X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;f=doc%2Fslapd-config.txt;h=23a8a1c839944150e43ad462320204c27826fdd7;hb=b57e8dd08a1e9ae2243179519b2080d571d31f3c;hp=122455d4f29e4cf4a27ba82c6838701dc86ea339;hpb=25dbd296540b9f652ababe6c5fdb0a7cf7b4c197;p=mirror%2Fuserdir-ldap.git diff --git a/doc/slapd-config.txt b/doc/slapd-config.txt index 122455d..23a8a1c 100644 --- a/doc/slapd-config.txt +++ b/doc/slapd-config.txt @@ -1,53 +1,25 @@ Most of the configuration of the ldap server has to do with getting correct access controls to keep the data safe. Here is a sample: -# Turn on automatic last modification time -lastmod on -# Index some things -index uid eq -index keyfingerprint eq -index cn,sn approx,sub,eq +# only allow plain text auth when we do crypto +security simple_bind=128 -# Administrate -#rootdn "uid=admin,ou=users,dc=debian,dc=org" -#rootpw - -# Restrict reading/modification of the password to administration and self -access to attrs=userpassword,sshrsaauthkey - by self write - by dn="uid=admin,ou=users,dc=debian,dc=org" write - by group="uid=admin,ou=users,dc=debian,dc=org" write - by * compare - -access to attrs=emailforward - by dn="uid=admin,ou=users,dc=debian,dc=org" write - by group="uid=admin,ou=users,dc=debian,dc=org" write - by self write - by addr=127.0.0.1 read - by domain=.*\.debian\.org read - by * none -access to attrs=c,l,loginShell,ircNick - by dn="uid=admin,ou=users,dc=debian,dc=org" write - by group="uid=admin,ou=users,dc=debian,dc=org" write - by self write -access to attrs=facsimileTelephoneNumber,telephoneNumber,postalAddress,postalC -ode,loginShell,onvacation,privateSub,latitude,longitude - by dn="uid=admin,ou=users,dc=debian,dc=org" write - by group="uid=admin,ou=users,dc=debian,dc=org" write - by self write - by dn="uid=.*,ou=users,dc=debian,dc=org" read - by * none -access to * - by dn="uid=admin,ou=users,dc=debian,dc=org" write - by group="uid=admin,ou=users,dc=debian,dc=org" write +# and the database definition +include /etc/ldap/userdir-ldap-slapd.conf # Overlays are useful to enforce constraints: moduleload /usr/lib/ldap/unique.so overlay unique -unique_base ou=users,dc=debian,dc=org -unique_attributes uid keyFingerPrint +unique_uri ldap:///ou=users,dc=debian,dc=org?uidNumber,uid,keyFingerPrint?sub +unique_uri ldap:///ou=groups,dc=debian,dc=org?gidNumber,cn?sub + +# Constraints are useful +moduleload /usr/lib/ldap/constraint.so +overlay constraint +constraint_attribute mailContentInspectionAction regex ^([mM][aA][rR][kK][uU][pP]|[bB][lL][aA][cC][kK][hH][oO][lL][eE]|[rR][eE][jJ][eE][cC][tT])$ +constraint_attribute gender regex ^(1|2|9|[mM][aA][lL][eE]|[fF][eE][mM][aA][lL][eE]|[uU][nN][sS][pP][eE][cC][iI][fF][iI][eE][dD])$ # End----------