[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
[no subject]
Can anyone help me here, I've been working on this three days? I hate to pull
over and ask for directions.
I am trying to get OpenLDAP on Red Hat Linux 7.2 to work with Netscape roaming.
It seems that my ACL for allowing write access to the Netscape profile is
never chosen.
Here are my configs and debug output. Does the capitalized dn from the LDAP
server cause the regex match to fail?
Thanks,
Ben Baez
slapd.conf
#
loglevel 128
include /etc/openldap/schema/core.schema
include /etc/openldap/schema/cosine.schema
include /etc/openldap/schema/inetorgperson.schema
include /etc/openldap/schema/nis.schema
include /etc/openldap/schema/redhat/rfc822-MailMember.schema
include /etc/openldap/schema/redhat/autofs.schema
include /etc/openldap/schema/redhat/kerberosobject.schema
include /etc/openldap/schema/mull.schema
# Define global ACLs to disable default read access.
# Do not enable referrals until AFTER you have a working directory
# service AND an understanding of referrals.
#referral ldap://root.openldap.org
#pidfile /var/run/slapd.pid
#argsfile /var/run/slapd.args
# Create a replication log in /var/lib/ldap for use by slurpd.
#replogfile /var/lib/ldap/master-slapd.replog
# Load dynamic backend modules:
# modulepath /usr/sbin/openldap
# moduleload back_ldap.la
# moduleload back_ldbm.la
# moduleload back_passwd.la
# moduleload back_shell.la
# The next two lines allow use of TLS for connections using a dummy test
# certificate, but you should generate a proper certificate by changing to
# /usr/share/ssl/certs, running "make slapd.pem", and fixing permissions on
# slapd.pem so that the ldap user or group can read it.
#TLSCertificateFile /usr/share/ssl/certs/slapd.pem
#TLSCertificateKeyFile /usr/share/ssl/certs/slapd.pem
#######################################################################
# ldbm database definitions
#######################################################################
database ldbm
suffix "dc=cdx,dc=org"
#suffix "o=My Organization Name, c=US"
rootdn "cn=Manager,dc=cdx,dc=org"
#rootdn "cn=Manager, o=My Organization Name, c=US"
# Cleartext passwords, especially for the rootdn, should
# be avoided. See slappasswd(8) and slapd.conf(5) for details.
# Use of strong authentication encouraged.
rootpw secret
# rootpw {SSHA}ESC0nZlkkSVlEpCPaq/m94ogDEcQSIpY
# rootpw {crypt}ijFYNcSNctBYg
# The database directory MUST exist prior to running slapd AND
# should only be accessable by the slapd/tools. Mode 700 recommended.
directory /var/lib/ldap/cdx
lastmod on # Sets modification field
# Indices to maintain
index objectClass,uid,uidNumber,gidNumber,memberUid eq
index cn,mail,surname,givenname eq,subinitial
# Replicas to which we should propagate changes
#replica ldap-1.example.com:389 tls=yes
# bindmethod=sasl saslmech=GSSAPI
# authcId=host/ldap-master.example.com@EXAMPLE.COM
# SASL
#sasl-host usoakldap01.cdx.org
#sasl-realm cdx.org
# Include the access lists
include /etc/openldap/slapd.access
[root@usoakldap01 openldap]# more slapd.access
# Access Control
access to * by * read
access to dn=".*,ou=Roaming,dc=cdx,dc=org"
by dnattr=owner write
access to attr=userPassword
by self write
by * none
[root@usoakldap01 openldap]# /usr/sbin/slapd -u ldap -d 128
daemon: socket() failed errno=97 (Address family not supported by protocol)
Backend ACL: access to *
by * read (=rscx)
Backend ACL: access to dn.regex=.*,ou=Roaming,dc=cdx,dc=org
by dnattr=owner write (=wrscx)
Backend ACL: access to attrs=userPassword
by self write (=wrscx)
by * none (=n)
slapd starting
...
=> access_allowed: read access to
"nsLIProfileName=baezbo,ou=Roaming,dc=cdx,dc=o
rg" "objectClass" requested
=> acl_get: [1] check attr objectClass
<= acl_get: [1] acl nsLIProfileName=baezbo,ou=Roaming,dc=cdx,dc=org attr:
object
Class
=> acl_mask: access to entry "nsLIProfileName=baezbo,ou=Roaming,dc=cdx,dc=org",
attr "objectClass" requested
=> acl_mask: to value by "UID=BAEZBO,OU=PEOPLE,DC=CDX,DC=ORG", (=n)
<= check a_dn_pat: *
<= acl_mask: [1] applying read (=rscx) (stop)
<= acl_mask: [1] mask: read (=rscx)
=> access_allowed: read access granted by read (=rscx)
=> access_allowed: read access to
"nsLIProfileName=baezbo,ou=Roaming,dc=cdx,dc=o
rg" "objectClass" requested
=> acl_get: [1] check attr objectClass
<= acl_get: [1] acl nsLIProfileName=baezbo,ou=Roaming,dc=cdx,dc=org attr:
object
Class
=> acl_mask: access to entry "nsLIProfileName=baezbo,ou=Roaming,dc=cdx,dc=org",
attr "objectClass" requested
=> acl_mask: to value by "UID=BAEZBO,OU=PEOPLE,DC=CDX,DC=ORG", (=n)
<= check a_dn_pat: *
<= acl_mask: [1] applying read (=rscx) (stop)
<= acl_mask: [1] mask: read (=rscx)
=> access_allowed: read access granted by read (=rscx)
-------------------------------------------------
This mail sent through IMP: http://horde.org/imp/