[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: [LDAP-SOFTWARE] ACLand regex (matching self)
HI Kurt,
again, these questions, could you help me with a (real) answer ?
> >> 1. is it normal that these things (whatever they are) need to be defined
> >> by me, the admin (or user if you prefer) ?
> >>
> >> 2. if so, where can I find a list of all the things I need to give ACL's
> >> for ?
{snip}
> >Feb 25 03:10:04 curacao slapd[864]: => access_allowed: search access to
> >"cn=Subschema" "objectClass" requested
>
> Well, what policy are you attempting to implement?
I try to implement a policy based on all the entries I entered. But there seem
to be more (hidden, unknown) entries, that interfere with my entries and
ACL's. The rootDSE is one of them. are there more ? What is the full list of
entries that are made by the system itself and to which of them I should
grant acces to read, write, search, whatever ?
As you remember, this thread started off with a lot of confusion on my side. I
am much closer to understanding what is happening now, but I miss this
essential part of information. I've never heard of 'cn=Subschema' and I
didn't create it myself. Isn't it only fair that you or anyone else tells me
what's under the hood ?
And 'use the source, Luke' won't do ;)
I looked at the source but the C-code is for me like a... bulgarian ( I know
some of it but not enough to survive).
Some critique: I find it strange that my ACL's and my LDIF entries are not the
only thing I have to think about. Why should I think of the Root DSE ? Fact
is, without the rootdse access, my ACL's are *not* behaving like they should.
TIA,
Ace
>
> >So, now I suspect that somewhere a DN 'cn=Subschema' must exist. But, that
> > is not in the root DSE anymore, if I understand this correctly.
>
> The subschema has never been published in the root DSE. It's
> published in a subschema subentry called (unless you change it)
> "cn=Subschema".
>
> >Do I need to make these dn's or are they 'system' dn's ?
>
> The server always "makes" them... Whether they are accessible
> or not depends upon what access controls you put in place.