Internet Express for Tru64 UNIX Version 6.8 Administration Guide (14233)

4.4.4 Deleting a User Entry..............................................................................................................86
4.4.5 Retrieving a User Entry...........................................................................................................86
4.4.6 Synchronizing with a Password File.......................................................................................87
4.4.7 Adding a Group Entry............................................................................................................87
4.4.8 Maintaining Group Membership............................................................................................88
4.4.9 Deleting a Group Entry...........................................................................................................88
4.4.10 Retrieving a Group Entry......................................................................................................88
4.4.11 Setting a User's Password in the LDAP Directory Server.....................................................89
4.4.12 Starting the ldapcd Daemon..................................................................................................89
4.4.13 Stopping the ldapcd Daemon................................................................................................89
4.5 Maintaining the LDAP Directory Server Using LDAP Commands...............................................90
4.5.1 Adding Entries to an LDAP Database....................................................................................90
4.5.2 Modifying Entries in an LDAP Database................................................................................90
4.6 Overview of the LDAP Client.........................................................................................................91
4.6.1 Actions Performed by the LDAP Client..................................................................................91
4.6.2 Authentication Actions Performed.........................................................................................91
4.6.3 Files Modified by theLDAP Module for System Authentication...........................................91
4.6.4 Files Not Modified by the LDAP Module for System Authentication...................................91
4.6.5 Other Important Files..............................................................................................................91
4.6.5.1 /etc/ldapusers.deny.........................................................................................................91
4.6.5.2 /etc/ldapusers.allow........................................................................................................91
4.6.6 Behavior of the the ldapdc Daemon........................................................................................92
4.6.7 Debugging ldapdc...................................................................................................................92
4.6.8 Operation of login/su..............................................................................................................92
5 Mail Delivery Administration......................................................................................93
5.1 Sendmail Server Administration.....................................................................................................93
5.1.1 Configuring the System as a Standalone Mail System............................................................94
5.1.2 Configuring the System as a Mail Client................................................................................94
5.1.3 Configuring the System as a Mail Server................................................................................94
5.1.3.1 Creating and Deleting Host Aliases for a Mail Server....................................................95
5.1.4 Changing the Sendmail Server Configuration........................................................................96
5.1.4.1 Configuring Mail Protocols.............................................................................................97
5.1.4.1.1 Creating and Deleting Pseudo Domain Aliases......................................................97
5.1.4.1.2 Configuring the MTS Protocol................................................................................98
5.1.4.1.3 Configuring the DECnet Phase IV Protocol............................................................98
5.1.4.1.4 Configuring the DECnet/OSI Protocol....................................................................99
5.1.4.1.5 Configuring the UUCP Protocol...........................................................................100
5.1.4.1.6 Configuring the X.25 Protocol...............................................................................100
5.1.4.2 Configuring Masquerading...........................................................................................101
5.1.4.2.1 Accessing the Configure Masquerading Form.....................................................101
5.1.4.2.2 Users Automatically Excluded from Masquerading............................................102
5.1.4.2.3 Configuring Your System for Masquerading........................................................102
5.1.4.3 Configuring Virtual Domains.......................................................................................104
5.1.4.4 Enabling Procmail as a Local Mailer.............................................................................105
5.1.4.5 Enabling Anti-Virus......................................................................................................106
5.1.4.6 Configuring Anti-Spam.................................................................................................106
5.1.4.6.1 Configuring Relaying............................................................................................106
5.1.4.6.2 Configuring the Access Database..........................................................................107
5.1.4.6.3 Configuring Checking on Sender's Information...................................................110
5.1.4.7 Configuring LDAP........................................................................................................110
5.1.4.8 Configuring Mail Filters (MILTER)...............................................................................111
5.1.4.8.1 Adding a Mail Filter..............................................................................................112
5.1.4.8.2 Modifying a Mail Filter.........................................................................................112
Table of Contents 5