summaryrefslogtreecommitdiffstats
path: root/idp/ldap/slapd.conf
blob: e0e7c0a37ab2600c0c50c39ecbcf6c1558046d2d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
# This is the main slapd configuration file. See slapd.conf(5) for more
# info on the configuration options.

#######################################################################
# Global Directives:

# Features to permit
#allow bind_v2

# Schema and objectClass definitions
include         /etc/ldap/schema/core.schema
include         /etc/ldap/schema/cosine.schema
include         /etc/ldap/schema/nis.schema
include         /etc/ldap/schema/inetorgperson.schema
include         /etc/ldap/schema/cdg59.schema

# Where the pid file is put. The init.d script
# will not stop the server if you change this.
pidfile         /var/run/slapd/slapd.pid

# List of arguments that were passed to the server
argsfile        /var/run/slapd/slapd.args

# Read slapd.conf(5) for possible values
loglevel        0

# Where the dynamically loaded modules are stored
modulepath	/usr/lib/ldap
moduleload	back_bdb

# The maximum number of entries that is returned for a search operation
sizelimit 500

# The tool-threads parameter sets the actual amount of cpu's that is used
# for indexing.
tool-threads 1

#######################################################################
# Specific Backend Directives for bdb:
# Backend specific directives apply to this backend until another
# 'backend' directive occurs
backend		bdb
checkpoint 512 30

#######################################################################
# Specific Backend Directives for 'other':
# Backend specific directives apply to this backend until another
# 'backend' directive occurs
#backend		<other>

#######################################################################
# Specific Directives for database #1, of type bdb:
# Database specific directives apply to this databasse until another
# 'database' directive occurs
database        bdb

# The base of your directory in database #1
suffix          "dc=pratic59,dc=fr"

# rootdn directive for specifying a superuser on the database. This is needed
# for syncrepl.
rootdn          "cn=admin,dc=pratic59,dc=fr"
# this password is 'coin', use slapasswd to generate another
rootpw          {SSHA}8m+x+G7zw4C8hCEa/iYCKcCIB3fNtS6U

# Where the database file are physically stored for database #1
directory       "/var/lib/ldap"

# For the Debian package we use 2MB as default but be sure to update this
# value if you have plenty of RAM
dbconfig set_cachesize 0 2097152 0

# Sven Hartge reported that he had to set this value incredibly high
# to get slapd running at all. See http://bugs.debian.org/303057
# for more information.

# Number of objects that can be locked at the same time.
dbconfig set_lk_max_objects 1500
# Number of locks (both requested and granted)
dbconfig set_lk_max_locks 1500
# Number of lockers
dbconfig set_lk_max_lockers 1500

# Indexing options for database #1
index           objectClass eq

# Save the time that the entry gets modified, for database #1
lastmod         on

# Where to store the replica logs for database #1
# replogfile	/var/lib/ldap/replog

access to dn.regex="(ou=[^,]+,.*)$" filter=(objectClass=cdg59agent) attrs=entry,cdg59lastConnectionTime,cdg59lastConnectionDuration
	by group.expand="cn=admin,$1" write
        by dn.regex="uid=[^,]+,ou=admin,dc=pratic59,dc=fr" write
	by self write
	by * read

# The userPassword by default can be changed
# by the entry owning it if they are authenticated.
# Others should not be able to see it, except the
# admin entry below
# These access lines apply to database #1 only
access to dn.regex="uid=[^,]+,(ou=[^,]+,dc=pratic59,dc=fr)" attrs=userPassword
	by group.expand="cn=admin,$1" write
        by dn.regex="uid=[^,]+,ou=admin,dc=pratic59,dc=fr" write
        by anonymous auth
        by self read
        by * auth

access to attrs=userPassword,shadowLastChange
	by group.expand="cn=admin,$1" write
        by dn.regex="uid=[^,]+,ou=admin,dc=pratic59,dc=fr" write
        by anonymous auth
        by self write
        by * none

# Ensure read access to the base for things like
# supportedSASLMechanisms.  Without this you may
# have problems with SASL not knowing what
# mechanisms are available and the like.
# Note that this is covered by the 'access to *'
# ACL below too but if you change that as people
# are wont to do you'll still need this if you
# want SASL (and possible other things) to work
# happily.
access to dn.base="" by * read

# Allow write access:
#  - collectivity administrators to modify their LDAP branch
#  - pratic administrator to everything
access to dn.regex="ou=([^,]+),dc=pratic59,dc=fr"
	by group.expand="cn=admin,ou=$1,dc=pratic59,dc=fr" write
        by dn.regex="uid=[^,]+,ou=admin,dc=pratic59,dc=fr" write
        by * read

access to dn.regex="ou=([^,]+),dc=pratic59,dc=fr" attrs=entry,children
	by group.expand="cn=admin,ou=$1,dc=pratic59,dc=fr" write
        by dn.regex="uid=[^,]+,ou=admin,dc=pratic59,dc=fr" write
        by * read


# The admin dn has full write access, everyone else
# can read everything.
access to *
        by dn.regex="uid=[^,]+,ou=admin,dc=pratic59,dc=fr" write
        by * read