⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 slapd-relay.5

📁 ldap服务器源码
💻 5
字号:
.TH SLAPD-RELAY 5 "RELEASEDATE" "OpenLDAP LDVERSION".SH NAMEslapd-relay \- relay backend to slapd.SH SYNOPSISETCDIR/slapd.conf.SH DESCRIPTIONThe primary purpose of this.BR slapd (8)backend is to map a naming context defined in a database running in the same .BR slapd (8)instance into a virtual naming context, with attributeTypeand objectClass manipulation, if required.It requires the.B rwm.BR overlay ..LPThis backend and the above mentioned overlay are experimental..SH CONFIGURATIONThe following.B slapd.confdirectives apply to the relay backend database.That is, they must follow a "database relay" line and come before anysubsequent "backend" or "database" lines.Other database options are described in the.BR slapd.conf (5)manual page; only the.B suffixdirective is required by the .I relaybackend..TP.B relay <real naming context> [massage]The naming context of the database that is presented under a virtual naming context.The presence of this directive implies that one specific database,i.e. the one serving the.BR "real naming context" ,will be presented under a virtual naming context.This directive automatically instantiates the .IR "rwm overlay" .If the optional.B massagekeyword is present, the suffix massaging is automaticallyconfigured as well; otherwise, specific massaging instructionsare required by means of the.I rewritedirectives described in.BR slapo-rwm (5)..SH ACCESS RULESOne important issue is that access rules are based on the identitythat issued the operation.After massaging from the virtual to the real naming context, thefrontend sees the operation as performed by the identity in thereal naming context.Moreover, since.B back-relaybypasses the real database frontend operations by short-circuitingoperations thru the internal backend API, the original databaseaccess rules do not apply but in selected cases, i.e. when thebackend itself applies access control.As a consequence, the instances of the relay database must provideown access rules that are consistent with those of the originaldatabase, possibly adding further specific restrictions.So, access rules in the.B relaydatabase must refer to identities in the real naming context.Examples are reported in the EXAMPLES section..SH SCENARIOS.LPIf no.B relaydirective is given, the .I relaydatabase does not refer to any specific database, but the mostappropriate one is looked-up after rewriting the request DNfor the operation that is being handled..LPThis allows to write carefully crafted rewrite rules thatcause some of the requests to be directed to one database, andsome to another; e.g., authentication can be mapped to one database, and searches to another, or different target databasescan be selected based on the DN of the request, and so..LPAnother possibility is to map the same operation to different databases based on details of the virtual naming context,e.g. groups on one database and persons on another..LP.SH CaveatsThe.B rwm overlayis experimental..LP.SH EXAMPLESTo implement a plain virtual naming context mappingthat refers to a single database, use.LP.nf  database        relay  suffix          "dc=virtual,dc=naming,dc=context"  relay           "dc=real,dc=naming,dc=context" massage.fi.LPTo implement a plain virtual naming context mappingthat looks up the real naming context for each operation, use.LP.nf  database        relay  suffix          "dc=virtual,dc=naming,dc=context"  overlay         rwm  suffixmassage   "dc=real,dc=naming,dc=context".fi.LPThis is useful, for instance, to relay different databases thatshare the terminal portion of the naming context (the one thatis rewritten)..LPTo implement the old-fashioned suffixalias, e.g. mappingthe virtual to the real naming context, but not the resultsback from the real to the virtual naming context, use.LP.nf  database        relay  suffix          "dc=virtual,dc=naming,dc=context"  relay           "dc=real,dc=naming,dc=context"  rewriteEngine   on  rewriteContext  default  rewriteRule     "dc=virtual,dc=naming,dc=context"          "dc=real,dc=naming,dc=context" ":@"  rewriteContext  searchFilter  rewriteContext  searchEntryDN  rewriteContext  searchAttrDN  rewriteContext  matchedDN.fi.LPNote that the virtual database is bound to a single real database,so the .B rwm overlayis automatically instantiated, but the rewrite rules are written explicitly to map all the virtual to real naming context data flow, but none of the real to virtual..LPAccess rules:.LP.nf  database        bdb  suffix          "dc=example,dc=com"  # skip...  access to dn.subtree="dc=example,dc=com"          by dn.exact="cn=Supervisor,dc=example,dc=com" write          by * read  database        relay  suffix          "o=Example,c=US"  relay           "dc=example,dc=com" massage  # skip ...  access to dn.subtree="o=Example,c=US"          by dn.exact="cn=Supervisor,dc=example,dc=com" write          by dn.exact="cn=Relay Supervisor,dc=example,dc=com" write          by * read.fi.LPNote that, in both databases, the identities (the .B <who> clause) are in the.BR "real naming context" ,i.e..BR "`dc=example,dc=com'" ,while the targets (the .B <what> clause) are in the.B realand in the.BR "virtual naming context" ,respectively..SH ACCESS CONTROLThe.B relaybackend does not honor any of the access control semantics described in.BR slapd.access (5);all access control is delegated to the relayed database(s).Only.B read (=r)access to the.B entrypseudo-attribute and to the other attribute values of the entriesreturned by the.B searchoperation is honored, which is performed by the frontend..SH FILES.TPETCDIR/slapd.confdefault slapd configuration file.SH SEE ALSO.BR slapd.conf (5),.BR slapo-rwm (5),.BR slapd (8).

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -