# master slapd config -- for testing
# $OpenLDAP: pkg/ldap/tests/data/slapd-acl.conf,v 1.46.2.4 2003/12/15 22:05:29
kurt Exp $
## This work is part of OpenLDAP Software .
##
## Copyright 1998-2003 The OpenLDAP Foundation.
## All rights reserved.
##
## Redistribution and use in source and binary forms, with or without
## modification, are permitted only as authorized by the OpenLDAP
## Public License.
##
## A copy of this license is available in the file LICENSE in the
## top-level directory of the distribution or, alternatively, at
## .
ucdata-path ./ucdata
include ./schema/core.schema
include ./schema/cosine.schema
include ./schema/inetorgperson.schema
include ./schema/openldap.schema
include ./schema/nis.schema
pidfile ./testrun/slapd.1.pid
argsfile ./testrun/slapd.1.args
# global ACLs
access to dn.base="" attr=objectClass by users read
access to * by * read
#mod#modulepath ../servers/slapd/back-@BACKEND@/
#mod#moduleload back_@BACKEND@.la
#######################################################################
# ldbm database definitions
#######################################################################
database @BACKEND@
#ldbm#cachesize 0
suffix "dc=example,dc=com"
directory ./testrun/db.1.a
rootdn "cn=Manager,dc=example,dc=com"
rootpw secret
#ldbm#index objectClass eq
#ldbm#index cn,sn,uid pres,eq,sub
#bdb#index objectClass eq
#bdb#index cn,sn,uid pres,eq,sub
#
# normal installations should protect root dse, cn=monitor, cn=subschema
#
access to dn="" by * read
access to dn.base="" by * read
access to attr=objectclass
by * =rsc stop
access to filter="(objectclass=person)" attr=userpassword dn.subtree=""
by anonymous auth
by self write
access to dn.children="ou=Alumni Association,ou=People,dc=example,dc=com"
by dn.regex=".+,dc=example,dc=com" +c continue
by dn.subtree="dc=example,dc=com" +rs continue
by * stop
access to attr=member,uniquemember
by dnattr=member selfwrite
by dnattr=uniquemember selfwrite
by * read
access to attr=member,uniquemember filter=(mail=*com)
by * read
access to filter="(&(objectclass=groupofnames)(objectClass=groupofuniquenames)
)"
by dn.base="cn=Bjorn Jensen,ou=Information Technology Division,ou=People,dc=
example,dc=com" =sc continue
by dn.regex="^cn=Bjorn Jensen,ou=Information Technology Division,ou=People,d
c=example,dc=com$" +rw stop
by * break
access to dn.children="ou=Information Technology Division,ou=People,dc=exampl
e,dc=com"
by group/groupOfUniqueNames/uniqueMember.exact="cn=ITD Staff,ou=Groups,dc=ex
ample,dc=com" write
by * read
access to filter="(name=X*Y*Z)"
by * continue
# fall into global ACLs