[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
ppolicy: pwdMinAge being enforced for managers
- To: openldap-technical@openldap.org
- Subject: ppolicy: pwdMinAge being enforced for managers
- From: Phil <1966phils@gmail.com>
- Date: Thu, 05 Feb 2015 10:32:38 +1100
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:subject:from:to:date:content-type:mime-version :content-transfer-encoding; bh=OSaAhZfq3ySft001DucAP9UF78tYIzCoSq0JRFnbsWQ=; b=rUYNKXNQopDQN5XYLoQPomSBMLbZnld5V/EPzGeRBCHuuQAoAGPlzSeaAVt+6+3GGO aYMVYPoOnXYdCGSiKQId1jL/+zADTHD3WOtgtWIm4LuZPTq61oQth/hvAw0xIbB6Ap85 Uk79bmb99BNfmHR+DIqflgczX9NN9AJ7FUFsSolLIP6bTBuGVX9cEbSqklwsst5E+C56 th1cXQgBJTu454gQ0gGKFliVgt2HuM9/Rk4uEi2RqLq6oR8A4kb3qRTmiCs20nDIV+ox sENJtSvoSG43D/7P9+Ys9Nmv5kc3SWHT/F7fao23ds7BKJGqIbE31AYk72h4tIfoEWYx VyMg==
Hi all,
We're implementing a basic user directory with OpenLDAP and the ppolicy
attributes pwdMaxAge and pwdMinAge give use some desired functionality,
but we need the ability for managers to reset a user's password.
If we use the “rootdn” then this works, but we need to have other user
accounts designated as managers. Even if we define ACLs to give our
management group “manage” access we can still get the following from
ldappasswd:
Result: Constraint violation (19)
Additional info: Password is too young to change
Is there any way to designate a group of users as "managers" such that
pwdMinAge is not applied?
These are the ACLs we've tried without success to give the “UserAdmin”
group the rights:
cat <<__EOF | ldapmodify -Y EXTERNAL -H ldapi:///
dn: olcDatabase={2}bdb,cn=config
changetype: modify
add: olcAccess
olcAccess: to attrs=userPassword
by self =xw
by group.exact="cn=UserAdmin,${LDAP_SERVER_BASE}" manage
by anonymous auth
by * none
olcAccess: to dn.base="ou=Users,${LDAP_SERVER_BASE}"
by group.exact="cn=UserAdmin,${LDAP_SERVER_BASE}" manage
by * read
olcAccess: to dn.children="ou=Users,${LDAP_SERVER_BASE}"
filter=(objectClass=posixAccount)
by group.exact="cn=UserAdmin,${LDAP_SERVER_BASE}" write
by * read
olcAccess: to dn.base="cn=UserAdmin,${LDAP_SERVER_BASE}" attrs=member
by group.exact="cn=UserAdmin,${LDAP_SERVER_BASE}" write
by * read
olcAccess: to *
by * read
-
__EOF
Thanks
Phil