adf540
#
adf540
# See slapd-config(5) for details on configuration options.
adf540
# This file should NOT be world readable.
adf540
#
adf540
adf540
dn: cn=config
adf540
objectClass: olcGlobal
adf540
cn: config
adf540
olcArgsFile: /var/run/openldap/slapd.args
adf540
olcPidFile: /var/run/openldap/slapd.pid
adf540
#
adf540
# TLS settings
adf540
#
adf540
olcTLSCACertificatePath: /etc/openldap/certs
adf540
olcTLSCertificateFile: "OpenLDAP Server"
adf540
olcTLSCertificateKeyFile: /etc/openldap/certs/password
adf540
#
adf540
# Do not enable referrals until AFTER you have a working directory
adf540
# service AND an understanding of referrals.
adf540
#
adf540
#olcReferral: ldap://root.openldap.org
adf540
#
adf540
# Sample security restrictions
adf540
#	Require integrity protection (prevent hijacking)
adf540
#	Require 112-bit (3DES or better) encryption for updates
adf540
#	Require 64-bit encryption for simple bind
adf540
#
adf540
#olcSecurity: ssf=1 update_ssf=112 simple_bind=64
adf540
adf540
adf540
#
adf540
# Load dynamic backend modules:
adf540
# - modulepath is architecture dependent value (32/64-bit system)
adf540
# - back_sql.la backend requires openldap-servers-sql package
adf540
# - dyngroup.la and dynlist.la cannot be used at the same time
adf540
#
adf540
adf540
#dn: cn=module,cn=config
adf540
#objectClass: olcModuleList
adf540
#cn: module
adf540
#olcModulepath:	/usr/lib/openldap
adf540
#olcModulepath:	/usr/lib64/openldap
adf540
#olcModuleload: accesslog.la
adf540
#olcModuleload: auditlog.la
adf540
#olcModuleload: back_dnssrv.la
adf540
#olcModuleload: back_ldap.la
adf540
#olcModuleload: back_mdb.la
adf540
#olcModuleload: back_meta.la
adf540
#olcModuleload: back_null.la
adf540
#olcModuleload: back_passwd.la
adf540
#olcModuleload: back_relay.la
adf540
#olcModuleload: back_shell.la
adf540
#olcModuleload: back_sock.la
adf540
#olcModuleload: collect.la
adf540
#olcModuleload: constraint.la
adf540
#olcModuleload: dds.la
adf540
#olcModuleload: deref.la
adf540
#olcModuleload: dyngroup.la
adf540
#olcModuleload: dynlist.la
adf540
#olcModuleload: memberof.la
adf540
#olcModuleload: pcache.la
adf540
#olcModuleload: ppolicy.la
adf540
#olcModuleload: refint.la
adf540
#olcModuleload: retcode.la
adf540
#olcModuleload: rwm.la
adf540
#olcModuleload: seqmod.la
adf540
#olcModuleload: smbk5pwd.la
adf540
#olcModuleload: sssvlv.la
adf540
#olcModuleload: syncprov.la
adf540
#olcModuleload: translucent.la
adf540
#olcModuleload: unique.la
adf540
#olcModuleload: valsort.la
adf540
adf540
adf540
#
adf540
# Schema settings
adf540
#
adf540
adf540
dn: cn=schema,cn=config
adf540
objectClass: olcSchemaConfig
adf540
cn: schema
adf540
adf540
include: file:///etc/openldap/schema/core.ldif
adf540
adf540
#
adf540
# Frontend settings
adf540
#
adf540
adf540
dn: olcDatabase=frontend,cn=config
adf540
objectClass: olcDatabaseConfig
adf540
objectClass: olcFrontendConfig
adf540
olcDatabase: frontend
adf540
#
adf540
# Sample global access control policy:
adf540
#	Root DSE: allow anyone to read it
adf540
#	Subschema (sub)entry DSE: allow anyone to read it
adf540
#	Other DSEs:
adf540
#		Allow self write access
adf540
#		Allow authenticated users read access
adf540
#		Allow anonymous users to authenticate
adf540
#
adf540
#olcAccess: to dn.base="" by * read
adf540
#olcAccess: to dn.base="cn=Subschema" by * read
adf540
#olcAccess: to *
adf540
#	by self write
adf540
#	by users read
adf540
#	by anonymous auth
adf540
#
adf540
# if no access controls are present, the default policy
adf540
# allows anyone and everyone to read anything but restricts
adf540
# updates to rootdn.  (e.g., "access to * by * read")
adf540
#
adf540
# rootdn can always read and write EVERYTHING!
adf540
#
adf540
adf540
#
adf540
# Configuration database
adf540
#
adf540
adf540
dn: olcDatabase=config,cn=config
adf540
objectClass: olcDatabaseConfig
adf540
olcDatabase: config
adf540
olcAccess: to * by dn.base="gidNumber=0+uidNumber=0,cn=peercred,cn=external,c
adf540
 n=auth" manage by * none
adf540
adf540
#
adf540
# Server status monitoring
adf540
#
adf540
adf540
dn: olcDatabase=monitor,cn=config
adf540
objectClass: olcDatabaseConfig
adf540
olcDatabase: monitor
adf540
olcAccess: to * by dn.base="gidNumber=0+uidNumber=0,cn=peercred,cn=external,c
adf540
 n=auth" read by dn.base="cn=Manager,dc=my-domain,dc=com" read by * none
adf540
adf540
#
adf540
# Backend database definitions
adf540
#
adf540
adf540
dn: olcDatabase=hdb,cn=config
adf540
objectClass: olcDatabaseConfig
adf540
objectClass: olcHdbConfig
adf540
olcDatabase: hdb
adf540
olcSuffix: dc=my-domain,dc=com
adf540
olcRootDN: cn=Manager,dc=my-domain,dc=com
adf540
olcDbDirectory:	/var/lib/ldap
adf540
olcDbIndex: objectClass eq,pres
adf540
olcDbIndex: ou,cn,mail,surname,givenname eq,pres,sub