On 10/19/12 12:36 +0900, Simon Walter wrote:
Debian Squeeze is using the dynamic configuration. While I am sure
there are benefits, all the documentation is for static configuration
I've got a basic tree up and running and several services are using
it no problem. There are several things I'd like to do, like
replication. For this and some other services, SOGo for example, that
don't bind anonymously, I'd like to create some more users for this.
I could be mistaken, but perhaps they need some kind of admin
privileges. If not, that means that any user can modify anything in
I'm not familiar with SOGo. A typical configuration might include a rootdn
for configuration purposes, and one or more administrative users which are
allowed piecemeal access to add/change your tree, restricted by ACLs.
Those administrative users can be user entries within your tree, or sasl
I see various information about ACI and ACL and access.conf. I
find clear documentation about how any of this relates to dynamic
See the manpage for slapd-config, and the OpenLDAP Administrator's Guide;
Chapter 8 covers Access Control.
To conclude, how do I add additional users to a dynamic configured
openldap tree and configure those users with specific access
*Adding* users shouldn't be any different (the tree itself is no different,
only the configuration backend). ACL configuration for you will be a
one-to-one mapping from the slapd.conf config statements, in whatever
documentation you're reading, to the slapd-config dynamic config statements
(compare the slapd.conf and slapd-config manpages).