X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;f=userdir-ldap-slapd.conf.in;h=12a50be520d9f76493b91ee36cfc698b87843d05;hb=9868a2b741c1b82156f3d75c8dbc74ed8f5521f1;hp=9d98ebe22c1affd4237cdb09e404b62a24a8a11f;hpb=844e7ba133548669df37de95f593ca7f81c12585;p=mirror%2Fuserdir-ldap.git diff --git a/userdir-ldap-slapd.conf.in b/userdir-ldap-slapd.conf.in index 9d98ebe..12a50be 100644 --- a/userdir-ldap-slapd.conf.in +++ b/userdir-ldap-slapd.conf.in @@ -7,6 +7,17 @@ suffix "@@DN@@" # Where the database file are physically stored directory "/var/lib/ldap" +moduleload accesslog +overlay accesslog +logdb cn=log +logops writes +logold (objectclass=top) +logpurge 90+00:00 1+00:00 + +moduleload constraint +overlay constraint +constraint_attribute keyfingerprint regex ^([0-9A-F]{40})$ + # Indexing options index gecos,cn,sn,uid,ircNick,hostname,emailForward pres,eq,sub,approx index keyfingerprint,homeDirectory,objectClass,loginShell,supplementaryGid pres,eq @@ -18,46 +29,71 @@ sizelimit 10000 # Save the time that the entry gets modified lastmod on + +## +## prefix some rules that only apply to certain clients +## and grant them more privileges +## + # LDAP admins have full access, so has sshdist access to * by group="cn=LDAP Administrator,ou=users,@@DN@@" write by dn="uid=sshdist,ou=users,@@DN@@" write by * break +# allow keyring maint to write to the keyFingerPrint attribute +# (make an exception for adm for security reasons) +access to filter="(!(supplementaryGid=adm))" attrs=keyFingerPrint + by group="cn=Keyring Maintainers,ou=users,@@DN@@" write + by * break + # allow users write access to an explicit subset of their fields -access to attrs=c,l,loginShell,ircNick,labeledURI,icqUIN,jabberJID,onVacation,birthDate,mailDisableMessage,gender,emailforward,mailCallout,mailGreylisting,mailRBL,mailRHSBL,mailWhitelist,mailContentInspectionAction,mailDefaultOptions,facsimileTelephoneNumber,telephoneNumber,postalAddress,postalCode,loginShell,onVacation,privateSub,latitude,longitude,VoIP,userPassword,sudoPassword,bATVToken +access to attrs=c,l,loginShell,ircNick,labeledURI,icqUIN,jabberJID,onVacation,birthDate,mailDisableMessage,gender,emailforward,mailCallout,mailGreylisting,mailRBL,mailRHSBL,mailWhitelist,mailContentInspectionAction,mailDefaultOptions,facsimileTelephoneNumber,telephoneNumber,postalAddress,postalCode,loginShell,onVacation,privateSub,latitude,longitude,VoIP,userPassword,sudoPassword,webPassword,bATVToken by self write by * break -# owner writeable -access to attrs=userPassword,sudoPassword,bATVToken + +## +## All ACLs from here on result in a decision. no fall through to later. +## + +# allow authn/z by anyone +access to attrs=userPassword,sudoPassword,webPassword,bATVToken by * compare +# readable only by self access to attrs=sshrsaauthkey by self read - by * compare + by * none -# debian readable -access to attrs=activity-pgp,activity-from,dnsZoneEntry +# debian.org readable, authenticated user readable +access to attrs=activity-pgp,activity-from,dnsZoneEntry,c,l,loginShell,onVacation,birthDate,mailDisableMessage,gender,emailforward,mailCallout,mailGreylisting,mailRBL,mailRHSBL,mailWhitelist,mailContentInspectionAction,mailDefaultOptions by peername.ip=127.0.0.1 read by domain=alioth.debian.org none by domain.subtree=@@DOMAIN@@ read by dn.regex="uid=.*,ou=users,@@DN@@" read by * none -# owner writeable, debian readable, authenticated user readable -access to attrs=c,l,loginShell,ircNick,labeledURI,icqUIN,jabberJID,onVacation,birthDate,mailDisableMessage,gender,emailforward,mailCallout,mailGreylisting,mailRBL,mailRHSBL,mailWhitelist,mailContentInspectionAction,mailDefaultOptions +# authenticated user readable +access to attrs=facsimileTelephoneNumber,telephoneNumber,postalAddress,postalCode,privateSub,latitude,longitude,VoIP by dn.regex="uid=.*,ou=users,@@DN@@" read - by peername.ip=127.0.0.1 read - by domain=alioth.debian.org none - by domain.subtree=@@DOMAIN@@ read by * none -# owner writeable, authenticated user readable -access to attrs=facsimileTelephoneNumber,telephoneNumber,postalAddress,postalCode,loginShell,onVacation,privateSub,latitude,longitude,VoIP - by dn.regex="uid=.*,ou=users,@@DN@@" read - by * none -# globally readable +# rest is globally readable access to * by * read + + +database hdb +directory "/var/lib/ldap-log" +suffix cn=log +# +sizelimit 10000 + +index reqStart eq +access to * + by group="cn=LDAP Administrator,ou=users,@@DN@@" write + by dn="uid=sshdist,ou=users,@@DN@@" read + by * none +