From uwe.sauter.de@gmail.com Mon Feb 8 20:41:32 2021 From: Uwe Sauter To: openldap-technical@openldap.org Subject: Re: How to restrict access to operational attributes? Date: Mon, 08 Feb 2021 21:41:17 +0100 Message-ID: <740529fc-1c47-e304-6acc-a9a80adf92da@gmail.com> In-Reply-To: MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============6722752992886055455==" --===============6722752992886055455== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Hi all, just to wrap this up. It turned out that this was caused by a wrong order of = including ACLs from a second file and=20 loading the ppolicy plugin. With the correct order the pwd* attributes provided by the ppolicy module (no= t the schema file!) are available when the=20 ACLs are parsed and thus the test succeeds. Regards, Uwe Am 05.02.21 um 08:40 schrieb Uwe Sauter: > Good morning, >=20 > I'm trying to restrict access to the operational attributes that are provid= ed by the ppolicy overlay > (e.g. pwdChangedTime, pwdHistory). >=20 > When I add the following to my ACL configuration file and try to verify the= configuration an error > occurs: >=20 > #### ACL > access to attrs=3DpwdHistory > by * none > ######## >=20 > #### slaptest output > 601cf554 /etc/openldap/acl.conf: line 96: unknown attr "pwdHistory" in to c= lause > 601cf554 ::=3D access to [ by [ ] [ <= control> ] ]+ > ::=3D * | dn[.=3D] [filter=3D] [attrs=3D] > ::=3D [val[/][.]=3D] = | > ::=3D [ , ] > ::=3D | @ | ! | entry | children > ::=3D [ * | anonymous | users | self | dn[.]=3D ] > [ realanonymous | realusers | realself | realdn[.]=3D= ] > [dnattr=3D] > [realdnattr=3D] > [group[/[/]][.