Welcome to Linux Knowledge Base and Tutorial
"The place where you learn linux"
Apress - Books for Professionals by Professionals

 Create an AccountHome | Submit News | Your Account  

Tutorial Menu
Linux Tutorial Home
Table of Contents

· Introduction to Operating Systems
· Linux Basics
· Working with the System
· Shells and Utilities
· Editing Files
· Basic Administration
· The Operating System
· The X Windowing System
· The Computer Itself
· Networking
· System Monitoring
· Solving Problems
· Security
· Installing and Upgrading
· Linux and Windows

Man Pages
Linux Topics
Test Your Knowledge

Site Menu
Site Map
Copyright Info
Terms of Use
Privacy Info
Masthead / Impressum
Your Account

Private Messages

News Archive
Submit News
User Articles
Web Links


The Web

Who's Online
There are currently, 60 guest(s) and 0 member(s) that are online.

You are an Anonymous user. You can register for free by clicking here




       ldapmodrdn [-r] [-n] [-v] [-k] [-K] [-c] [-M[M]] [-d debu­
       glevel]  [-D binddn]  [-W]   [-w passwd]   [-y passwdfile]
       [-H ldapuri]    [-h ldaphost]    [-p ldapport]    [-P 2|3]
       [-O security-properties] [-I] [-Q] [-U authcid] [-R realm]
       [-x] [-X authzid] [-Y mech] [-Z[Z]] [-f file] [dn rdn]


       ldapmodrdn   is   a   shell-accessible  interface  to  the
       ldap_modrdn2(3) library call.

       ldapmodrdn opens a connection to an  LDAP  server,  binds,
       and modifies the RDN of entries.  The entry information is
       read from standard input, from file through the use of the
       -f option, or from the command-line pair dn and rdn.


       -r     Remove  old  RDN values from the entry.  Default is
              to keep old values.

       -n     Show what would be done, but don't actually  change
              entries.   Useful for debugging in conjunction with

       -v     Use verbose mode, with many diagnostics written  to
              standard output.

       -k     Use  Kerberos  IV  authentication instead of simple
              authentication.  It is  assumed  that  you  already
              have  a  valid  ticket granting ticket.  ldapmodrdn
              must be compiled with  Kerberos  support  for  this
              option to have effect.

       -K     Same as -k, but only does step 1 of the Kerberos IV
              bind.  This is useful when connecting  to  a  slapd
              and  there  is no x500dsa.hostname principal regis­
              tered with your Kerberos Domain Controller(s).

       -c     Continuous operation mode.  Errors  are   reported,
              but ldapmodify will  continue  with  modifications.
              The default is to exit after reporting an error.

       -M[M]  Enable manage DSA IT control.   -MM  makes  control

       -d debuglevel
              Set  the LDAP debugging level to debuglevel.  ldap­
              modrdn must be compiled with LDAP_DEBUG defined for
              this option to have any effect.

       -f file
              Read  the  entry modification information from file

       -y passwdfile
              Use complete contents of passwdfile as the password
              for simple authentication.

       -H ldapuri
              Specify URI(s) referring to the ldap server(s).

       -h ldaphost
              Specify an alternate host on which the ldap  server
              is running.  Deprecated in favor of -H.

       -p ldapport
              Specify an alternate TCP port where the ldap server
              is listening.  Deprecated in favor of -H.

       -P 2|3 Specify the LDAP protocol version to use.

       -O security-properties
              Specify SASL security properties.

       -I     Enable  SASL  Interactive  mode.   Always   prompt.
              Default is to prompt only as needed.

       -Q     Enable SASL Quiet mode.  Never prompt.

       -U authcid
              Specify  the  authentication  ID for SASL bind. The
              form of the ID depends on the actual SASL mechanism

       -R realm
              Specify  the  realm  of  authentication ID for SASL
              bind. The form of the realm depends on  the  actual
              SASL mechanism used.

       -X authzid
              Specify  the  proxy authorization ID for SASL bind.
              authzid must  be  one  of  the  following  formats:
              dn:<distinguished name> or u:<username>

       -Y mech
              Specify the SASL mechanism to be used for authenti­
              cation. If it's not  specified,  the  program  will
              choose the best mechanism the server knows.

       -Z[Z]  Issue  StartTLS (Transport Layer Security) extended
              operation. If you use -ZZ, the command will require
              the operation to be successful.



           cn=Modify Me,dc=example,dc=com
           cn=The New Me

       the command:

           ldapmodify -r -f /tmp/entrymods

       will change the RDN of the "Modify Me" entry from  "Modify
       Me"  to  "The  New Me" and the old cn, "Modify Me" will be


       Exit status is 0 if no errors occur.  Errors result  in  a
       non-zero  exit status and a diagnostic message being writ­
       ten to standard error.


       ldapadd(1), ldapdelete(1),  ldapmodify(1),  ldapsearch(1),
       ldap.conf(5), ldap(3), ldap_modrdn2(3)


       The OpenLDAP Project <http://www.openldap.org/>


       OpenLDAP  is developed and maintained by The OpenLDAP Pro­
       ject (http://www.openldap.org/).  OpenLDAP is derived from
       University of Michigan LDAP 3.3 Release.

OpenLDAP 2.1.22             06-26-2003              LDAPMODRDN(1)



Security Code
Security Code
Type Security Code

Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Help if you can!

Amazon Wish List

Did You Know?
You can choose larger fonts by selecting a different themes.


Tell a Friend About Us

Bookmark and Share

Web site powered by PHP-Nuke

Is this information useful? At the very least you can help by spreading the word to your favorite newsgroups, mailing lists and forums.
All logos and trademarks in this site are property of their respective owner. The comments are property of their posters. Articles are the property of their respective owners. Unless otherwise stated in the body of the article, article content (C) 1994-2013 by James Mohr. All rights reserved. The stylized page/paper, as well as the terms "The Linux Tutorial", "The Linux Server Tutorial", "The Linux Knowledge Base and Tutorial" and "The place where you learn Linux" are service marks of James Mohr. All rights reserved.
The Linux Knowledge Base and Tutorial may contain links to sites on the Internet, which are owned and operated by third parties. The Linux Tutorial is not responsible for the content of any such third-party site. By viewing/utilizing this web site, you have agreed to our disclaimer, terms of use and privacy policy. Use of automated download software ("harvesters") such as wget, httrack, etc. causes the site to quickly exceed its bandwidth limitation and are therefore expressly prohibited. For more details on this, take a look here

PHP-Nuke Copyright © 2004 by Francisco Burzi. This is free software, and you may redistribute it under the GPL. PHP-Nuke comes with absolutely no warranty, for details, see the license.
Page Generation: 0.13 Seconds