(async () => { const { authenticate, doRequest, getOptions } = require('./utils') const options = getOptions({ path: '/hdap/dc=com/dc=example/ou=People/uid=bjensen?_action=accountUsability&dryRun=true', method: 'POST', body: {} }) const jwt = await authenticate(options) options.headers['Authorization'] = 'Bearer ' + jwt const response = await doRequest('HDAP: dry-run check account usability', options) console.log(response) })().catch(error => { console.error(error) })
Source files for this sample: action-account-usability.js, utils.js
Remove the
dryRun
parameter to perform the operation.#!/usr/bin/env python3 import requests import utils body = {} jwt = utils.authenticate('dc=com/dc=example/ou=People/uid=kvaughan', 'bribery') headers = { 'Content-Type': 'application/json', 'Authorization': f'Bearer {jwt}' } params = { '_action': 'accountUsability' } response = requests.post( f'https://{utils.host}:{utils.port}/hdap/dc=com/dc=example/ou=People/uid=bjensen', headers=headers, json=body, params=params, verify=utils.ca_pem) print('Status code: %d\nJSON: %s' % (response.status_code, response.json()))
Source files for this sample: utils.py, action-account-usability.py
Remove the
dryRun
parameter to perform the operation.require_relative 'utils.rb' require 'faraday' require 'json' utils = Utils.new('dc=com/dc=example/ou=People/uid=kvaughan', 'bribery') options = { ca_file: utils.ca_pem } jwt = utils.authenticate query = { '_action': 'accountUsability' } hdap = Faraday.new(url: "https://#{utils.host}:#{utils.port}/hdap/", params: query, ssl: options) do |f| f.headers['Content-Type'] = 'application/json' f.request :authorization, 'Bearer', jwt end response = hdap.post do |h| h.path = 'dc=com/dc=example/ou=People/uid=bjensen' h.body = JSON.generate('{}') end puts "Status code: #{response.status}\nJSON: #{response.body}"
Source files for this sample: utils.rb, action-account-usability.rb
HDAP Ruby examples require Ruby 3.2 and the
faraday
andjson
gems.Remove the
dryRun
parameter to perform the operation. -
The JSON response can contain the following fields.
The status
property is always present.
The other fields are present if they apply:
{
"status": "string", // One of "disabled", "locked", "passwordExpired",
// "mustChangePassword", or "valid"
"unlockIn": number, // Seconds until locked account is unlocked
"graceLoginsRemaining": number, // Number of remaining authentications allowed with
// an expired password
"passwordExpiresIn": number, // Seconds until password expires
}
Get JSON schema
Use the schema
action to get the JSON schema for a resource.
Perform an HTTP POST with _action=schema
in the query string and an empty JSON document ({}
) as the POST data:
-
Curl
-
JavaScript
-
Python
-
Ruby
$ curl \
--request POST \
--user dc=com/dc=example/ou=People/uid=kvaughan:bribery \
--header 'Content-Type: application/json' \
--cacert ca-cert.pem \
--data '{}' \
'https://localhost:8443/hdap/dc=com/dc=example/ou=People/uid=bjensen?_action=schema&_prettyPrint=true'
(async () => {
const { authenticate, doRequest, getOptions } = require('./utils')
const options = getOptions({
path: '/hdap/dc=com/dc=example/ou=People/uid=bjensen?_action=schema',
method: 'POST',
body: JSON.stringify({})
})
const jwt = await authenticate(options)
options.headers['Authorization'] = 'Bearer ' + jwt
const response = await doRequest('HDAP: get schema', options)
console.log(response)
})().catch(error => { console.error(error) })
Source files for this sample: action-get-schema.js, utils.js
#!/usr/bin/env python3
import requests
import utils
body = {}
jwt = utils.authenticate('dc=com/dc=example/ou=People/uid=kvaughan', 'bribery')
headers = { 'Content-Type': 'application/json', 'Authorization': f'Bearer {jwt}' }
params = { '_action': 'schema' }
response = requests.post(
f'https://{utils.host}:{utils.port}/hdap/dc=com/dc=example/ou=People/uid=bjensen',
headers=headers,
json=body,
params=params,
verify=utils.ca_pem)
print('Status code: %d\nJSON: %s' % (response.status_code, response.json()))
Source files for this sample: utils.py, action-get-schema.py
require_relative 'utils.rb'
require 'faraday'
require 'json'
utils = Utils.new('dc=com/dc=example/ou=People/uid=kvaughan', 'bribery')
options = { ca_file: utils.ca_pem }
jwt = utils.authenticate
query = { '_action': 'schema' }
hdap = Faraday.new(url: "https://#{utils.host}:#{utils.port}/hdap/", params: query, ssl: options) do |f|
f.headers['Content-Type'] = 'application/json'
f.request :authorization, 'Bearer', jwt
end
response = hdap.post do |h|
h.path = 'dc=com/dc=example/ou=People/uid=bjensen'
h.body = JSON.generate('{}')
end
puts "Status code: #{response.status}\nJSON: #{response.body}"
Source files for this sample: utils.rb, action-get-schema.rb
HDAP Ruby examples require Ruby 3.2 and the faraday
and json
gems.
Show output
{
"type" : "object",
"properties" : {
"objectClass" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
},
"const" : [ "top", "person", "cos", "oauth2TokenObject", "organizationalPerson", "inetOrgPerson", "posixAccount" ]
},
"sn" : {
"supertype" : "name",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"cn" : {
"supertype" : "name",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"telephoneNumber" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"seeAlso" : {
"supertype" : "distinguishedName",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string",
"format" : "json-pointer"
}
},
"userPassword" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"description" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"classOfService" : {
"type" : "string"
},
"diskQuota" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"mailQuota" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"oauth2Token" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "object"
}
},
"telexNumber" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"teletexTerminalIdentifier" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"ou" : {
"supertype" : "name",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"internationaliSDNNumber" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"registeredAddress" : {
"supertype" : "postalAddress",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "array",
"items" : {
"type" : "string"
}
}
},
"title" : {
"supertype" : "name",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"facsimileTelephoneNumber" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"x121Address" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"postOfficeBox" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"street" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"physicalDeliveryOfficeName" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"destinationIndicator" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"postalAddress" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "array",
"items" : {
"type" : "string"
}
}
},
"st" : {
"supertype" : "name",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"preferredDeliveryMethod" : {
"type" : "string"
},
"postalCode" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"l" : {
"supertype" : "name",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"preferredLanguage" : {
"description" : "preferred written or spoken language for a person",
"type" : "string"
},
"departmentNumber" : {
"description" : "identifies a department within an organization",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"o" : {
"supertype" : "name",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"carLicense" : {
"description" : "vehicle license or registration plate",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"secretary" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string",
"format" : "json-pointer"
}
},
"employeeType" : {
"description" : "type of employment for a person",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"homePhone" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"pager" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"employeeNumber" : {
"description" : "numerically identifies an employee within an organization",
"type" : "string"
},
"mobile" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"userPKCS12" : {
"description" : "PKCS #12 PFX PDU for exchange of personal identity information",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string",
"contentEncoding" : "base64"
}
},
"userCertificate" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string",
"contentEncoding" : "base64"
}
},
"businessCategory" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"userSMIMECertificate" : {
"description" : "PKCS#7 SignedData used to support S/MIME",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string",
"contentEncoding" : "base64"
}
},
"mail" : {
"description" : "The email address, including internationalized addresses (changed from the standard which only allowed ascii)",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"roomNumber" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"audio" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string",
"contentEncoding" : "base64"
}
},
"initials" : {
"supertype" : "name",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"manager" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string",
"format" : "json-pointer"
}
},
"photo" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string",
"contentEncoding" : "base64"
}
},
"givenName" : {
"supertype" : "name",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"homePostalAddress" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "array",
"items" : {
"type" : "string"
}
}
},
"displayName" : {
"description" : "preferred name of a person to be used when displaying entries",
"type" : "string"
},
"labeledURI" : {
"description" : "Uniform Resource Identifier with optional label",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"jpegPhoto" : {
"description" : "a JPEG image",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string",
"contentEncoding" : "base64"
}
},
"x500UniqueIdentifier" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"uid" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"homeDirectory" : {
"description" : "The absolute path to the home directory",
"type" : "string"
},
"gidNumber" : {
"description" : "An integer uniquely identifying a group in an administrative domain",
"type" : "integer"
},
"uidNumber" : {
"description" : "An integer uniquely identifying a user in an administrative domain",
"type" : "integer"
},
"loginShell" : {
"description" : "The path to the login shell",
"type" : "string"
},
"authPassword" : {
"description" : "password authentication information",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"gecos" : {
"description" : "The GECOS field; the common name",
"type" : "string"
}
},
"requiredProperties" : [ "cn", "gidNumber", "homeDirectory", "objectClass", "sn", "uid", "uidNumber" ],
"additionalProperties" : false
}
If you haven’t yet created a resource, you get the JSON schema for the resource to create from the parent resource
by specifying the LDAP object classes for the new resource.
Use the schema
action and a comma-separated list of object classes as the value of an objectClasses
parameter:
-
Curl
-
JavaScript
-
Python
-
Ruby
$ curl \
--request POST \
--user dc=com/dc=example/ou=People/uid=kvaughan:bribery \
--header 'Content-Type: application/json' \
--cacert ca-cert.pem \
--data '{}' \
'https://localhost:8443/hdap/dc=com/dc=example/ou=People?_action=schema&objectClasses=person,posixAccount&_prettyPrint=true'
(async () => {
const { authenticate, doRequest, getOptions } = require('./utils')
const options = getOptions({
path: '/hdap/dc=com/dc=example/ou=People?_action=schema&objectClasses=person,posixAccount',
method: 'POST',
body: JSON.stringify({})
})
const jwt = await authenticate(options)
options.headers['Authorization'] = 'Bearer ' + jwt
const response = await doRequest('HDAP: get schema for new resource', options)
console.log(response)
})().catch(error => { console.error(error) })
Source files for this sample: action-get-new-schema.js, utils.js
#!/usr/bin/env python3
import requests
import utils
body = {}
jwt = utils.authenticate('dc=com/dc=example/ou=People/uid=kvaughan', 'bribery')
headers = { 'Content-Type': 'application/json', 'Authorization': f'Bearer {jwt}' }
params = { '_action': 'schema', 'objectClasses': 'person,posixAccount' }
response = requests.post(
f'https://{utils.host}:{utils.port}/hdap/dc=com/dc=example/ou=People',
headers=headers,
json=body,
params=params,
verify=utils.ca_pem)
print('Status code: %d\nJSON: %s' % (response.status_code, response.json()))
Source files for this sample: utils.py, action-get-new-schema.py
require_relative 'utils.rb'
require 'faraday'
require 'json'
utils = Utils.new('dc=com/dc=example/ou=People/uid=kvaughan', 'bribery')
options = { ca_file: utils.ca_pem }
jwt = utils.authenticate
query = { '_action': 'schema', 'objectClasses': 'person,posixAccount' }
hdap = Faraday.new(url: "https://#{utils.host}:#{utils.port}/hdap/", params: query, ssl: options) do |f|
f.headers['Content-Type'] = 'application/json'
f.request :authorization, 'Bearer', jwt
end
response = hdap.post do |h|
h.path = 'dc=com/dc=example/ou=People'
h.body = JSON.generate('{}')
end
puts "Status code: #{response.status}\nJSON: #{response.body}"
Source files for this sample: utils.rb, action-get-new-schema.rb
HDAP Ruby examples require Ruby 3.2 and the faraday
and json
gems.
Show output
{
"type" : "object",
"properties" : {
"objectClass" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
},
"const" : [ "top", "person", "posixAccount" ]
},
"sn" : {
"supertype" : "name",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"cn" : {
"supertype" : "name",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"telephoneNumber" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"seeAlso" : {
"supertype" : "distinguishedName",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string",
"format" : "json-pointer"
}
},
"userPassword" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"description" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"homeDirectory" : {
"description" : "The absolute path to the home directory",
"type" : "string"
},
"gidNumber" : {
"description" : "An integer uniquely identifying a group in an administrative domain",
"type" : "integer"
},
"uidNumber" : {
"description" : "An integer uniquely identifying a user in an administrative domain",
"type" : "integer"
},
"uid" : {
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"loginShell" : {
"description" : "The path to the login shell",
"type" : "string"
},
"authPassword" : {
"description" : "password authentication information",
"type" : "array",
"uniqueItems" : true,
"items" : {
"type" : "string"
}
},
"gecos" : {
"description" : "The GECOS field; the common name",
"type" : "string"
}
},
"requiredProperties" : [ "cn", "gidNumber", "homeDirectory", "objectClass", "sn", "uid", "uidNumber" ],
"additionalProperties" : false
}
You can also read the schema for an individual field or object class directly as described in the reference for HDAP schema.
Rename a resource
Use the rename
action to change a resource’s _id
.
This effectively moves the resource.
Perform an HTTP POST with _action=rename
in the query string and the newId
in the POST data:
-
Curl
-
JavaScript
-
Python
-
Ruby
$ curl \
--request POST \
--user dc=com/dc=example/ou=People/uid=kvaughan:bribery \
--header 'Content-Type: application/json' \
--cacert ca-cert.pem \
--data '{"newId": "dc=com/dc=example/ou=People/uid=sjensen"}' \
'https://localhost:8443/hdap/dc=com/dc=example/ou=People/uid=scarter?_action=rename&_fields=uid'
{"uid":["scarter","sjensen"],"_id":"dc=com/dc=example/ou=People/uid=sjensen","_rev":"<revision>"}
(async () => {
const { authenticate, doRequest, getOptions } = require('./utils')
const options = getOptions({
path: '/hdap/dc=com/dc=example/ou=People/uid=scarter?_action=rename&_fields=uid',
method: 'POST',
body: { "newId": "dc=com/dc=example/ou=People/uid=sjensen" }
})
const jwt = await authenticate(options)
options.headers['Authorization'] = 'Bearer ' + jwt
const response = await doRequest('HDAP: rename a resource', options)
console.log(response)
})().catch(error => { console.error(error) })
Source files for this sample: action-rename.js, utils.js
#!/usr/bin/env python3
import requests
import utils
body = { 'newId': 'dc=com/dc=example/ou=People/uid=sjensen' }
jwt = utils.authenticate('dc=com/dc=example/ou=People/uid=kvaughan', 'bribery')
headers = { 'Content-Type': 'application/json', 'Authorization': f'Bearer {jwt}' }
params = { '_action': 'rename', '_fields': 'uid' }
response = requests.post(
f'https://{utils.host}:{utils.port}/hdap/dc=com/dc=example/ou=People/uid=scarter',
headers=headers,
json=body,
params=params,
verify=utils.ca_pem)
print('Status code: %d\nJSON: %s' % (response.status_code, response.json()))
Source files for this sample: utils.py, action-rename.py
require_relative 'utils.rb'
require 'faraday'
require 'json'
utils = Utils.new('dc=com/dc=example/ou=People/uid=kvaughan', 'bribery')
options = { ca_file: utils.ca_pem }
jwt = utils.authenticate
query = { '_action': 'rename', '_fields': 'uid' }
hdap = Faraday.new(url: "https://#{utils.host}:#{utils.port}/hdap/", params: query, ssl: options) do |f|
f.headers['Content-Type'] = 'application/json'
f.request :authorization, 'Bearer', jwt
end
body = { "newId" => "dc=com/dc=example/ou=People/uid=sjensen" }
response = hdap.post do |h|
h.path = 'dc=com/dc=example/ou=People/uid=scarter'
h.body = JSON.generate(body)
end
puts "Status code: #{response.status}\nJSON: #{response.body}"
Source files for this sample: utils.rb, action-rename.rb
HDAP Ruby examples require Ruby 3.2 and the faraday
and json
gems.
To remove the existing RDN value, uid=scarter
in this example, use the deleteOldRdn=true
parameter.
An LDAP Relative Distinguished Name (RDN) refers to the part of an entry’s DN that differentiates it
from all other DNs at the same level in the directory tree.
For HDAP, the last path element of the _id
holds the field value DS deletes when deleteOldRdn=true
.
In dc=com/dc=example/ou=People/uid=sjensen
, it’s uid=sjensen
.
In dc=com/dc=example/ou=People
, it’s ou=People
.
When you rename a resource with child resources, DS renames all the child resources, too. For example, if you rename DS directory servers support this operation only for moving resources in the same backend, under the same path. Depending on the number of resources moved, this can be a resource-intensive operation. |