dn: olcDatabase=hdb,cn=config objectClass: olcDatabaseConfig objectClass: olcHdbConfig olcDatabase: hdb # The base of your directory olcSuffix: dc=vmnet # rootdn directive for specifying a superuser on the database. This is needed # for syncrepl. # olcRootDN: cn=admin,dc=vmnet # Where the database file are physically stored olcDbDirectory: /var/lib/ldap # The dbconfig settings are used to generate a DB_CONFIG file the first # time slapd starts. They do NOT override existing an existing DB_CONFIG # file. You should therefore change these settings in DB_CONFIG directly # or remove DB_CONFIG and restart slapd for changes to take effect. # For the Debian package we use 2MB as default but be sure to update this # value if you have plenty of RAM olcDbConfig: set_cachesize 0 2097152 0 # Sven Hartge reported that he had to set this value incredibly high # to get slapd running at all. See http://bugs.debian.org/303057 for more # information. # Number of objects that can be locked at the same time. olcDbConfig: set_lk_max_objects 1500 # Number of locks (both requested and granted) olcDbConfig: set_lk_max_locks 1500 # Number of lockers olcDbConfig: set_lk_max_lockers 1500 # Indexing options olcDbIndex: objectClass eq # Save the time that the entry gets modified olcLastMod: TRUE # Checkpoint the BerkeleyDB database periodically in case of system # failure and to speed slapd shutdown. olcDbCheckpoint: 512 30 # The userPassword by default can be changed # by the entry owning it if they are authenticated. # Others should not be able to see it, except the # admin entry below # These access lines apply to database #1 only olcAccess: to attrs=userPassword,shadowLastChange by dn="cn=admin,dc=vmnet" write by anonymous auth by self write by * none # Ensure read access to the base for things like # supportedSASLMechanisms. Without this you may # have problems with SASL not knowing what # mechanisms are available and the like. # Note that this is covered by the 'access to *' # ACL below too but if you change that as people # are wont to do you'll still need this if you # want SASL (and possible other things) to work # happily. olcAccess: to dn.base="" by * read # The admin dn has full write access, everyone else # can read everything. olcAccess: to * by dn="cn=admin,dc=vmnet" write by * read # For Netscape Roaming support, each user gets a roaming # profile for which they have write access to #olcAccess: to dn=".*,ou=Roaming,o=morsnet" by dn="cn=admin,dc=vmnet" write by dnattr=owner write