In 2.4 I was still pulling in the schema. In 2.5 ppolicy is compiled as part of the code. Assuming it just works, how does one go about setting pwdAccountLockedTime for a user then? I can't add it as an attribute of the user so I'm not sure how it can be set.
On Mon, Jan 3, 2022, 3:21 AM Ulrich Windl Ulrich.Windl@rz.uni-regensburg.de wrote:
kevin martin ktmdms@gmail.com schrieb am 01.01.2022 um 00:00 in
Nachricht CACyJYa0rYAhJwbbc6Mp4NMV2g7Kj3W2Y1vqmu0jAbihdnc5zNg@mail.gmail.com:
Pwdaccountlockedtime isn't an attribute that can be set in the database since ppolicy is now compiled into openldap as opposed to it being a
schema
that's pulled in and that attribute is not defined in the source code. I would say that, based on the man page, it's a bug.
In 2.4 I can query it from cn=schema,cn=config: ( 1.3.6.1.4.1.42.2.27.8.1.17 NAME 'pwdAccountLockedTime' DESC 'The time an user account was locked' EQUALITY generalizedTimeMatch ORDERING generalizedTimeOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE USAGE directoryOperation )
On Fri, Dec 31, 2021, 11:23 AM Michael Ströder michael@stroeder.com
wrote:
On 12/27/21 12:04, Ulrich Windl wrote:
> kevin martin ktmdms@gmail.com schrieb am 22.12.2021 um 22:42 in
Nachricht
CACyJYa2V+d1Cv6TgK7PzWS36ij-aih6STL2jE2HZv0R-DwoRow@mail.gmail.com:
it appears from looking at ppolicy.c that pwdAccountLockedTime is not supported in openlda. is there another way to lock a users account
in
openldap outside of simply changing the users password?
I found out the hard way: When all grace logins were consumed after the user should have changed the password, the user can no longer log in (and he/she cannot change the password either).
But that's not what the original poster asked for.
See slapo-policy(5) [1]:
"If pwdAccountLockedTime is set to 000001010000Z, the user's account has been permanently locked and may only be unlocked by an administrator."
IIRC this works. If not, then it's a bug.
In Æ-DIR I let admins maintain a status attribute 'aeStatus' which is also evaluated by ACLs on userPassword to deactivate authentication (auth privilege granted to anonymous only for active entries).
Ciao, Michael.
[1] https://www.openldap.org/software/man.cgi?query=slapo-ppolicy