openldap/tests/data/slapd-acl.conf

101 lines
3.4 KiB
Plaintext
Raw Normal View History

1998-08-09 08:43:13 +08:00
# master slapd config -- for testing
# $OpenLDAP: pkg/ldap/tests/data/slapd-acl.conf,v 1.46.2.4 2003/12/15 22:05:29
kurt Exp $
2003-11-29 04:00:23 +08:00
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
##
2005-01-02 04:49:32 +08:00
## Copyright 1998-2005 The OpenLDAP Foundation.
2003-11-29 04:00:23 +08:00
## All rights reserved.
##
## Redistribution and use in source and binary forms, with or without
## modification, are permitted only as authorized by the OpenLDAP
## Public License.
##
## A copy of this license is available in the file LICENSE in the
## top-level directory of the distribution or, alternatively, at
## <http://www.OpenLDAP.org/license.html>.
include ./schema/core.schema
include ./schema/cosine.schema
include ./schema/inetorgperson.schema
include ./schema/openldap.schema
include ./schema/nis.schema
pidfile ./testrun/slapd.1.pid
argsfile ./testrun/slapd.1.args
1998-08-09 08:43:13 +08:00
2001-09-01 13:01:31 +08:00
# global ACLs
2004-05-13 08:18:21 +08:00
#
# normal installations should protect root dse, cn=monitor, cn=subschema
#
access to dn.exact="" attr=objectClass
by users read
access to *
by * read
2001-09-01 13:01:31 +08:00
#mod#modulepath ../servers/slapd/back-@BACKEND@/
#mod#moduleload back_@BACKEND@.la
#monitormod#modulepath ../servers/slapd/back-monitor/
#monitormod#moduleload back_monitor.la
1998-08-09 08:43:13 +08:00
#######################################################################
# database definitions
1998-08-09 08:43:13 +08:00
#######################################################################
database @BACKEND@
2002-01-14 11:42:24 +08:00
#ldbm#cachesize 0
suffix "dc=example,dc=com"
directory ./testrun/db.1.a
rootdn "cn=Manager,dc=example,dc=com"
1998-08-09 08:43:13 +08:00
rootpw secret
2001-08-01 12:50:47 +08:00
#ldbm#index objectClass eq
#ldbm#index cn,sn,uid pres,eq,sub
2001-10-04 05:27:37 +08:00
#bdb#index objectClass eq
#bdb#index cn,sn,uid pres,eq,sub
2004-05-13 08:18:21 +08:00
#access to attr=objectclass dn.subtree="dc=example,dc=com"
1998-08-09 08:43:13 +08:00
access to attr=objectclass
1999-10-22 05:23:43 +08:00
by * =rsc stop
2004-05-13 08:18:21 +08:00
#access to filter="(objectclass=person)" attr=userpassword dn.subtree="dc=example,dc=com"
access to filter="(objectclass=person)" attr=userpassword
by anonymous auth
2004-04-28 09:58:46 +08:00
by self =wx
access to dn.children="ou=Alumni Association,ou=People,dc=example,dc=com"
by dn.regex=".+,dc=example,dc=com" +c continue
by dn.subtree="dc=example,dc=com" +rs continue
by dn.children="dc=example,dc=com" +d continue
1999-10-22 05:23:43 +08:00
by * stop
2004-05-13 08:18:21 +08:00
#access to attr=member,uniquemember dn.subtree="dc=example,dc=com"
access to attr=member,uniquemember
1998-08-09 08:43:13 +08:00
by dnattr=member selfwrite
by dnattr=uniquemember selfwrite
1998-08-09 08:43:13 +08:00
by * read
2004-05-13 08:18:21 +08:00
#access to attr=member,uniquemember filter="(mail=*com)" dn.subtree="dc=example,dc=com"
access to attr=member,uniquemember filter="(mail=*com)"
2002-03-24 09:55:11 +08:00
by * read
2004-05-13 08:18:21 +08:00
#access to filter="(|(objectclass=groupofnames)(objectClass=groupofuniquenames))" dn.subtree="dc=example,dc=com"
access to filter="(|(objectclass=groupofnames)(objectClass=groupofuniquenames))"
2004-05-07 23:38:42 +08:00
by dn.exact="cn=Bjorn Jensen,ou=Information Technology Division,ou=People,dc=example,dc=com" =sc continue
2004-05-07 23:28:39 +08:00
by dn.regex="^cn=Bjorn Jensen,ou=Information Technology Division,ou=People,dc=example,dc=com$" +rw stop
1999-10-22 05:23:43 +08:00
by * break
2004-05-07 23:28:39 +08:00
access to dn.children="ou=Information Technology Division,ou=People,dc=example,dc=com"
by group/groupOfUniqueNames/uniqueMember.exact="cn=ITD Staff,ou=Groups,dc=example,dc=com" write
2002-09-13 23:04:04 +08:00
by * read
2004-05-13 08:18:21 +08:00
access to dn.exact="cn=Alumni Assoc Staff,ou=Groups,dc=example,dc=com"
by set="[cn=Alumni Assoc Staff,ou=Groups,dc=example,dc=com]/member* & user" write
by * read
#access to filter="(name=X*Y*Z)" dn.subtree="dc=example,dc=com"
access to filter="(name=X*Y*Z)"
2002-03-02 02:58:11 +08:00
by * continue
2001-09-01 13:01:31 +08:00
# fall into global ACLs
#monitor#database monitor