charanya-devise_ldap_authenticatable 0.4.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (94) hide show
  1. data/.gitignore +6 -0
  2. data/MIT-LICENSE +20 -0
  3. data/README.md +175 -0
  4. data/Rakefile +54 -0
  5. data/VERSION +1 -0
  6. data/charanya-devise_ldap_authenticatable.gemspec +173 -0
  7. data/lib/devise_ldap_authenticatable.rb +45 -0
  8. data/lib/devise_ldap_authenticatable/exception.rb +6 -0
  9. data/lib/devise_ldap_authenticatable/ldap_adapter.rb +237 -0
  10. data/lib/devise_ldap_authenticatable/logger.rb +11 -0
  11. data/lib/devise_ldap_authenticatable/model.rb +118 -0
  12. data/lib/devise_ldap_authenticatable/routes.rb +8 -0
  13. data/lib/devise_ldap_authenticatable/schema.rb +14 -0
  14. data/lib/devise_ldap_authenticatable/strategy.rb +36 -0
  15. data/lib/devise_ldap_authenticatable/version.rb +4 -0
  16. data/lib/generators/devise_ldap_authenticatable/install_generator.rb +61 -0
  17. data/lib/generators/devise_ldap_authenticatable/templates/ldap.yml +75 -0
  18. data/rails/init.rb +2 -0
  19. data/test/devise_ldap_authenticatable_test.rb +8 -0
  20. data/test/ldap/base.ldif +73 -0
  21. data/test/ldap/clear.ldif +26 -0
  22. data/test/ldap/local.schema +6 -0
  23. data/test/ldap/run-server.sh +10 -0
  24. data/test/ldap/server.pem +38 -0
  25. data/test/ldap/slapd-ssl-test.conf +107 -0
  26. data/test/ldap/slapd-test.conf +107 -0
  27. data/test/rails_app/Gemfile +22 -0
  28. data/test/rails_app/Gemfile.lock +157 -0
  29. data/test/rails_app/Rakefile +7 -0
  30. data/test/rails_app/app/controllers/application_controller.rb +4 -0
  31. data/test/rails_app/app/controllers/posts_controller.rb +15 -0
  32. data/test/rails_app/app/helpers/application_helper.rb +2 -0
  33. data/test/rails_app/app/helpers/posts_helper.rb +2 -0
  34. data/test/rails_app/app/models/post.rb +2 -0
  35. data/test/rails_app/app/models/user.rb +10 -0
  36. data/test/rails_app/app/views/layouts/application.html.erb +26 -0
  37. data/test/rails_app/app/views/posts/index.html.erb +2 -0
  38. data/test/rails_app/config.ru +4 -0
  39. data/test/rails_app/config/application.rb +46 -0
  40. data/test/rails_app/config/boot.rb +13 -0
  41. data/test/rails_app/config/cucumber.yml +8 -0
  42. data/test/rails_app/config/database.yml +25 -0
  43. data/test/rails_app/config/environment.rb +5 -0
  44. data/test/rails_app/config/environments/development.rb +22 -0
  45. data/test/rails_app/config/environments/production.rb +46 -0
  46. data/test/rails_app/config/environments/test.rb +34 -0
  47. data/test/rails_app/config/initializers/backtrace_silencers.rb +7 -0
  48. data/test/rails_app/config/initializers/devise.rb +140 -0
  49. data/test/rails_app/config/initializers/inflections.rb +10 -0
  50. data/test/rails_app/config/initializers/mime_types.rb +5 -0
  51. data/test/rails_app/config/initializers/secret_token.rb +7 -0
  52. data/test/rails_app/config/initializers/session_store.rb +8 -0
  53. data/test/rails_app/config/ldap.yml +22 -0
  54. data/test/rails_app/config/ldap_with_erb.yml +23 -0
  55. data/test/rails_app/config/ldap_with_uid.yml +18 -0
  56. data/test/rails_app/config/locales/devise.en.yml +39 -0
  57. data/test/rails_app/config/locales/en.yml +5 -0
  58. data/test/rails_app/config/routes.rb +64 -0
  59. data/test/rails_app/config/ssl_ldap.yml +21 -0
  60. data/test/rails_app/config/ssl_ldap_with_erb.yml +23 -0
  61. data/test/rails_app/config/ssl_ldap_with_uid.yml +18 -0
  62. data/test/rails_app/db/migrate/20100708120302_create_posts.rb +14 -0
  63. data/test/rails_app/db/migrate/20100708120448_devise_create_users.rb +26 -0
  64. data/test/rails_app/db/schema.rb +42 -0
  65. data/test/rails_app/db/seeds.rb +7 -0
  66. data/test/rails_app/features/manage_logins.feature +35 -0
  67. data/test/rails_app/features/step_definitions/login_steps.rb +21 -0
  68. data/test/rails_app/features/step_definitions/web_steps.rb +219 -0
  69. data/test/rails_app/features/support/env.rb +58 -0
  70. data/test/rails_app/features/support/paths.rb +38 -0
  71. data/test/rails_app/lib/tasks/.gitkeep +0 -0
  72. data/test/rails_app/lib/tasks/cucumber.rake +53 -0
  73. data/test/rails_app/public/404.html +26 -0
  74. data/test/rails_app/public/422.html +26 -0
  75. data/test/rails_app/public/500.html +26 -0
  76. data/test/rails_app/public/images/rails.png +0 -0
  77. data/test/rails_app/public/javascripts/application.js +2 -0
  78. data/test/rails_app/public/javascripts/controls.js +965 -0
  79. data/test/rails_app/public/javascripts/dragdrop.js +974 -0
  80. data/test/rails_app/public/javascripts/effects.js +1123 -0
  81. data/test/rails_app/public/javascripts/prototype.js +4874 -0
  82. data/test/rails_app/public/javascripts/rails.js +118 -0
  83. data/test/rails_app/public/stylesheets/.gitkeep +0 -0
  84. data/test/rails_app/script/cucumber +10 -0
  85. data/test/rails_app/script/rails +6 -0
  86. data/test/rails_app/test/factories/users.rb +14 -0
  87. data/test/rails_app/test/functional/posts_controller_test.rb +58 -0
  88. data/test/rails_app/test/performance/browsing_test.rb +9 -0
  89. data/test/rails_app/test/test_helper.rb +36 -0
  90. data/test/rails_app/test/unit/helpers/posts_helper_test.rb +4 -0
  91. data/test/rails_app/test/unit/post_test.rb +4 -0
  92. data/test/rails_app/test/unit/user_test.rb +211 -0
  93. data/test/test_helper.rb +3 -0
  94. metadata +217 -0
@@ -0,0 +1,75 @@
1
+ ## Authorizations
2
+ # Uncomment out the merging for each enviornment that you'd like to include.
3
+ # You can also just copy and paste the tree (do not include the "authorizations") to each
4
+ # enviornment if you need something different per enviornment.
5
+ authorizations: &AUTHORIZATIONS
6
+ group_base: ou=groups,dc=test,dc=com
7
+ ## Requires config.ldap_check_group_membership in devise.rb be true
8
+ # Can have multiple values, must match all to be authorized
9
+ required_groups:
10
+ # If only a group name is given, membership will be checked against "uniqueMember"
11
+ - cn=admins,ou=groups,dc=test,dc=com
12
+ - cn=users,ou=groups,dc=test,dc=com
13
+ # If an array is given, the first element will be the attribute to check against, the second the group name
14
+ - ["moreMembers", "cn=users,ou=groups,dc=test,dc=com"]
15
+ ## Requires config.ldap_check_attributes in devise.rb to be true
16
+ ## Can have multiple attributes and values, must match all to be authorized
17
+ require_attribute:
18
+ objectClass: inetOrgPerson
19
+ authorizationRole: postsAdmin
20
+
21
+ # Application specific attributes and changes.
22
+
23
+ #attribute: => attribute of the ldap
24
+ #attribute_to_compare => attribute of the ldap with which the knome specific field should be compared.
25
+ #attributes_to_persist => attributes that need to be fed to the user table from ldap
26
+
27
+ ## Enviornments
28
+
29
+ development:
30
+ host: localhost
31
+ port: 389
32
+ attribute: cn
33
+ base: ou=people,dc=test,dc=com
34
+ #admin_user: cn=admin,dc=test,dc=com
35
+ #admin_password: admin_password
36
+ #attribute: mail
37
+ #attribute_to_compare: mail
38
+ #attributes_to_persist:
39
+ #- ["mail", "email"]
40
+ #- ["givenName", "first_name"]
41
+ #- ["sn", "last_name"]
42
+ ssl: false
43
+ # <<: *AUTHORIZATIONS
44
+
45
+ test:
46
+ host: localhost
47
+ port: 3389
48
+ attribute: cn
49
+ base: ou=people,dc=test,dc=com
50
+ #admin_user: cn=admin,dc=test,dc=com
51
+ #admin_password: admin_password
52
+ #attribute: mail
53
+ #attribute_to_compare: mail
54
+ #attributes_to_persist:
55
+ #- ["mail", "email"]
56
+ #- ["givenName", "first_name"]
57
+ #- ["sn", "last_name"]
58
+ ssl: false
59
+ # <<: *AUTHORIZATIONS
60
+
61
+ production:
62
+ host: localhost
63
+ port: 636
64
+ attribute: cn
65
+ base: ou=people,dc=test,dc=com
66
+ #admin_user: cn=admin,dc=test,dc=com
67
+ #admin_password: admin_password
68
+ #attribute: mail
69
+ #attribute_to_compare: mail
70
+ #attributes_to_persist:
71
+ #- ["mail", "email"]
72
+ #- ["givenName", "first_name"]
73
+ #- ["sn", "last_name"]
74
+ ssl: true
75
+ # <<: *AUTHORIZATIONS
@@ -0,0 +1,2 @@
1
+ # Include hook code here
2
+ require 'devise_ldap_authenticatable'
@@ -0,0 +1,8 @@
1
+ require 'test_helper'
2
+
3
+ class DeviseLdapAuthenticatableTest < ActiveSupport::TestCase
4
+ # Replace this with your real tests.
5
+ test "the truth" do
6
+ assert true
7
+ end
8
+ end
@@ -0,0 +1,73 @@
1
+ # ldapadd -x -h localhost -p 3389 -D "cn=admin,dc=test,dc=com" -w secret -f base.ldif
2
+
3
+ dn: dc=test,dc=com
4
+ objectClass: dcObject
5
+ objectClass: organizationalUnit
6
+ dc: test
7
+ ou: Test
8
+
9
+ dn: ou=people,dc=test,dc=com
10
+ objectClass: organizationalUnit
11
+ ou: people
12
+
13
+ dn: ou=others,dc=test,dc=com
14
+ objectClass: organizationalUnit
15
+ ou: others
16
+
17
+ dn: ou=groups,dc=test,dc=com
18
+ objectClass: organizationalUnit
19
+ ou: groups
20
+
21
+ # example.user@test.com, people, test.com
22
+ dn: cn=example.user@test.com,ou=people,dc=test,dc=com
23
+ objectClass: inetOrgPerson
24
+ objectClass: authorizations
25
+ sn: User
26
+ uid: example_user
27
+ mail: example.user@test.com
28
+ cn: example.user@test.com
29
+ authorizationRole: blogUser
30
+ userPassword:: e1NTSEF9ZXRYaE9NcjRjOGFiTjlqYUxyczZKSll5MFlaZUF1NURCVWhhY0E9PQ=
31
+ =
32
+
33
+ # other.user@test.com
34
+ dn: cn=other.user@test.com,ou=others,dc=test,dc=com
35
+ objectClass: inetOrgPerson
36
+ objectClass: authorizations
37
+ objectClass: organizationalPerson
38
+ objectClass: person
39
+ objectClass: top
40
+ sn: Other
41
+ uid: other_user
42
+ cn: other.user@test.com
43
+ authorizationRole: blogUser
44
+ userPassword:: e1NIQX1IQXdtdk13RGF1ZUpyZDhwakxXMzZ6Yi9jTUU9
45
+
46
+ # example.admin@test.com, people, test.com
47
+ dn: cn=example.admin@test.com,ou=people,dc=test,dc=com
48
+ objectClass: inetOrgPerson
49
+ objectClass: authorizations
50
+ objectClass: organizationalPerson
51
+ objectClass: person
52
+ objectClass: top
53
+ sn: Admin
54
+ uid: example_admin
55
+ cn: example.admin@test.com
56
+ authorizationRole: blogAdmin
57
+ userPassword:: e1NIQX0wcUNXaERISGFwWmc3ekJxZWRRanBzNW1EUDA9
58
+
59
+ # users, groups, test.com
60
+ dn: cn=users,ou=groups,dc=test,dc=com
61
+ objectClass: authorizations
62
+ objectClass: groupOfUniqueNames
63
+ objectClass: top
64
+ uniqueMember: cn=example.user@test.com,ou=people,dc=test,dc=com
65
+ authorizationRole: cn=example.admin@test.com,ou=people,dc=test,dc=com
66
+ cn: users
67
+
68
+ # users, groups, test.com
69
+ dn: cn=admins,ou=groups,dc=test,dc=com
70
+ objectClass: groupOfUniqueNames
71
+ objectClass: top
72
+ uniqueMember: cn=example.admin@test.com,ou=people,dc=test,dc=com
73
+ cn: admins
@@ -0,0 +1,26 @@
1
+ dn: cn=admins,ou=groups,dc=test,dc=com
2
+ changetype: delete
3
+
4
+ dn: cn=users,ou=groups,dc=test,dc=com
5
+ changetype: delete
6
+
7
+ dn: cn=example.admin@test.com,ou=people,dc=test,dc=com
8
+ changetype: delete
9
+
10
+ dn: cn=example.user@test.com,ou=people,dc=test,dc=com
11
+ changetype: delete
12
+
13
+ dn: cn=other.user@test.com,ou=others,dc=test,dc=com
14
+ changetype: delete
15
+
16
+ dn: ou=groups,dc=test,dc=com
17
+ changetype: delete
18
+
19
+ dn: ou=people,dc=test,dc=com
20
+ changetype: delete
21
+
22
+ dn: ou=others,dc=test,dc=com
23
+ changetype: delete
24
+
25
+ dn: dc=test,dc=com
26
+ changetype: delete
@@ -0,0 +1,6 @@
1
+ attributetype ( 1.1.2.2.5 NAME 'authorizationRole' SUP name )
2
+
3
+ objectclass ( 1.1.2.2.1 NAME 'authorizations'
4
+ DESC 'mixin authorizations'
5
+ AUXILIARY
6
+ MAY authorizationRole )
@@ -0,0 +1,10 @@
1
+ #!/usr/bin/env bash
2
+
3
+ ## For OSX:
4
+ PATH=$PATH:/usr/libexec
5
+
6
+ if [[ $1 == "--ssl" ]]; then
7
+ slapd -d 1 -f slapd-ssl-test.conf -h ldaps://localhost:3389
8
+ else
9
+ slapd -d 1 -f slapd-test.conf -h ldap://localhost:3389
10
+ fi
@@ -0,0 +1,38 @@
1
+ -----BEGIN RSA PRIVATE KEY-----
2
+ MIICXQIBAAKBgQC/hxFetCTh++3sEwchxuscH5TID0Wj2S/heBjY6RuK5rPrAcUg
3
+ rA7jFEFilEQYpfGe3LIMBkr5pP4aR1NrLuvKZaHuBvRLwOcU7SbuFQ3FQLaJA3UK
4
+ E2IOH9wMg1BMcG1WbzB1nKc650omKo7KqOAIYFFVq3gzlDRUmHF6dCAnvwIDAQAB
5
+ AoGAcOBJfGbu1cCEF/2e1mlFZu214bIeeNInRdphynSXpuUQZBBG/Vpp66qkXlTD
6
+ TUN/gwDObgfHaBm1KAehQioFC9ys1Iymlt8IeRYXH9Tkl7URe30QGAGjdIPohWpZ
7
+ xl/aMrpQVvQukaStRNoJXA32j+tuR2KbxAK6bu9iLzXvCQECQQD6AOzHVDB06ZjF
8
+ iJYB1/CyZBg0Q2aIOwGXwle1t1O7q6nJ6UWkurQF/inBdJdE5SWNEzYsI1tEP0n2
9
+ 1ZBIWQxtAkEAxB8WgFjRqYdmUYGQ1k8yxMUTLbZFd6t2UZyB/LAw9CtjH9lrU0z9
10
+ 81UK/ywVHkoDDPHbFyvd1jludqbz+suRWwJBAPEL9UCXfwUquf8zm5b5cv09n0y8
11
+ 895ELlv5qQHvWg+oC1Q/08NptOvWTMJXPQbTfepQ7LmP+Y6LCzCwZ6YqHd0CQFiW
12
+ flB9Tj9YhNQ+RVE4twMAzhfw5FIY5joZCvI8F/DDBGRnjj4zYeafPHdkzyk+X0Bi
13
+ owdFblAM4yO/aCeZ+k8CQQDdBi+WnpaaSL0NXmAb6+7aQRZ/Gc2O9S2JL/Fxw4EQ
14
+ i7KTRdH/d6Db9SeQEc/uCbJW7fM4KbZcjFdncHFytakt
15
+ -----END RSA PRIVATE KEY-----
16
+ -----BEGIN CERTIFICATE-----
17
+ MIIDwjCCAyugAwIBAgIJAP+plC/uCHKkMA0GCSqGSIb3DQEBBQUAMIGdMQswCQYD
18
+ VQQGEwJVUzERMA8GA1UECBMIVmlyZ2luaWExEzARBgNVBAcTCkFsZXhhbmRyaWEx
19
+ DTALBgNVBAoTBFRlc3QxDTALBgNVBAsTBFRlc3QxJDAiBgNVBAMUG2RldmlzZV9s
20
+ ZGFwX2F1dGhlbnRpY2F0YWJsZTEiMCAGCSqGSIb3DQEJARYTZHBtY25ldmluQGdt
21
+ YWlsLmNvbTAeFw0xMDA4MDUyMTU1MDVaFw0xMTA4MDUyMTU1MDVaMIGdMQswCQYD
22
+ VQQGEwJVUzERMA8GA1UECBMIVmlyZ2luaWExEzARBgNVBAcTCkFsZXhhbmRyaWEx
23
+ DTALBgNVBAoTBFRlc3QxDTALBgNVBAsTBFRlc3QxJDAiBgNVBAMUG2RldmlzZV9s
24
+ ZGFwX2F1dGhlbnRpY2F0YWJsZTEiMCAGCSqGSIb3DQEJARYTZHBtY25ldmluQGdt
25
+ YWlsLmNvbTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAv4cRXrQk4fvt7BMH
26
+ IcbrHB+UyA9Fo9kv4XgY2Okbiuaz6wHFIKwO4xRBYpREGKXxntyyDAZK+aT+GkdT
27
+ ay7rymWh7gb0S8DnFO0m7hUNxUC2iQN1ChNiDh/cDINQTHBtVm8wdZynOudKJiqO
28
+ yqjgCGBRVat4M5Q0VJhxenQgJ78CAwEAAaOCAQYwggECMB0GA1UdDgQWBBRcCNxq
29
+ 0PNXgMfYN2RQ2uIrBY03ADCB0gYDVR0jBIHKMIHHgBRcCNxq0PNXgMfYN2RQ2uIr
30
+ BY03AKGBo6SBoDCBnTELMAkGA1UEBhMCVVMxETAPBgNVBAgTCFZpcmdpbmlhMRMw
31
+ EQYDVQQHEwpBbGV4YW5kcmlhMQ0wCwYDVQQKEwRUZXN0MQ0wCwYDVQQLEwRUZXN0
32
+ MSQwIgYDVQQDFBtkZXZpc2VfbGRhcF9hdXRoZW50aWNhdGFibGUxIjAgBgkqhkiG
33
+ 9w0BCQEWE2RwbWNuZXZpbkBnbWFpbC5jb22CCQD/qZQv7ghypDAMBgNVHRMEBTAD
34
+ AQH/MA0GCSqGSIb3DQEBBQUAA4GBABjztpAgr6QxVCNxhgklrILH+RLxww3dgdra
35
+ J6C6pXl9lbM+XIWiUtzD3Y8z2+tkJtjWCCN7peM2OYFvdChIvRz8XoxHqNB9W8wj
36
+ xZOqBHN8MdI1g6PCD5Z8lK1TDvchTeskqCulE6tMHKaslByhfZS94uWY+NG5JY/Z
37
+ traWmtWh
38
+ -----END CERTIFICATE-----
@@ -0,0 +1,107 @@
1
+ #
2
+ # See slapd.conf(5) for details on configuration options.
3
+ # This file should NOT be world readable.
4
+ #
5
+ include /etc/openldap/schema/core.schema
6
+ include /etc/openldap/schema/cosine.schema
7
+ include /etc/openldap/schema/inetorgperson.schema
8
+ include /etc/openldap/schema/nis.schema
9
+
10
+ ## Local definitions
11
+ # include /etc/openldap/schema/local.schema
12
+ include local.schema
13
+
14
+ # Allow LDAPv2 client connections. This is NOT the default.
15
+ allow bind_v2
16
+
17
+ # Do not enable referrals until AFTER you have a working directory
18
+ # service AND an understanding of referrals.
19
+ #referral ldap://root.openldap.org
20
+
21
+ pidfile openldap-data/run/slapd.pid
22
+ argsfile openldap-data/run/slapd.args
23
+
24
+ # Load dynamic backend modules:
25
+ modulepath /usr/lib/openldap
26
+
27
+ # modules available in openldap-servers-overlays RPM package:
28
+ # moduleload accesslog.la
29
+ # moduleload auditlog.la
30
+ # moduleload denyop.la
31
+ # moduleload dyngroup.la
32
+ # moduleload dynlist.la
33
+ # moduleload lastmod.la
34
+ # moduleload pcache.la
35
+ # moduleload ppolicy.la
36
+ # moduleload refint.la
37
+ # moduleload retcode.la
38
+ # moduleload rwm.la
39
+ # moduleload smbk5pwd.la
40
+ # moduleload syncprov.la
41
+ # moduleload translucent.la
42
+ # moduleload unique.la
43
+ # moduleload valsort.la
44
+
45
+ # modules available in openldap-servers-sql RPM package:
46
+ # moduleload back_sql.la
47
+
48
+ # The next three lines allow use of TLS for encrypting connections using a
49
+ # dummy test certificate which you can generate by changing to
50
+ # /etc/pki/tls/certs, running "make slapd.pem", and fixing permissions on
51
+ # slapd.pem so that the ldap user or group can read it. Your client software
52
+ # may balk at self-signed certificates, however.
53
+
54
+ ## For LDAPS
55
+ TLSCACertificateFile server.pem
56
+ TLSCertificateFile server.pem
57
+ TLSCertificateKeyFile server.pem
58
+
59
+ # TLSVerifyClient never
60
+
61
+ # Sample security restrictions
62
+ # Require integrity protection (prevent hijacking)
63
+ # Require 112-bit (3DES or better) encryption for updates
64
+ # Require 63-bit encryption for simple bind
65
+ # security ssf=1 update_ssf=112 simple_bind=64
66
+
67
+ # Sample access control policy:
68
+ # Root DSE: allow anyone to read it
69
+ # Subschema (sub)entry DSE: allow anyone to read it
70
+ # Other DSEs:
71
+ # Allow self write access
72
+ # Allow authenticated users read access
73
+ # Allow anonymous users to authenticate
74
+ # Directives needed to implement policy:
75
+
76
+ # access to dn.base="dc=esc" by * read
77
+ # access to dn.base="cn=Subschema" by * read
78
+ access to *
79
+ by self write
80
+ by * read
81
+ by anonymous auth
82
+
83
+ #
84
+ # if no access controls are present, the default policy
85
+ # allows anyone and everyone to read anything but restricts
86
+ # updates to rootdn. (e.g., "access to * by * read")
87
+ #
88
+ # rootdn can always read and write EVERYTHING!
89
+
90
+ #######################################################################
91
+ # ldbm and/or bdb database definitions
92
+ #######################################################################
93
+
94
+ database bdb
95
+
96
+ suffix "dc=test,dc=com"
97
+ directory openldap-data
98
+ rootdn "cn=admin,dc=test,dc=com"
99
+ ## rootpw = secret
100
+ rootpw {SSHA}fFjKcZb4cfOAcwSjJer8nCGOEVRUnwCC
101
+
102
+ # Indices to maintain for this database
103
+ index objectClass eq,pres
104
+ index ou,cn,mail,surname,givenname eq,pres,sub
105
+ index uidNumber,gidNumber,loginShell eq,pres
106
+ index uid,memberUid eq,pres,sub
107
+ index nisMapName,nisMapEntry eq,pres,sub
@@ -0,0 +1,107 @@
1
+ #
2
+ # See slapd.conf(5) for details on configuration options.
3
+ # This file should NOT be world readable.
4
+ #
5
+ include /etc/openldap/schema/core.schema
6
+ include /etc/openldap/schema/cosine.schema
7
+ include /etc/openldap/schema/inetorgperson.schema
8
+ include /etc/openldap/schema/nis.schema
9
+
10
+ ## Local definitions
11
+ # include /etc/openldap/schema/local.schema
12
+ include local.schema
13
+
14
+ # Allow LDAPv2 client connections. This is NOT the default.
15
+ allow bind_v2
16
+
17
+ # Do not enable referrals until AFTER you have a working directory
18
+ # service AND an understanding of referrals.
19
+ #referral ldap://root.openldap.org
20
+
21
+ pidfile openldap-data/run/slapd.pid
22
+ argsfile openldap-data/run/slapd.args
23
+
24
+ # Load dynamic backend modules:
25
+ modulepath /usr/lib/openldap
26
+
27
+ # modules available in openldap-servers-overlays RPM package:
28
+ # moduleload accesslog.la
29
+ # moduleload auditlog.la
30
+ # moduleload denyop.la
31
+ # moduleload dyngroup.la
32
+ # moduleload dynlist.la
33
+ # moduleload lastmod.la
34
+ # moduleload pcache.la
35
+ # moduleload ppolicy.la
36
+ # moduleload refint.la
37
+ # moduleload retcode.la
38
+ # moduleload rwm.la
39
+ # moduleload smbk5pwd.la
40
+ # moduleload syncprov.la
41
+ # moduleload translucent.la
42
+ # moduleload unique.la
43
+ # moduleload valsort.la
44
+
45
+ # modules available in openldap-servers-sql RPM package:
46
+ # moduleload back_sql.la
47
+
48
+ # The next three lines allow use of TLS for encrypting connections using a
49
+ # dummy test certificate which you can generate by changing to
50
+ # /etc/pki/tls/certs, running "make slapd.pem", and fixing permissions on
51
+ # slapd.pem so that the ldap user or group can read it. Your client software
52
+ # may balk at self-signed certificates, however.
53
+
54
+ # ## For LDAPS
55
+ # TLSCACertificateFile server.pem
56
+ # TLSCertificateFile server.pem
57
+ # TLSCertificateKeyFile server.pem
58
+ #
59
+ # TLSVerifyClient demand
60
+
61
+ # Sample security restrictions
62
+ # Require integrity protection (prevent hijacking)
63
+ # Require 112-bit (3DES or better) encryption for updates
64
+ # Require 63-bit encryption for simple bind
65
+ # security ssf=1 update_ssf=112 simple_bind=64
66
+
67
+ # Sample access control policy:
68
+ # Root DSE: allow anyone to read it
69
+ # Subschema (sub)entry DSE: allow anyone to read it
70
+ # Other DSEs:
71
+ # Allow self write access
72
+ # Allow authenticated users read access
73
+ # Allow anonymous users to authenticate
74
+ # Directives needed to implement policy:
75
+
76
+ # access to dn.base="dc=esc" by * read
77
+ # access to dn.base="cn=Subschema" by * read
78
+ access to *
79
+ by self write
80
+ by * read
81
+ by anonymous auth
82
+
83
+ #
84
+ # if no access controls are present, the default policy
85
+ # allows anyone and everyone to read anything but restricts
86
+ # updates to rootdn. (e.g., "access to * by * read")
87
+ #
88
+ # rootdn can always read and write EVERYTHING!
89
+
90
+ #######################################################################
91
+ # ldbm and/or bdb database definitions
92
+ #######################################################################
93
+
94
+ database bdb
95
+
96
+ suffix "dc=test,dc=com"
97
+ directory openldap-data
98
+ rootdn "cn=admin,dc=test,dc=com"
99
+ ## rootpw = secret
100
+ rootpw {SSHA}fFjKcZb4cfOAcwSjJer8nCGOEVRUnwCC
101
+
102
+ # Indices to maintain for this database
103
+ index objectClass eq,pres
104
+ index ou,cn,mail,surname,givenname eq,pres,sub
105
+ index uidNumber,gidNumber,loginShell eq,pres
106
+ index uid,memberUid eq,pres,sub
107
+ index nisMapName,nisMapEntry eq,pres,sub