[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: ACL or a default deny policy



Olivier Nicole <on@cs.ait.ac.th> writes:

> Hi,
>
> I am implementing a directory with OPENLdap and I woul dlike that
> anonymous users could only read ceratin attributes, while all other
> attributes are accessible to authenticated users only.
>
> # ACL 1: Data that the user can change and that the world can see
> access to dn.one="ou=People,ou=csim,dc=cs,dc=ait,dc=ac,dc=th" 
>        attrs=sn,givenName
>    by group="cn=groupadmin..." write
>    by self write
>    by * read
>
> # ACL 2: Personnal data, that user can change and the world can not see
> access to dn.one="ou=People,ou=csim,dc=cs,dc=ait,dc=ac,dc=th" 
> 	attrs=gecos,description
>    by group="cn=groupadmin..." write
>    by self write
>    by * none
>
> # ACL 3: any attributes that is not explcitely allowed above is denied
> access to dn.one="ou=People,ou=csim,dc=cs,dc=ait,dc=ac,dc=th"
>    by group="cn=groupadmin..." write
>    by dn.subtree="ou=csim,dc=cs,dc=ait,dc=ac,dc=th" read
>    by * none
>
> But this is not working. If I do like this, anonymous search will see
> nothing from the user.
>
> I found out some where that the attribute objectClass should always be exposed, so I tried to add it in the ACL 1, but that is not working either, I must haave a last ACL of the form 
>
>
> access to dn.one="ou=People,ou=csim,dc=cs,dc=ait,dc=ac,dc=th"
>    by group="cn=groupadmin..." write
>    by dn.subtree="ou=csim,dc=cs,dc=ait,dc=ac,dc=th" read
>    by * read
>
> and I don't see where my reasoning is getting wrong.

The pseudo attributes entry and children of the leafnode
ou=people,... are not accessible.
Run slapd in debugging mode acl to watch access control parsing.

-Dieter

-- 
Dieter Klünter | Systemberatung
http://www.dkluenter.de
GPG Key ID:8EF7B6C6