Bonjour Florent,
(sorry I answer just this in Freanch : easier to me 🙂 Les ACL s'arrêtent au premier
match. Il faut donc mettre les droits des user sconcernés pour chaque ACL).
Here a franch link :
https://www.vincentliefooghe.net/content/les-acl-dans-openldap
Here an example :
access to attrs=userPassword
by dn.exact="cn=admin,dc=example,dc=fr" write
by users auth
by anonymous auth
by * none
access to dn.subtree="the_place_you_want"
by dn="ou=system-write,dc=example,dc=fr" write
by dn="ou=system-read,dc=example,dc=fr" read
by users read
access to dn.subtree="ou=ent,dc=example,dc=fr"
by self write
by dn="ou=system-read,dc=example,dc=fr" read
by dn="ou=system-write,dc=example,dc=fr" write
by * none
Another way very interesting is to use "break" and "continue"
keyword.
________________________________
De : openldap-technical <openldap-technical-bounces(a)openldap.org> de la part de
Florent Vallée <florent.vallee(a)insa-cvl.fr>
Envoyé : lundi 20 mai 2019 11:05
À : openldap-technical
Objet : OPEN LDAP ACL
Hello,
I manage all my users with LDAP.
I would like to build the following reading rules:
1. only admin can change passwords, authenticated users read and anonymous do nothing
2. Authenticated users access the database but can only read their account but not the
rest
3. the group ou = system-read can read the whole database
4. the group ou = system-write can write in ou = ent
5. Anonymous access is forbidden
My LDIF file :
dn: olcDatabase={1}mdb,cn=config
changetype: modify
replace: olcAccess
olcAccess: {0}to attrs=userPassword by self write by
dn="cn=admin,dc=example,dc=fr" write by * auth
olcAccess: {1}to dn.base="" by self write by
dn="ou=system-read,dc=example,dc=fr" read by * auth
olcAccess: {2}to dn.subtree="ou=ent,dc=example,dc=fr" by self write by
dn="ou=system-write,dc=example,dc=fr" write by * none
olcAccess: {3}to * by self write by dn="cn=admin,dc=example,dc=fr" write by *
none
I have a lot of trouble with ACLs, I can not do what I want with. Thank you for your
help.
Florent