Optional products
This section describes the products that might need to be installed and configured depending on how you want to set up your LDAP server.
If you plan to use: | You must: | See: |
---|---|---|
TDBM or GDBM backend (based on Db2®) | Install the Db2 product
and set up CLI and ODBC. Note that if your LDAP server is used only for accessing RACF® information, it is not necessary to install Db2 or set up a Db2 database. See Setting up for SDBM for information about configuring the LDAP Server for accessing RACF information. |
Installing and setting up Db2 for TDBM and GDBM (Db2-based) |
SDBM backend (based on RACF) | Install RACF. | Installing RACF for SDBM and native authentication |
LDBM, CDBM, or GDBM backend (based on z/OS® UNIX System Services file system) | Ensure that a z/OS UNIX System Services file system exists and has enough space to store the LDBM, CDBM, or GDBM (file based) backend and that it can be written to by the LDAP server. | Installing a z/OS UNIX System Services file system for LDBM, GDBM (file-based), and CDBM backends |
Protect access to your LDAP server with Secure Sockets Layer (SSL) security or Transport Layer Security (TLS) | Install z/OS Cryptographic Services System SSL. | Installing System SSL |
Encryption setup | Install ICSF (optional). | Installing ICSF for encryption, hashing, or SSL/TLS |
Kerberos authentication | Install Kerberos. | Installing Kerberos |
Native authentication | Install a security server. | Installing RACF for SDBM and native authentication |
Remote crypto plug-in | Install ICSF. | Remote crypto plug-in |
ICTX plug-in | Install RACF. | ICTX plug-in |