3b9fe0
#
3b9fe0
# See slapd-config(5) for details on configuration options.
3b9fe0
# This file should NOT be world readable.
3b9fe0
#
3b9fe0
3b9fe0
dn: cn=config
3b9fe0
objectClass: olcGlobal
3b9fe0
cn: config
3b9fe0
#
3b9fe0
# TLS settings
3b9fe0
#
3b9fe0
# When no CA certificates are specified the Shared System Certificates
3b9fe0
# are in use. In order to have these available along with the ones specified
3b9fe0
# by oclTLSCACertificatePath one has to include them explicitly:
3b9fe0
#olcTLSCACertificateFile: /etc/pki/tls/cert.pem
3b9fe0
#
3b9fe0
# Private cert and key are not pregenerated.
3b9fe0
#olcTLSCertificateFile:
3b9fe0
#olcTLSCertificateKeyFile:
3b9fe0
#
3b9fe0
# System-wide Crypto Policies provide up to date cipher suite which should
3b9fe0
# be used unless one needs a finer grinded selection of ciphers. Hence, the
3b9fe0
# PROFILE=SYSTEM value represents the default behavior which is in place
3b9fe0
# when no explicit setting is used. (see openssl-ciphers(1) for more info)
3b9fe0
#olcTLSCipherSuite: PROFILE=SYSTEM
3b9fe0
3b9fe0
3b9fe0
#
3b9fe0
# Do not enable referrals until AFTER you have a working directory
3b9fe0
# service AND an understanding of referrals.
3b9fe0
#
3b9fe0
#olcReferral: ldap://root.openldap.org
3b9fe0
#
3b9fe0
# Sample security restrictions
3b9fe0
#	Require integrity protection (prevent hijacking)
3b9fe0
#	Require 112-bit (3DES or better) encryption for updates
3b9fe0
#	Require 64-bit encryption for simple bind
3b9fe0
#
3b9fe0
#olcSecurity: ssf=1 update_ssf=112 simple_bind=64
3b9fe0
3b9fe0
3b9fe0
#
3b9fe0
# Load dynamic backend modules:
3b9fe0
# - modulepath is architecture dependent value (32/64-bit system)
3b9fe0
# - back_sql.la backend requires openldap-servers-sql package
3b9fe0
# - dyngroup.la and dynlist.la cannot be used at the same time
3b9fe0
#
3b9fe0
3b9fe0
#dn: cn=module,cn=config
3b9fe0
#objectClass: olcModuleList
3b9fe0
#cn: module
3b9fe0
#olcModulepath:	/usr/lib/openldap
3b9fe0
#olcModulepath:	/usr/lib64/openldap
3b9fe0
#olcModuleload: accesslog.la
3b9fe0
#olcModuleload: auditlog.la
3b9fe0
#olcModuleload: back_dnssrv.la
3b9fe0
#olcModuleload: back_ldap.la
3b9fe0
#olcModuleload: back_mdb.la
3b9fe0
#olcModuleload: back_meta.la
3b9fe0
#olcModuleload: back_null.la
3b9fe0
#olcModuleload: back_passwd.la
3b9fe0
#olcModuleload: back_relay.la
3b9fe0
#olcModuleload: back_shell.la
3b9fe0
#olcModuleload: back_sock.la
3b9fe0
#olcModuleload: collect.la
3b9fe0
#olcModuleload: constraint.la
3b9fe0
#olcModuleload: dds.la
3b9fe0
#olcModuleload: deref.la
3b9fe0
#olcModuleload: dyngroup.la
3b9fe0
#olcModuleload: dynlist.la
3b9fe0
#olcModuleload: memberof.la
3b9fe0
#olcModuleload: pcache.la
3b9fe0
#olcModuleload: ppolicy.la
3b9fe0
#olcModuleload: refint.la
3b9fe0
#olcModuleload: retcode.la
3b9fe0
#olcModuleload: rwm.la
3b9fe0
#olcModuleload: seqmod.la
3b9fe0
#olcModuleload: smbk5pwd.la
3b9fe0
#olcModuleload: sssvlv.la
3b9fe0
#olcModuleload: syncprov.la
3b9fe0
#olcModuleload: translucent.la
3b9fe0
#olcModuleload: unique.la
3b9fe0
#olcModuleload: valsort.la
3b9fe0
3b9fe0
3b9fe0
#
3b9fe0
# Schema settings
3b9fe0
#
3b9fe0
3b9fe0
dn: cn=schema,cn=config
3b9fe0
objectClass: olcSchemaConfig
3b9fe0
cn: schema
3b9fe0
3b9fe0
include: file:///etc/openldap/schema/core.ldif
3b9fe0
3b9fe0
#
3b9fe0
# Frontend settings
3b9fe0
#
3b9fe0
3b9fe0
dn: olcDatabase=frontend,cn=config
3b9fe0
objectClass: olcDatabaseConfig
3b9fe0
olcDatabase: frontend
3b9fe0
#
3b9fe0
# Sample global access control policy:
3b9fe0
#	Root DSE: allow anyone to read it
3b9fe0
#	Subschema (sub)entry DSE: allow anyone to read it
3b9fe0
#	Other DSEs:
3b9fe0
#		Allow self write access
3b9fe0
#		Allow authenticated users read access
3b9fe0
#		Allow anonymous users to authenticate
3b9fe0
#
3b9fe0
#olcAccess: to dn.base="" by * read
3b9fe0
#olcAccess: to dn.base="cn=Subschema" by * read
3b9fe0
#olcAccess: to *
3b9fe0
#	by self write
3b9fe0
#	by users read
3b9fe0
#	by anonymous auth
3b9fe0
#
3b9fe0
# if no access controls are present, the default policy
3b9fe0
# allows anyone and everyone to read anything but restricts
3b9fe0
# updates to rootdn.  (e.g., "access to * by * read")
3b9fe0
#
3b9fe0
# rootdn can always read and write EVERYTHING!
3b9fe0
#
3b9fe0
3b9fe0
#
3b9fe0
# Configuration database
3b9fe0
#
3b9fe0
3b9fe0
dn: olcDatabase=config,cn=config
3b9fe0
objectClass: olcDatabaseConfig
3b9fe0
olcDatabase: config
3b9fe0
olcAccess: to * by dn.base="gidNumber=0+uidNumber=0,cn=peercred,cn=external,c
3b9fe0
 n=auth" manage by * none
3b9fe0
3b9fe0
#
3b9fe0
# Server status monitoring
3b9fe0
#
3b9fe0
3b9fe0
dn: olcDatabase=monitor,cn=config
3b9fe0
objectClass: olcDatabaseConfig
3b9fe0
olcDatabase: monitor
3b9fe0
olcAccess: to * by dn.base="gidNumber=0+uidNumber=0,cn=peercred,cn=external,c
3b9fe0
 n=auth" read by dn.base="cn=Manager,dc=my-domain,dc=com" read by * none
3b9fe0
3b9fe0
#
3b9fe0
# Backend database definitions
3b9fe0
#
3b9fe0
3b9fe0
dn: olcDatabase=mdb,cn=config
3b9fe0
objectClass: olcDatabaseConfig
3b9fe0
objectClass: olcMdbConfig
3b9fe0
olcDatabase: mdb
3b9fe0
olcSuffix: dc=my-domain,dc=com
3b9fe0
olcRootDN: cn=Manager,dc=my-domain,dc=com
3b9fe0
olcDbDirectory:	/var/lib/ldap
3b9fe0
olcDbIndex: objectClass eq,pres
3b9fe0
olcDbIndex: ou,cn,mail,surname,givenname eq,pres,sub