Add, Search, Compare or Delete LDAP Server Extension
post
/rest/v1/admin
Add, Search, Compare or Delete LDAP Server Extension
Request
Supported Media Types
- application/json
LDAP Server Extension that needs to be created
Root Schema : LDAP Server Extension POSTRequest
Type:
Show Source
object
-
assertion:
string
Assertion string for the LDAP compare operation. Note: To be used only while performing LDAP compare operation using POST, i.e., if the msgType is urn:ietf:params:rest:schemas:oracle:oud:1.0:CompareRequest.
-
attributes:
object LDAP Server Extension Properties
-
base:
string
Search Base DN to be used for the LDAP search operation. Note: To be used only while performing LDAP search operation using POST, i.e., if the msgType is urn:ietf:params:rest:schemas:oracle:oud:1.0:SearchRequest. It is also mandatory for such operation
-
controls:
array controls
LDAP controls to be sent to server for the LDAP operation.
-
dn:
string
LDAP DN of the entry to be created or deleted or compared. Note: To be used only while performing LDAP add, delete or compare operations, i.e, if the msgType is urn:ietf:params:rest:schemas:oracle:oud:1.0:AddRequest, urn:ietf:params:rest:schemas:oracle:oud:1.0:DeleteRequest or urn:ietf:params:rest:schemas:oracle:oud:1.0:CompareRequest.It is mandatory for such operations.
-
filter:
string
Search filter for the LDAP search operation. Should follow LDAP search filter syntax. Note: To be used only while performing LDAP search operation using POST request, i.e., if the msgType is urn:ietf:params:rest:schemas:oracle:oud:1.0:SearchRequest.
-
msgType(required):
string
Allowed Values:
[ "urn:ietf:params:rest:schemas:oracle:oud:1.0:AddRequest", "urn:ietf:params:rest:schemas:oracle:oud:1.0:SearchRequest", "urn:ietf:params:rest:schemas:oracle:oud:1.0:DeleteRequest", "urn:ietf:params:rest:schemas:oracle:oud:1.0:CompareRequest" ]
The REST message type -
requiredAttributes:
array requiredAttributes
List of attributes to be fetched for the entry. Note: To be used only while performing LDAP search operation using POST, i.e., if the msgType is urn:ietf:params:rest:schemas:oracle:oud:1.0:SearchRequest.
-
scope:
string
Allowed Values:
[ "base", "sub", "one" ]
Scope for the LDAP search operation. Note: To be used only while performing LDAP search operation using POST, i.e., if the msgType is urn:ietf:params:rest:schemas:oracle:oud:1.0:SearchRequest.
Nested Schema : LDAP Server Extension Properties
Type:
Show Source
object
-
cn:
string
CN (common name) of the entry
-
ds-cfg-directory-type:
string
Default Value:
oud
Allowed Values:[ "ad", "odsee", "oid", "oud" ]
Directory types used in ldap extension. -
ds-cfg-enabled(required):
boolean
Indicates whether the Extension is enabled.
-
ds-cfg-java-class(required):
string
Default Value:
com.sun.dps.server.workflowelement.proxyldap.LDAPServerExtension
Specifies the fully-qualified name of the Java class that provides the LDAP Server Extension implementation. -
ds-cfg-monitoring-check-interval:
integer(int32)
Default Value:
30000
Proactive monitoring check interval. -
ds-cfg-monitoring-connect-timeout:
integer(int32)
Default Value:
5000
Maximum time the proactive monitoring attempts to connect to the remote server before the connections fails. 0 means unlimited. -
ds-cfg-monitoring-inactivity-timeout:
integer(int32)
Default Value:
120000
Time after which a connection is checked to avoid connection closure by the remote server. The value of this parameter must be superior to monitoring-check-interval. -
ds-cfg-monitoring-ping-timeout:
integer(int32)
Default Value:
5000
Maximum time the proactive monitoring attempts to ping the remote server. -
ds-cfg-monitoring-statistics-interval:
integer(int32)
Default Value:
30000
Proactive statistics collection interval. -
ds-cfg-pool-increment:
integer(int32)
Default Value:
5
Increment by which the size of a connection pool is increased or decreased. If remote-ldap-server-ssl-policy is set to 'user', two pools are created and the incremental change of size of each pool is set to pool-increment. -
ds-cfg-pool-initial-size:
integer(int32)
Default Value:
10
Initial size of a connection pool: this is the initial number of connections to be created when a pool is initialized. This is also the minimum size of a pool. If remote-ldap-server-ssl-policy is set to 'user', two pools are created and the initial size of each pool is set to pool-initial-size. -
ds-cfg-pool-max-size:
integer(int32)
Default Value:
1000
Maximum size of a connection pool: this is the maximum number of connections a pool can allocate. If remote-ldap-server-ssl-policy is set to 'user', two pools are created and the maximum size of each pool is set to pool-max-size. -
ds-cfg-pool-max-write:
integer(int32)
Default Value:
0
Maximum number of write connections a connection pool can allocate at the same time. -
ds-cfg-pool-release-connection-interval:
integer(int32)
Default Value:
300000
Time after which the connection pool size can be reduced if enough connections are not used: if pool-increment connections or more are not used during pool-release-connection-interval, then these connections are removed from the pool. -
ds-cfg-pool-use-max-write:
boolean
Default Value:
false
Indicates if the parameter pool-max-write is used. -
ds-cfg-proxied-auth-use-v1:
boolean
Default Value:
false
If true, proxy authorization control V1 is used, otherwise V2 is used. -
ds-cfg-remote-ldap-server-address(required):
string
Specifies the hostname or IP address of the remote LDAP server.
-
ds-cfg-remote-ldap-server-connect-timeout:
integer(int32)
Default Value:
10000
Maximum time the proactive monitoring attempts to connect to the remote server before the connection fails. 0 means unlimited. -
ds-cfg-remote-ldap-server-port(required):
integer(int32)
Default Value:
389
Specifies the non-secured port to connect to the LDAP server. -
ds-cfg-remote-ldap-server-psearch-read-timeout:
integer(int32)
Default Value:
25
Maximum time the LDAP Server Extension waits for a response from the remote server for psearch before the connection fails. -
ds-cfg-remote-ldap-server-read-only:
boolean
Default Value:
false
Indicates if the remote server is read-only. If set to true, all write operations are rejected by this LDAP Server Extension. -
ds-cfg-remote-ldap-server-read-timeout:
integer(int32)
Default Value:
10000
Maximum time the LDAP Server Extension waits for a response from the remote server before the connection fails. 0 means unlimited. -
ds-cfg-remote-ldap-server-ssl-policy(required):
string
Default Value:
never
Allowed Values:[ "always", "never", "user" ]
Specifies the security policy to apply to the LDAP server. -
ds-cfg-remote-ldap-server-ssl-port(required):
integer(int32)
Default Value:
636
Specifies the secured port to connect to the LDAP server. -
ds-cfg-saturation-precision:
integer(int32)
Default Value:
5
The precision specifies the minimum value for the saturation index change to be taken into account. -
ds-cfg-ssl-cipher-suite:
array ds-cfg-ssl-cipher-suite
Specifies the names of the cipher suites that are that are used for secure connection to the LDAP server.
-
ds-cfg-ssl-client-alias:
string
Specifies the alias to use for the client private key.
-
ds-cfg-ssl-key-manager-provider:
string
Specifies key manager provider to use for the LDAP Server Extension. This key manager provider is not mandatory and may be used if the remote server is configured for client authentication.
-
ds-cfg-ssl-protocol:
array ds-cfg-ssl-protocol
Specifies the names of the SSL/TLS protocols that are used for secure connection to the LDAP server.
-
ds-cfg-ssl-trust-all:
boolean
Default Value:
false
Specifies to trust all remote servers. -
ds-cfg-ssl-trust-manager-provider:
string
Specifies trust manager provider to use for the LDAP Server Extension. This trust manager provider is mandatory unless the parameter ssl-trust-all is set to true.
-
objectclass(required):
array objectclass
Objectclass(es) which this entry belongs to.
Nested Schema : controls
Type:
array
LDAP controls to be sent to server for the LDAP operation.
Show Source
Nested Schema : requiredAttributes
Type:
array
List of attributes to be fetched for the entry. Note: To be used only while performing LDAP search operation using POST, i.e., if the msgType is urn:ietf:params:rest:schemas:oracle:oud:1.0:SearchRequest.
Show Source
Nested Schema : ds-cfg-ssl-cipher-suite
Type:
array
Specifies the names of the cipher suites that are that are used for secure connection to the LDAP server.
Show Source
Nested Schema : ds-cfg-ssl-protocol
Type:
array
Specifies the names of the SSL/TLS protocols that are used for secure connection to the LDAP server.
Show Source
Response
Supported Media Types
- application/json
200 Response
OK
Root Schema : LDAP Server Extension SuccessResponse
Type:
Show Source
object
-
compareResult:
boolean
Indicates the result of LDAP compare operation.
-
msgType(required):
string
Allowed Values:
[ "urn:ietf:params:rest:schemas:oracle:oud:1.0:SearchResponse", "urn:ietf:params:rest:schemas:oracle:oud:1.0:DeleteResponse", "urn:ietf:params:rest:schemas:oracle:oud:1.0:CompareResponse" ]
The REST message type -
searchResultEntries(required):
array searchResultEntries
Number of search result entries returned after the LDAP operation.
-
totalResults(required):
integer(int32)
Specifies the number of entries created, and returned.
Nested Schema : searchResultEntries
Type:
array
Number of search result entries returned after the LDAP operation.
Show Source
Nested Schema : LDAP Server Extension SearchResultEntry
Type:
Show Source
object
-
attributes(required):
object LDAP Server Extension Properties
-
dn(required):
string
LDAP DN of the entry to be created
Nested Schema : LDAP Server Extension Properties
Type:
Show Source
object
-
cn:
string
CN (common name) of the entry
-
ds-cfg-directory-type:
string
Default Value:
oud
Allowed Values:[ "ad", "odsee", "oid", "oud" ]
Directory types used in ldap extension. -
ds-cfg-enabled(required):
boolean
Indicates whether the Extension is enabled.
-
ds-cfg-java-class(required):
string
Default Value:
com.sun.dps.server.workflowelement.proxyldap.LDAPServerExtension
Specifies the fully-qualified name of the Java class that provides the LDAP Server Extension implementation. -
ds-cfg-monitoring-check-interval:
integer(int32)
Default Value:
30000
Proactive monitoring check interval. -
ds-cfg-monitoring-connect-timeout:
integer(int32)
Default Value:
5000
Maximum time the proactive monitoring attempts to connect to the remote server before the connections fails. 0 means unlimited. -
ds-cfg-monitoring-inactivity-timeout:
integer(int32)
Default Value:
120000
Time after which a connection is checked to avoid connection closure by the remote server. The value of this parameter must be superior to monitoring-check-interval. -
ds-cfg-monitoring-ping-timeout:
integer(int32)
Default Value:
5000
Maximum time the proactive monitoring attempts to ping the remote server. -
ds-cfg-monitoring-statistics-interval:
integer(int32)
Default Value:
30000
Proactive statistics collection interval. -
ds-cfg-pool-increment:
integer(int32)
Default Value:
5
Increment by which the size of a connection pool is increased or decreased. If remote-ldap-server-ssl-policy is set to 'user', two pools are created and the incremental change of size of each pool is set to pool-increment. -
ds-cfg-pool-initial-size:
integer(int32)
Default Value:
10
Initial size of a connection pool: this is the initial number of connections to be created when a pool is initialized. This is also the minimum size of a pool. If remote-ldap-server-ssl-policy is set to 'user', two pools are created and the initial size of each pool is set to pool-initial-size. -
ds-cfg-pool-max-size:
integer(int32)
Default Value:
1000
Maximum size of a connection pool: this is the maximum number of connections a pool can allocate. If remote-ldap-server-ssl-policy is set to 'user', two pools are created and the maximum size of each pool is set to pool-max-size. -
ds-cfg-pool-max-write:
integer(int32)
Default Value:
0
Maximum number of write connections a connection pool can allocate at the same time. -
ds-cfg-pool-release-connection-interval:
integer(int32)
Default Value:
300000
Time after which the connection pool size can be reduced if enough connections are not used: if pool-increment connections or more are not used during pool-release-connection-interval, then these connections are removed from the pool. -
ds-cfg-pool-use-max-write:
boolean
Default Value:
false
Indicates if the parameter pool-max-write is used. -
ds-cfg-proxied-auth-use-v1:
boolean
Default Value:
false
If true, proxy authorization control V1 is used, otherwise V2 is used. -
ds-cfg-remote-ldap-server-address(required):
string
Specifies the hostname or IP address of the remote LDAP server.
-
ds-cfg-remote-ldap-server-connect-timeout:
integer(int32)
Default Value:
10000
Maximum time the proactive monitoring attempts to connect to the remote server before the connection fails. 0 means unlimited. -
ds-cfg-remote-ldap-server-port(required):
integer(int32)
Default Value:
389
Specifies the non-secured port to connect to the LDAP server. -
ds-cfg-remote-ldap-server-psearch-read-timeout:
integer(int32)
Default Value:
25
Maximum time the LDAP Server Extension waits for a response from the remote server for psearch before the connection fails. -
ds-cfg-remote-ldap-server-read-only:
boolean
Default Value:
false
Indicates if the remote server is read-only. If set to true, all write operations are rejected by this LDAP Server Extension. -
ds-cfg-remote-ldap-server-read-timeout:
integer(int32)
Default Value:
10000
Maximum time the LDAP Server Extension waits for a response from the remote server before the connection fails. 0 means unlimited. -
ds-cfg-remote-ldap-server-ssl-policy(required):
string
Default Value:
never
Allowed Values:[ "always", "never", "user" ]
Specifies the security policy to apply to the LDAP server. -
ds-cfg-remote-ldap-server-ssl-port(required):
integer(int32)
Default Value:
636
Specifies the secured port to connect to the LDAP server. -
ds-cfg-saturation-precision:
integer(int32)
Default Value:
5
The precision specifies the minimum value for the saturation index change to be taken into account. -
ds-cfg-ssl-cipher-suite:
array ds-cfg-ssl-cipher-suite
Specifies the names of the cipher suites that are that are used for secure connection to the LDAP server.
-
ds-cfg-ssl-client-alias:
string
Specifies the alias to use for the client private key.
-
ds-cfg-ssl-key-manager-provider:
string
Specifies key manager provider to use for the LDAP Server Extension. This key manager provider is not mandatory and may be used if the remote server is configured for client authentication.
-
ds-cfg-ssl-protocol:
array ds-cfg-ssl-protocol
Specifies the names of the SSL/TLS protocols that are used for secure connection to the LDAP server.
-
ds-cfg-ssl-trust-all:
boolean
Default Value:
false
Specifies to trust all remote servers. -
ds-cfg-ssl-trust-manager-provider:
string
Specifies trust manager provider to use for the LDAP Server Extension. This trust manager provider is mandatory unless the parameter ssl-trust-all is set to true.
-
objectclass(required):
array objectclass
Objectclass(es) which this entry belongs to.
Nested Schema : ds-cfg-ssl-cipher-suite
Type:
array
Specifies the names of the cipher suites that are that are used for secure connection to the LDAP server.
Show Source
Nested Schema : ds-cfg-ssl-protocol
Type:
array
Specifies the names of the SSL/TLS protocols that are used for secure connection to the LDAP server.
Show Source
201 Response
Created
Root Schema : LDAP Server Extension ADDResponse
Type:
Show Source
object
-
msgType(required):
string
Default Value:
urn:ietf:params:rest:schemas:oracle:oud:1.0:AddResponse
The REST message type -
searchResultEntries(required):
array searchResultEntries
-
totalResults(required):
integer(int32)
Specifies the number of entries created, and returned.
Nested Schema : LDAP Server Extension SearchResultEntry
Type:
Show Source
object
-
attributes(required):
object LDAP Server Extension Properties
-
dn(required):
string
LDAP DN of the entry to be created
Nested Schema : LDAP Server Extension Properties
Type:
Show Source
object
-
cn:
string
CN (common name) of the entry
-
ds-cfg-directory-type:
string
Default Value:
oud
Allowed Values:[ "ad", "odsee", "oid", "oud" ]
Directory types used in ldap extension. -
ds-cfg-enabled(required):
boolean
Indicates whether the Extension is enabled.
-
ds-cfg-java-class(required):
string
Default Value:
com.sun.dps.server.workflowelement.proxyldap.LDAPServerExtension
Specifies the fully-qualified name of the Java class that provides the LDAP Server Extension implementation. -
ds-cfg-monitoring-check-interval:
integer(int32)
Default Value:
30000
Proactive monitoring check interval. -
ds-cfg-monitoring-connect-timeout:
integer(int32)
Default Value:
5000
Maximum time the proactive monitoring attempts to connect to the remote server before the connections fails. 0 means unlimited. -
ds-cfg-monitoring-inactivity-timeout:
integer(int32)
Default Value:
120000
Time after which a connection is checked to avoid connection closure by the remote server. The value of this parameter must be superior to monitoring-check-interval. -
ds-cfg-monitoring-ping-timeout:
integer(int32)
Default Value:
5000
Maximum time the proactive monitoring attempts to ping the remote server. -
ds-cfg-monitoring-statistics-interval:
integer(int32)
Default Value:
30000
Proactive statistics collection interval. -
ds-cfg-pool-increment:
integer(int32)
Default Value:
5
Increment by which the size of a connection pool is increased or decreased. If remote-ldap-server-ssl-policy is set to 'user', two pools are created and the incremental change of size of each pool is set to pool-increment. -
ds-cfg-pool-initial-size:
integer(int32)
Default Value:
10
Initial size of a connection pool: this is the initial number of connections to be created when a pool is initialized. This is also the minimum size of a pool. If remote-ldap-server-ssl-policy is set to 'user', two pools are created and the initial size of each pool is set to pool-initial-size. -
ds-cfg-pool-max-size:
integer(int32)
Default Value:
1000
Maximum size of a connection pool: this is the maximum number of connections a pool can allocate. If remote-ldap-server-ssl-policy is set to 'user', two pools are created and the maximum size of each pool is set to pool-max-size. -
ds-cfg-pool-max-write:
integer(int32)
Default Value:
0
Maximum number of write connections a connection pool can allocate at the same time. -
ds-cfg-pool-release-connection-interval:
integer(int32)
Default Value:
300000
Time after which the connection pool size can be reduced if enough connections are not used: if pool-increment connections or more are not used during pool-release-connection-interval, then these connections are removed from the pool. -
ds-cfg-pool-use-max-write:
boolean
Default Value:
false
Indicates if the parameter pool-max-write is used. -
ds-cfg-proxied-auth-use-v1:
boolean
Default Value:
false
If true, proxy authorization control V1 is used, otherwise V2 is used. -
ds-cfg-remote-ldap-server-address(required):
string
Specifies the hostname or IP address of the remote LDAP server.
-
ds-cfg-remote-ldap-server-connect-timeout:
integer(int32)
Default Value:
10000
Maximum time the proactive monitoring attempts to connect to the remote server before the connection fails. 0 means unlimited. -
ds-cfg-remote-ldap-server-port(required):
integer(int32)
Default Value:
389
Specifies the non-secured port to connect to the LDAP server. -
ds-cfg-remote-ldap-server-psearch-read-timeout:
integer(int32)
Default Value:
25
Maximum time the LDAP Server Extension waits for a response from the remote server for psearch before the connection fails. -
ds-cfg-remote-ldap-server-read-only:
boolean
Default Value:
false
Indicates if the remote server is read-only. If set to true, all write operations are rejected by this LDAP Server Extension. -
ds-cfg-remote-ldap-server-read-timeout:
integer(int32)
Default Value:
10000
Maximum time the LDAP Server Extension waits for a response from the remote server before the connection fails. 0 means unlimited. -
ds-cfg-remote-ldap-server-ssl-policy(required):
string
Default Value:
never
Allowed Values:[ "always", "never", "user" ]
Specifies the security policy to apply to the LDAP server. -
ds-cfg-remote-ldap-server-ssl-port(required):
integer(int32)
Default Value:
636
Specifies the secured port to connect to the LDAP server. -
ds-cfg-saturation-precision:
integer(int32)
Default Value:
5
The precision specifies the minimum value for the saturation index change to be taken into account. -
ds-cfg-ssl-cipher-suite:
array ds-cfg-ssl-cipher-suite
Specifies the names of the cipher suites that are that are used for secure connection to the LDAP server.
-
ds-cfg-ssl-client-alias:
string
Specifies the alias to use for the client private key.
-
ds-cfg-ssl-key-manager-provider:
string
Specifies key manager provider to use for the LDAP Server Extension. This key manager provider is not mandatory and may be used if the remote server is configured for client authentication.
-
ds-cfg-ssl-protocol:
array ds-cfg-ssl-protocol
Specifies the names of the SSL/TLS protocols that are used for secure connection to the LDAP server.
-
ds-cfg-ssl-trust-all:
boolean
Default Value:
false
Specifies to trust all remote servers. -
ds-cfg-ssl-trust-manager-provider:
string
Specifies trust manager provider to use for the LDAP Server Extension. This trust manager provider is mandatory unless the parameter ssl-trust-all is set to true.
-
objectclass(required):
array objectclass
Objectclass(es) which this entry belongs to.
Nested Schema : ds-cfg-ssl-cipher-suite
Type:
array
Specifies the names of the cipher suites that are that are used for secure connection to the LDAP server.
Show Source
Nested Schema : ds-cfg-ssl-protocol
Type:
array
Specifies the names of the SSL/TLS protocols that are used for secure connection to the LDAP server.
Show Source
204 Response
No content
406 Response
Not Acceptable
Root Schema : ErrorResponse
Type:
Show Source
object
-
ldapErrorCode:
integer(int32)
Specifies the LDAP error code returned for the operation.
-
message(required):
string
Error message returned returned for the operation.
-
msgType(required):
string
Default Value:
urn:ietf:params:rest:schemas:oracle:oud:1.0:ErrorResponse
The REST message type