[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
disable logins with ACLs
- To: "openldap-technical@openldap.org" <openldap-technical@openldap.org>
- Subject: disable logins with ACLs
- From: Igor Shmukler <igor.shmukler@gmail.com>
- Date: Tue, 31 Mar 2015 21:02:07 +0300
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=mpdKdGjESEpArHp/D7ohUM2nTfKKnzsnx7PQYD9h5Tc=; b=H+eStxnnDSlWvVRHTOyPaqmr2+FLNHB730TtJRiVYJz6fJkDdjA5mwpvM05JKdCayt 4+y04FvsEC3EtX3z95arj4gALvBOvXCokudAPxjwj+1GS/RNdfm5as/+26Sve6JR4G1i KstVykP2wx4n1ucngYLSFh6zpFTfKJz37r4M395ljH5ZqsPUPgZbp/FNqCqLEMuovSGc TNHM5FfmI8Xw2m0G4Ov/2/1JDPlvCqpS7xPd1qnpCWWHHFfYUptCR3submGyq5oiPyuG aCmOa9rakXEJFax6FiOOv6TZ06a44mtFwWOHDWDoCp/iQ+KAu+UhlCTEn0d1gNi92mgg Y5yw==
Hello,
I am trying to disable user logins for expired trial users.
After searching online, finally found a useful thread from this very
list archived http://www.openldap.org/lists/openldap-technical/201111/msg00165.html
I accidentally tried to mess with userPassword hash, but it did not work me.
Since in that thread Michael showed/shared a better way to achieve the
same goal of disabling users with ACLs, I am trying to copy his
method.
I attempted to follow Michael's example. It has not worked yet. Below
is my script:
dn: olcDatabase={3}hdb,cn=config
changetype: modify
replace: olcAccess
olcAccess: {0}to attrs=userPassword,shadowLastChange
filter=(&(objectClass=inetOrgPerson)(serviceLevel=suspended))
by dn="cn=config" write by * none
olcAccess: {1}to attrs=userPassword,shadowLastChange
filter=(&(objectClass=inetOrgPerson)(!(serviceLevel=suspended)))
by self write by anonymous auth
by dn="cn=admin,dc=directory,dc=apple,dc=com" write
by dn="cn=config" write by * none
olcAccess: {2}to dn.base="" by * read
olcAccess: {3}to *
filter=(&(objectClass=inetOrgPerson)(serviceLevel=suspended))
by dn="cn=config" write
by * none
olcAccess: {4}to *
filter=(&(objectClass=inetOrgPerson)(!(serviceLevel=suspended)))
by self write
by dn="cn=admin,dc=directory,dc=apple,dc=com" write
by dn="cn=config" write
by * read
Currently, ldapmodify(1) is failing with an implementation specific
error, likely due to messed-up syntax or something. The additional
info: <olcAccess> handler exited with 1
Michael's example is not written for OLC, so I managed to do something
wrong. Any ideas?
Thank you,
Igor Shmukler