Never mind, I just need to compile it using ./configure --enable-memberof, and that solved the problem.
Thanks!
2011/5/16 Quanah Gibson-Mount quanah@zimbra.com
--On May 16, 2011 6:17:37 PM -0400 JOSE L MARTINEZ-AVIAL jlmagc@gmail.com wrote:
I did that, and the problem is that I compiled openldap without enabling
the modules. The issue now is that it fails to compile when I enable the modules because libtools-ldtd is not installed, and that seems to be related with the fact the I use RHEL4, which doesn't include that library.
So download and build it yourself. ;)
--Quanah
-- Quanah Gibson-Mount Principal Software Engineer Zimbra, Inc
Zimbra :: the leader in open source messaging and collaboration
Hi, I just compiled compiled it with the option --enable-memberof, but the memberOf still does not work. My slapd.conf is as follows:
# # See slapd.conf(5) for details on configuration options. # This file should NOT be world readable. # include /usr/local/etc/openldap/schema/core.schema include /usr/local/etc/openldap/schema/cosine.schema include /usr/local/etc/openldap/schema/ad.schema # Define global ACLs to disable default read access.
# Do not enable referrals until AFTER you have a working directory # service AND an understanding of referrals. #referral ldap://root.openldap.org
pidfile /usr/local/var/run/slapd.pid argsfile /usr/local/var/run/slapd.args
# Load dynamic backend modules: # modulepath /usr/local/libexec/openldap # moduleload back_bdb.la # moduleload back_hdb.la # moduleload back_ldap.la moduleload memberof.la # Sample security restrictions # Require integrity protection (prevent hijacking) # Require 112-bit (3DES or better) encryption for updates # Require 63-bit encryption for simple bind # security ssf=1 update_ssf=112 simple_bind=64
# Sample access control policy: # Root DSE: allow anyone to read it # Subschema (sub)entry DSE: allow anyone to read it # Other DSEs: # Allow self write access # Allow authenticated users read access # Allow anonymous users to authenticate # Directives needed to implement policy: # access to dn.base="" by * read # access to dn.base="cn=Subschema" by * read # access to * # by self write # by users read # by anonymous auth # # if no access controls are present, the default policy # allows anyone and everyone to read anything but restricts # updates to rootdn. (e.g., "access to * by * read") # # rootdn can always read and write EVERYTHING!
####################################################################### # BDB database definitions #######################################################################
database bdb suffix "dc=eco,dc=spb,dc=com" rootdn "cn=Manager,dc=eco,dc=spb,dc=com"
# Cleartext passwords, especially for the rootdn, should # be avoid. See slappasswd(8) and slapd.conf(5) for details. # Cleartext passwords, especially for the rootdn, should # be avoid. See slappasswd(8) and slapd.conf(5) for details. # Use of strong authentication encouraged.
rootpw secret
# The database directory MUST exist prior to running slapd AND # should only be accessible by the slapd and slap tools. # Mode 700 recommended. directory /usr/local/var/openldap-data # Indices to maintain index objectClass eq
overlay memberof
And the LDIF
# LDIF fragment to create group branch under root dn: ou=groups,dc=eco,dc=spb,dc=com objectclass:organizationalunit ou: groups description: generic groups branch
# LDIF fragment to create group branch under root dn: ou=External Users,dc=eco,dc=spb,dc=com objectclass:organizationalunit ou: External Users description: generic groups branch
# create the itpeople entry
dn: cn=Javier Lopez,ou=External Users,dc=eco,dc=spb,dc=com cn: Javier Lopez objectClass: person mail: jlmagc@gmail.com sn: Lopez userPassword: miami123
dn: cn=ECO External User,ou=groups,dc=eco,dc=spb,dc=com cn: ECO External User objectclass: groupofnames description: IT security group # add the group members all of which are # assumed to exist under people member: cn=Javier Lopez,ou=External Users,dc=eco,dc=spb,dc=com
but it doen't show the memberOf. Any Inde what I'm doing wrong?
TIA
Jose
2011/5/16 JOSE L MARTINEZ-AVIAL jlmagc@gmail.com
Never mind, I just need to compile it using ./configure --enable-memberof, and that solved the problem.
Thanks!
2011/5/16 Quanah Gibson-Mount quanah@zimbra.com
--On May 16, 2011 6:17:37 PM -0400 JOSE L MARTINEZ-AVIAL < jlmagc@gmail.com> wrote:
I did that, and the problem is that I compiled openldap without enabling
the modules. The issue now is that it fails to compile when I enable the modules because libtools-ldtd is not installed, and that seems to be related with the fact the I use RHEL4, which doesn't include that library.
So download and build it yourself. ;)
--Quanah
-- Quanah Gibson-Mount Principal Software Engineer Zimbra, Inc
Zimbra :: the leader in open source messaging and collaboration
openldap-technical@openldap.org