09.12.2012 Views

SUSE LINUX Documentation - Index of

SUSE LINUX Documentation - Index of

SUSE LINUX Documentation - Index of

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

428 Reference<br />

are appended to this directive. Information can be found in the included OpenLDAP<br />

documentation.<br />

Example 25.3 slapd.conf: pidfile and argsfile<br />

pidfile /var/run/slapd/slapd.pid<br />

argsfile /var/run/slapd/slapd.args<br />

These two files contain the PID (process ID) and some <strong>of</strong> the arguments with which<br />

the slapd process is started. There is no need for modifications here.<br />

Example 25.4 slapd.conf: Access Control<br />

# Sample Access Control<br />

# Allow read access <strong>of</strong> root DSE<br />

# Allow self write access<br />

# Allow authenticated users read access<br />

# Allow anonymous users to authenticate<br />

# access to dn="" by * read<br />

access to * by self write<br />

by users read<br />

by anonymous auth<br />

#<br />

# if no access controls are present, the default is:<br />

# Allow read by all<br />

#<br />

# rootdn can always write!<br />

Example 25.4, “slapd.conf: Access Control” (page 428) is the excerpt from slapd<br />

.conf that regulates the access permissions for the LDAP directory on the server. The<br />

settings made here in the global section <strong>of</strong> slapd.conf are valid as long as no custom<br />

access rules are declared in the database-specific section. These would overwrite the<br />

global declarations. As presented here, all users have read access to the directory, but<br />

only the administrator (rootdn) can write to this directory. Access control regulation<br />

in LDAP is a highly complex process. The following tips can help:<br />

• Every access rule has the following structure:<br />

access to by <br />

• what is a placeholder for the object or attribute to which access is granted. Individual<br />

directory branches can be protected explicitly with separate rules. It is also<br />

possible to process regions <strong>of</strong> the directory tree with one rule by using regular expressions.<br />

slapd evaluates all rules in the order in which they are listed in the<br />

configuration file. More general rules should be listed after more specific ones—the<br />

first rule slapd regards as valid is evaluated and all following entries are ignored.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!