@ -33,7 +33,7 @@ moduleload constraint
|
||||
overlay constraint
|
||||
constraint_attribute description regex {{ slapd.regex }}
|
||||
restrict=ldap:///ou=hosts,dc=ynerant,dc=fr??one?(objectClass=device)
|
||||
constraint_attribute uid regex ^_
|
||||
constraint_attribute uid regex ^ynerant
|
||||
restrict=ldap:///ou=passwd,dc=ynerant,dc=fr??one?(objectClass=posixAccount)
|
||||
|
||||
moduleload syncprov
|
||||
@ -41,8 +41,8 @@ moduleload syncprov
|
||||
|
||||
# TLS Certificates
|
||||
#TLSCipherSuite HIGH:MEDIUM:-SSLv2:-SSLv3
|
||||
TLSCertificateFile /etc/ldap/ldap.pem
|
||||
TLSCertificateKeyFile /etc/ldap/ldap.key
|
||||
#TLSCertificateFile /etc/ldap/ldap.pem
|
||||
#TLSCertificateKeyFile /etc/ldap/ldap.key
|
||||
|
||||
# The maximum number of entries that is returned for a search operation
|
||||
sizelimit 500
|
||||
@ -162,13 +162,13 @@ overlay syncprov
|
||||
access to attrs=userPassword,shadowLastChange
|
||||
by anonymous auth
|
||||
by self write
|
||||
by set="[cn=nounou,ou=group,dc=ynerant,dc=fr]/memberUid & user/uid" write
|
||||
by set="[cn=admin,ou=group,dc=ynerant,dc=fr]/memberUid & user/uid" write
|
||||
by dn="cn=replicator,dc=ynerant,dc=fr" read
|
||||
by * none
|
||||
|
||||
access to attrs=loginShell,mail,telephoneNumber
|
||||
by self write
|
||||
by set="[cn=nounou,ou=group,dc=ynerant,dc=fr]/memberUid & user/uid" write
|
||||
by set="[cn=admin,ou=group,dc=ynerant,dc=fr]/memberUid & user/uid" write
|
||||
by dn="cn=replicator,dc=ynerant,dc=fr" read
|
||||
by * read
|
||||
|
||||
@ -186,7 +186,7 @@ access to dn.base="" by * read
|
||||
# The admin dn has full write access, everyone else
|
||||
# can read everything.
|
||||
access to *
|
||||
by set="[cn=nounou,ou=group,dc=ynerant,dc=fr]/memberUid & user/uid" write
|
||||
by set="[cn=admin,ou=group,dc=ynerant,dc=fr]/memberUid & user/uid" write
|
||||
by dn="cn=replicator,dc=ynerant,dc=fr" read
|
||||
by * read
|
||||
{% endif %}
|
||||
|
Reference in New Issue
Block a user