📄 slapd.conf.5
字号:
.TH SLAPD.CONF 5 "RELEASEDATE" "OpenLDAP LDVERSION".\" Copyright 1998-2007 The OpenLDAP Foundation All Rights Reserved..\" Copying restrictions apply. See COPYRIGHT/LICENSE..\" $OpenLDAP: pkg/ldap/doc/man/man5/slapd.conf.5,v 1.191.2.26 2007/01/02 21:43:45 kurt Exp $.SH NAMEslapd.conf \- configuration file for slapd, the stand-alone LDAP daemon.SH SYNOPSISETCDIR/slapd.conf.SH DESCRIPTIONThe file.B ETCDIR/slapd.confcontains configuration information for the.BR slapd (8)daemon. This configuration file is also used by the.BR slurpd (8)replication daemon and by the SLAPD tools.BR slapacl (8),.BR slapadd (8),.BR slapauth (8),.BR slapcat (8),.BR slapdn (8),.BR slapindex (8),and.BR slaptest (8)..LPThe.B slapd.conffile consists of a series of global configuration options that apply to.B slapdas a whole (including all backends), followed by zero or more databasebackend definitions that contain information specific to a backendinstance.The configuration options are case-insensitive;their value, on a case by case basis, may be case-sensitive..LPThe general format of.B slapd.confis as follows:.LP.nf # comment - these options apply to every database <global configuration options> # first database definition & configuration options database <backend 1 type> <configuration options specific to backend 1> # subsequent database definitions & configuration options ....fi.LPAs many backend-specific sections as desired may be included. Globaloptions can be overridden in a backend (for options that appear morethan once, the last appearance in the.B slapd.conffile is used)..LPIf a line begins with white space, it is considered a continuationof the previous line. Blank lines and comment lines beginning witha `#' character are ignored. Note: continuation lines are unwrappedbefore comment processing is applied..LPArguments on configuration lines are separated by white space. If anargument contains white space, the argument should be enclosed indouble quotes. If an argument contains a double quote (`"') or abackslash character (`\\'), the character should be preceded by abackslash character..LPThe specific configuration options available are discussed below in theGlobal Configuration Options, General Backend Options, and General DatabaseOptions. Backend-specific options are discussed in the.B slapd-<backend>(5)manual pages. Refer to the "OpenLDAP Administrator's Guide" for moredetails on the slapd configuration file..SH GLOBAL CONFIGURATION OPTIONSOptions described in this section apply to all backends, unless specifically overridden in a backend definition. Arguments that should be replaced by actual text are shown in brackets <>..TP.B access to <what> "[ by <who> <access> <control> ]+"Grant access (specified by <access>) to a set of entries and/orattributes (specified by <what>) by one or more requestors (specifiedby <who>).If no access controls are present, the default policyallows anyone and everyone to read anything but restrictsupdates to rootdn. (e.g., "access to * by * read").The rootdn can always read and write EVERYTHING!See.BR slapd.access (5)and the "OpenLDAP's Administrator's Guide" for details..TP.B allow <features>Specify a set of features (separated by white space) toallow (default none)..B bind_v2allows acceptance of LDAPv2 bind requests. Note that.BR slapd (8)does not truly implement LDAPv2 (RFC 1777), now Historic (RFC 3494)..B bind_anon_credallows anonymous bind when credentials are not empty (e.g.when DN is empty)..B bind_anon_dnallows unauthenticated (anonymous) bind when DN is not empty..B update_anonallows unauthenticated (anonymous) update operations to be processed(subject to access controls and other administrative limits)..TP.B argsfile <filename>The ( absolute ) name of a file that will hold the .B slapdserver's command line optionsif started without the debugging command line option..TP.B attributeoptions [option-name]...Define tagging attribute options or option tag/range prefixes.Options must not end with `-', prefixes must end with `-'.The `lang-' prefix is predefined.If you use the.B attributeoptionsdirective, `lang-' will no longer be defined and you must specify itexplicitly if you want it defined.An attribute description with a tagging option is a subtype of thatattribute description without the option.Except for that, options defined this way have no special semantics.Prefixes defined this way work like the `lang-' options:They define a prefix for tagging options starting with the prefix.That is, if you define the prefix `x-foo-', you can use the option`x-foo-bar'.Furthermore, in a search or compare, a prefix or range name (witha trailing `-') matches all options starting with that name, as wellas the option with the range name sans the trailing `-'.That is, `x-foo-bar-' matches `x-foo-bar' and `x-foo-bar-baz'.RFC 4520 reserves options beginning with `x-' for private experiments.Other options should be registered with IANA, see RFC 4520 section 3.5.OpenLDAP also has the `binary' option built in, but this is a transferoption, not a tagging option..HP.hy 0.B attributetype "(\ <oid>\ [NAME\ <name>]\ [DESC\ <description>]\ [OBSOLETE]\ [SUP\ <oid>]\ [EQUALITY\ <oid>]\ [ORDERING\ <oid>]\ [SUBSTR\ <oid>]\ [SYNTAX\ <oidlen>]\ [SINGLE\-VALUE]\ [COLLECTIVE]\ [NO\-USER\-MODIFICATION]\ [USAGE\ <attributeUsage>]\ )".RSSpecify an attribute type using the LDAPv3 syntax defined in RFC 4512.The slapd parser extends the RFC 4512 definition by allowing stringforms as well as numeric OIDs to be used for the attribute OID andattribute syntax OID.(See the.B objectidentifierdescription.) .RE.TP.B authz-policy <policy>Used to specify which rules to use for Proxy Authorization. Proxyauthorization allows a client to authenticate to the server using oneuser's credentials, but specify a different identity to use for authorizationand access control purposes. It essentially allows user A to login as userB, using user A's password.The.B noneflag disables proxy authorization. This is the default setting.The.B fromflag will use rules in the.I authzFromattribute of the authorization DN.The.B toflag will use rules in the.I authzToattribute of the authentication DN.The.B anyflag, an alias for the deprecated value of.BR both ,will allow any of the above, whatever succeeds first (checked in.BR to ,.B fromsequence.The.B allflag requires both authorizations to succeed..LP.RSThe rules are mechanisms to specify which identities are allowed to perform proxy authorization.The.I authzFromattribute in an entry specifies which other usersare allowed to proxy login to this entry. The.I authzToattribute inan entry specifies which other users this user can authorize as. Use of.I authzTorules can be easilyabused if users are allowed to write arbitrary values to this attribute.In general the.I authzToattribute must be protected with ACLs such thatonly privileged users can modify it.The value of.I authzFromand.I authzTodescribes an .B identity or a set of identities; it can take five forms:.RS.TP.B ldap:///<base>??[<scope>]?<filter>.RE.RS.B dn[.<dnstyle>]:<pattern>.RE.RS.B u[<mech>[<realm>]]:<pattern>.RE.RS.B group[/objectClass[/attributeType]]:<pattern>.RE.RS.B <pattern>.RE.RS.B <dnstyle>:={exact|onelevel|children|subtree|regex}.REThe first form is a valid LDAP.B URIwhere the .IR <host>:<port> ,the.I <attrs>and the.I <extensions>portions must be absent, so that the search occurs locally on either.I authzFromor .IR authzTo .The second form is a .BR DN ,with the optional style modifiers.IR exact ,.IR onelevel ,.IR children ,and.I subtreefor exact, onelevel, children and subtree matches, which cause .I <pattern>to be normalized according to the DN normalization rules, or the special.I regexstyle, which causes the.I <pattern>to be treated as a POSIX (''extended'') regular expression, asdiscussed in.BR regex (7)and/or.BR re_format (7).A pattern of.I *means any non-anonymous DN.The third form is a SASL.BR id ,with the optional fields.I <mech>and.I <realm>that allow to specify a SASL.BR mechanism ,and eventually a SASL.BR realm ,for those mechanisms that support one.The need to allow the specification of a mechanism is still debated, and users are strongly discouraged to rely on this possibility.The fourth form is a group specification, consisting of the keyword.BR group ,optionally followed by the specification of the group.B objectClassand member.BR attributeType .The group with DN.B <pattern>is searched with base scope, and in case of match, the values of themember.B attributeTypeare searched for the asserted DN.For backwards compatibility, if no identity type is provided, i.e. only.B <pattern>is present, an.I exact DNis assumed; as a consequence, .B <pattern>is subjected to DN normalization.Since the interpretation of.I authzFromand.I authzTocan impact security, users are strongly encouraged to explicitly set the type of identity specification that is being used.A subset of these rules can be used as third arg in the .B authz-regexpstatement (see below); significantly, the .I URIand the.I dn.exact:<dn> forms..RE.TP.B authz-regexp <match> <replace>Used by the authentication framework to convert simple user names,such as provided by SASL subsystem, to an LDAP DN used forauthorization purposes. Note that the resultant DN need not referto an existing entry to be considered valid. When an authorizationrequest is received from the SASL subsystem, the SASL .BR USERNAME ,.BR REALM , and.B MECHANISMare taken, when available, and combined into a name of the form.RS.RS.TP.B UID=<username>[[,CN=<realm>],CN=<mechanism>],CN=auth.REThis name is then compared against the.B matchPOSIX (''extended'') regular expression, and if the match is successful,the name is replaced with the.B replacestring. If there are wildcard strings in the .B matchregular expression that are enclosed in parenthesis, e.g. .RS.TP.B UID=([^,]*),CN=.*.REthen the portion of the name that matched the wildcard will be storedin the numbered placeholder variable $1. If there are other wildcard stringsin parenthesis, the matching strings will be in $2, $3, etc. up to $9. The placeholders can then be used in the .B replacestring, e.g. .RS.TP.B UID=$1,OU=Accounts,DC=example,DC=com .REThe replaced name can be either a DN, i.e. a string prefixed by "dn:",or an LDAP URI.If the latter, the server will use the URI to search its own database(s)and, if the search returns exactly one entry, the name isreplaced by the DN of that entry. The LDAP URI must have nohostport, attrs, or extensions components, but the filter is mandatory,e.g..RS.TP.B ldap:///OU=Accounts,DC=example,DC=com??one?(UID=$1).REThe protocol portion of the URI must be strictly.BR ldap .Note that this search is subject to access controls. Specifically,the authentication identity must have "auth" access in the subject.Multiple .B authz-regexp options can be given in the configuration file to allow for multiple matching and replacement patterns. The matching patterns are checked in the order they appear in the file, stopping at the first successful match..\".B Caution:.\"Because the plus sign + is a character recognized by the regular expression engine,.\"and it will appear in names that include a REALM, be careful to escape the.\"plus sign with a backslash \\+ to remove the character's special meaning..RE.TP.B concurrency <integer>Specify a desired level of concurrency. Provided to the underlyingthread system as a hint. The default is not to provide any hint..TP.B conn_max_pending <integer>Specify the maximum number of pending requests for an anonymous session.If requests are submitted faster than the server can process them, theywill be queued up to this limit. If the limit is exceeded, the sessionis closed. The default is 100..TP.B conn_max_pending_auth <integer>Specify the maximum number of pending requests for an authenticated session.The default is 1000..TP.B defaultsearchbase <dn>Specify a default search base to use when client submits anon-base search request with an empty base DN.Base scoped search requests with an empty base DN are not affected..TP.B disallow <features>Specify a set of features (separated by white space) todisallow (default none)..B bind_anondisables acceptance of anonymous bind requests. Note that this settingdoes not prohibit anonymous directory access (See "require authc")..B bind_simpledisables simple (bind) authentication..B tls_2_anondisables forcing session to anonymous status (see also.BR tls_authc ) upon StartTLS operation receipt..B tls_authcdissallow the StartTLS operation if authenticated (see also.BR tls_2_anon )..HP.hy 0.B ditcontentrule "(\ <oid>\ [NAME\ <name>]\ [DESC\ <description>]\ [OBSOLETE]\ [AUX\ <oids>]\ [MUST\ <oids>]\ [MAY\ <oids>]\ [NOT\ <oids>]\ )".RSSpecify an DIT Content Rule using the LDAPv3 syntax defined in RFC 4512.The slapd parser extends the RFC 4512 definition by allowing stringforms as well as numeric OIDs to be used for the attribute OID andattribute syntax OID.(See the.B objectidentifierdescription.) .RE.TP.B gentlehup { on | off }A SIGHUP signal will only cause a 'gentle' shutdown-attempt:.B Slapdwill stop listening for new connections, but will not close theconnections to the current clients. Future write operations returnunwilling-to-perform, though. Slapd terminates when all clientshave closed their connections (if they ever do), or \- as before \-if it receives a SIGTERM signal. This can be useful if you wish toterminate the server and start a new.B slapdserver.B with another database,without disrupting the currently active clients.The default is off. You may wish to use.B idletimeoutalong with this option..TP.B idletimeout <integer>Specify the number of seconds to wait before forcibly closingan idle client connection. A idletimeout of 0 disables thisfeature. The default is 0..TP.B include <filename>Read additional configuration information from the given file beforecontinuing with the next line of the current file..TP.B index_substr_if_minlen <integer>Specify the minimum length for subinitial and subfinal indices. Anattribute value must have at least this many characters in order to beprocessed by the indexing functions. The default is 2..TP.B index_substr_if_maxlen <integer>Specify the maximum length for subinitial and subfinal indices. Onlythis many characters of an attribute value will be processed by theindexing functions; any excess characters are ignored. The default is 4..TP.B index_substr_any_len <integer>Specify the length used for subany indices. An attribute value must haveat least this many characters in order to be processed. Attribute valueslonger than this length will be processed in segments of this length. Thedefault is 4. The subany index will also be used in subinitial andsubfinal index lookups when the filter string is longer than the.I index_substr_if_maxlenvalue..TP.B index_substr_any_step <integer>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -