[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: authzTo [auf Viren überprüft]
Pierangelo Masarati schrieb am 04.08.2005 17:17:
authz-policy to
authz-regexp uid=.*,cn=auth
cn=human,ou=mgr,o=foo
authz-regexp cn=human,ou=mgr,o=foo
dn.subtree=cn=.*,ou=here,ou=humans,o=foo
^^^ this is incorrect; either use
I corrected this to:
authz-policy to
authz-regexp uid=human,cn=plain,cn=auth
cn=human,ou=mgr,o=foo
authz-regexp uid=([^,]*,cn=plain,cn=auth
"ldap:///ou=here,ou=humans,o=foo??sub?(uid=$1)"
I don't recognized, that not only sasl_ldapdb_id is converted but also
the imapd-userid.
Now the two ids are converted correctly (checked with -d 1 output).
Now slapd stucks while doing the authzTo rule checking:
slap_sasl_check_authz: does employeeNumber=2,ou=here,ou=humans,o=foo
match authzTo rule in cn=human,ou=mgr,o=foo?
[...]
slap_sasl_check_authz: authzTo check returning 50
slap_sasl_authorized: return 48
SASL PROXY AUTHORIZE [conn=0]: proxy authorization disallowed (48)
SASL [conn=0] Failure: not authorized
authzTo-attribute of cn=human,ou=mgr,o=foo is
authzTo: dn.subtree="ou=humans,o=foo"
In slapd.conf:
authz-regexp "cn=human,ou=mgr,o=foo"
dn.subtree="ou=humans,o=foo"
In what state is the connection?
What ACL settings are required? Must authzTo really be readable by *?
When I do this, I goes one step further:
slap_sasl_match: comparing DN employeeNumber=2,ou=here,ou=humans,o=foo
to rule dn.subtree="ou=humans,o=foo"
slap_parseURI: parsing dn.subtree="ou=humans,o=foo"
slap_sasl_match: comparison returned 2
slap_sasl_check_authz: authzTo check returning 2
slap_sasl_authorized: return 48
SASL PROXY AUTHORIZE [conn=0]: proxy authorization disallowed (48)
SASL [conn=0] Failure: not authorized
Where is the cause for the "Insufficient access" problem here?
Hans