On Wednesday, 21 April 2010 16:50:31 Frank Swasey wrote:
We are setting up a new service that is going to actually hold passwords in the OpenLDAP database instead of using Kerberos (via sasl and saslauthd). To that end, I'm investigating ppolicy.
However, what I haven't found in the man page (slapo-ppolicy), or the Admin Guide, or the FAQ-O-Matic is whether I need to configure ppolicy on the master and the replicas or just the master.
Both. Ignoring the "upstream" replication of state attributes, to use ppolicy effectively at all, any server which receives simple binds must have ppolicy active.
My assumption is that I need to set up ppolicy on the replicas as well as the master -- otherwise those pwd* operational attributes are not going to be legal on the replica and I'll get in trouble.
I think have ppolicy schema loaded would be sufficient to allow the attributes, but do you want DNs that have been locked out to be able to authenticate on your replicas? If not, you need ppolicy active on them.
I haven't set up a test environment with a replica yet -- so, I'm asking here.
I also see in the FAQ that ppolicy only works on OpenLDAP versions greater than 2.3 (item 2 of the ppolicy checklist). So, I'm sensing that ppolicy in OpenLDAP v2.3.x is not really completely functional? Am I reading too much into the entry in the FAQ?
ppolicy does work on 2.3.x. However, the recent ppolicy_forward_updates option on replicas (since 2.4.17 I think) may make things quite a bit easier.
Regards, Buchan