From: Quanah Gibson-Mount <quanah@zimbra.com>
To: espeake@oreillyauto.com
Cc: openldap-technical@openldap.org
Date: 09/06/2013 12:29 PM
Subject: Re: SyncRepl Chaining
--On Friday, September 06, 2013 12:21 PM -0500 espeake@oreillyauto.com
wrote:
add: olcAccess
olcAccess: {0}to *
by dn.base="uid=syncrepl,ou=System,dc=oreillyauto,dc=com" read
by dn.base="uid=readOnlyUser,ou=System,dc=oreillyauto,dc=com" read
by dn.base="uid=ldapAdmin,ou=System,dc=oreillyauto,dc=com" write
by dn.base="uid=newUserAdmin,ou=System,dc=oreillyauto,dc=com" write
by dn.base="uid=passwordAdmin,ou=System,dc=oreillyauto,dc=com" write
break
This should be "by * break" not "break"
You have no ACL granting access to the pseudo-attribute "entry".
I personally have as my last ACL:
olcAccess: {10}to attrs=entry by dn.children="cn=admins,cn=zimbra" write
by *
read
--Quanah
--
Quanah Gibson-Mount
Lead Engineer
Zimbra, Inc
--------------------
Zimbra :: the leader in open source messaging and collaboration
Here is the access list from a new slapcat, this is for olcDatabase={1}hdb
olcAccess: {0}to * by
dn.base="uid=syncrepl,ou=System,dc=oreillyauto,dc=com"
read by dn.base="uid=readOnlyUser,ou=System,dc=oreillyauto,dc=com"
read by dn.base="uid=ldapAdmin,ou=System,dc=oreillyauto,dc=com" write
by dn.base
="uid=newUserAdmin,ou=System,dc=oreillyauto,dc=com" write by
dn.base="uid=p
asswordAdmin,ou=System,dc=oreillyauto,dc=com" write by * break
olcAccess: {1}to dn.subtree="dc=oreillyauto,dc=com" by
group/groupOfUniqueNa
mes/uniqueMember="cn=System
Administrators,ou=Groups,dc=oreillyauto,dc=com" w
rite by group/groupOfUniqueNames/uniqueMember="cn=LDAP
Admin,ou=Groups,dc=o
reillyauto,dc=com" write
olcAccess: {2}to attrs=userPassword by
group/groupOfUniqueNames/uniqueMember
="cn=Authenticate,ou=Groups,dc=oreillyauto,dc=com" write by anonymous
read
olcAccess: {3}to attrs=uid by anonymous read by users read
olcAccess: {4}to attrs=ou,employeeNumber by users read
olcAccess: {5}to dn.subtree="ou=System,dc=oreillyauto,dc=com" by
dn.subtree=
"ou=Users,dc=oreillyauto,dc=com" none by users read
olcAccess: {6}to dn.children="ou=Groups,dc=oreillyauto,dc=com" by
dnattr=own
er write by dnattr=uniqueMember read by * none
olcAccess: {7}to dn.children="ou=Users,dc=oreillyauto,dc=com" by self
read
by
group/groupOfUniqueNames/uniqueMember="cn=Authenticate,ou=Groups,dc=oreill
yauto,dc=com" read by * none
olcAccess: {8}to * by self read by users read
olcAccess: {9} to attrs=entry by dn.children="cn=admins" write by * read