⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 slapdconf2.sdf

📁 OpenLdap是LDAP的开源项目
💻 SDF
📖 第 1 页 / 共 4 页
字号:
shell	Shell (extern program) backendsql	SQL Programmable backend!endblock\Example:>	olcBackend: bdbThere are no other directives defined for this entry.  Specific backendtypes may define additional attributes for their particular use but sofar none have ever been defined.  As such, these directives usually donot appear in any actual configurations.H4: Sample Entry> dn: olcBackend=bdb,cn=config> objectClass: olcBackendConfig> olcBackend: bdbH3: Database-specific DirectivesDirectives in this section are supported by every type of database.Database entries must have the {{EX:olcDatabaseConfig}} objectClass.H4: olcDatabase: [{<index>}]<type>This directive names a specific database instance. The numeric {<index>} maybe provided to distinguish multiple databases of the same type. Usually theindex can be omitted, and slapd will generate it automatically.{{EX:<type>}} should be one of thesupported backend types listed in Table 5.2 or the {{EX:frontend}} type.The {{EX:frontend}} is a special database that is used to holddatabase-level options that should be applied to all the otherdatabases. Subsequent database definitions may also override somefrontend settings.The {{EX:config}} database is also special; both the {{EX:config}} andthe {{EX:frontend}} databases are always created implicitly even if theyare not explicitly configured, and they are created before any otherdatabases.\Example:>	olcDatabase: bdbThis marks the beginning of a new {{TERM:BDB}} database instance.H4: olcAccess: to <what> [ by <who> <accesslevel> <control> ]+This directive grants access (specified by <accesslevel>) to aset of entries and/or attributes (specified by <what>) by one ormore requesters (specified by <who>).See the {{SECT:Access Control}} section of this chapter for asummary of basic usage.!if 0More detailed discussion of this directive can be found in the{{SECT:Advanced Access Control}} chapter.!endifNote: If no {{EX:olcAccess}} directives are specified, the defaultaccess control policy, {{EX:to * by * read}}, allows allusers (both authenticated and anonymous) read access.Note: Access controls defined in the frontend are appended to allother databases' controls.H4: olcReadonly { TRUE | FALSE }This directive puts the database into "read-only" mode. Anyattempts to modify the database will return an "unwilling toperform" error.\Default:>	olcReadonly: FALSEH4: olcReplica>	olcReplica: uri=ldap[s]://<hostname>[:<port>] | host=<hostname>[:<port>]>		[bindmethod={simple|sasl}]>		["binddn=<DN>"]>		[saslmech=<mech>]>		[authcid=<identity>]>		[authzid=<identity>]>		[credentials=<password>]This directive specifies a replication site for this database foruse with slurpd. The{{EX:uri=}} parameter specifies a scheme, a host and optionally a port wherethe slave slapd instance can be found. Either a domain nameor IP address may be used for <hostname>. If <port> is notgiven, the standard LDAP port number (389 or 636) is used.{{EX:host}} is deprecated in favor of the {{EX:uri}} parameter.{{EX:uri}} allows the replica LDAP server to be specified as an LDAP URI such as {{EX:ldap://slave.example.com:389}} or{{EX:ldaps://slave.example.com:636}}.The {{EX:binddn=}} parameter gives the DN to bind as for updatesto the slave slapd. It should be a DN which has read/write accessto the slave slapd's database.  It must also match the {{EX:updatedn}}directive in the slave slapd's config file.  Generally, this DN{{should not}} be the same as the {{EX:rootdn}} of the masterdatabase.  Since DNs are likely to contain embedded spaces, theentire {{EX:"binddn=<DN>"}} string should be enclosed in doublequotes.The {{EX:bindmethod}} is {{EX:simple}} or {{EX:sasl}},depending on whether simple password-based authenticationor {{TERM:SASL}} authentication is to be used when connectingto the slave slapd.Simple authentication should not be used unless adequate dataintegrity and confidentiality protections are in place (e.g. TLSor IPSEC).  Simple authentication requires specification of{{EX:binddn}} and {{EX:credentials}} parameters.SASL authentication is generally recommended.  SASL authenticationrequires specification of a mechanism using the {{EX:saslmech}} parameter.Depending on the mechanism, an authentication identity and/orcredentials can be specified using {{EX:authcid}} and {{EX:credentials}}respectively.  The {{EX:authzid}} parameter may be used to specifyan authorization identity.See the chapter entitled {{SECT:Replication with slurpd}} for moreinformation on how to use this directive.H4: olcReplogfile: <filename>This directive specifies the name of the replication log file towhich slapd will log changes. The replication log is typicallywritten by slapd and read by slurpd. Normally, this directive isonly used if slurpd is being used to replicate the database.However, you can also use it to generate a transaction log, ifslurpd is not running. In this case, you will need to periodicallytruncate the file, since it will grow indefinitely otherwise.See the chapter entitled {{SECT:Replication with slurpd}} for moreinformation on how to use this directive.H4: olcRootDN: <DN>This directive specifies the DN that is not subject toaccess control or administrative limit restrictions foroperations on this database.  The DN need not refer toan entry in this database or even in the directory. TheDN may refer to a SASL identity.Entry-based Example:>	olcRootDN: "cn=Manager,dc=example,dc=com"SASL-based Example:>	olcRootDN: "uid=root,cn=example.com,cn=digest-md5,cn=auth"See the {{SECT:SASL Authentication}} section for information onSASL authentication identities.H4: olcRootPW: <password>This directive can be used to specify a password for the DN forthe rootdn (when the rootdn is set to a DN within the database).\Example:>	olcRootPW: secretIt is also permissible to provide a hash of the password in RFC 2307form.  {{slappasswd}}(8) may be used to generate the password hash.\Example:>	olcRootPW: {SSHA}ZKKuqbEKJfKSXhUbHG3fG8MDn9j1v4QNThe hash was generated using the command {{EX:slappasswd -s secret}}.H4: olcSizeLimit: <integer>This directive specifies the maximum number of entries to returnfrom a search operation.\Default:>	olcSizeLimit: 500H4: olcSuffix: <dn suffix>This directive specifies the DN suffix of queries that will bepassed to this backend database. Multiple suffix lines can begiven, and usually at least one is required for each databasedefinition. (Some backend types, such as {{EX:frontend}} and{{EX:monitor}} use a hard-coded suffix which may not be overriddenin the configuration.)\Example:>	olcSuffix: "dc=example,dc=com"Queries with a DN ending in "dc=example,dc=com"will be passed to this backend.Note: When the backend to pass a query to is selected, slapdlooks at the suffix value(s) in each database definition in theorder in which they were configured. Thus, if one database suffix is aprefix of another, it must appear after it in the configuration.H4: olcSyncrepl>	olcSyncrepl: rid=<replica ID>>		provider=ldap[s]://<hostname>[:port]>		[starttls=yes|critical]>		[type=refreshOnly|refreshAndPersist]>		[interval=dd:hh:mm:ss]>		[retry=[<retry interval> <# of retries>]+]>		searchbase=<base DN>>		[filter=<filter str>]>		[scope=sub|one|base]>		[attrs=<attr list>]>		[attrsonly]>		[sizelimit=<limit>]>		[timelimit=<limit>]>		[schemachecking=on|off]>		[bindmethod=simple|sasl]>		[binddn=<DN>]>		[saslmech=<mech>]>		[authcid=<identity>]>		[authzid=<identity>]>		[credentials=<passwd>]>		[realm=<realm>]>		[secprops=<properties>]This directive specifies the current database as a replica of themaster content by establishing the current {{slapd}}(8) as areplication consumer site running a syncrepl replication engine.The master database is located at the replication provider sitespecified by the {{EX:provider}} parameter. The replica database iskept up-to-date with the master content using the LDAP ContentSynchronization protocol. See {{EX:draft-zeilenga-ldup-sync-xx.txt}}({{a work in progress}}) for more information on the protocol.The {{EX:rid}} parameter is used for identification of the current{{EX:syncrepl}} directive within the replication consumer server,where {{EX:<replica ID>}} uniquely identifies the syncrepl specificationdescribed by the current {{EX:syncrepl}} directive. {{EX:<replica ID>}}is non-negative and is no more than three decimal digits in length.The {{EX:provider}} parameter specifies the replication provider sitecontaining the master content as an LDAP URI. The {{EX:provider}}parameter specifies a scheme, a host and optionally a port where theprovider slapd instance can be found. Either a domain name or IPaddress may be used for <hostname>. Examples are{{EX:ldap://provider.example.com:389}} or {{EX:ldaps://192.168.1.1:636}}.If <port> is not given, the standard LDAP port number (389 or 636) is used.Note that the syncrepl uses a consumer-initiated protocol, and hence itsspecification is located at the consumer site, whereas the {{EX:replica}}specification is located at the provider site. {{EX:syncrepl}} and{{EX:replica}} directives define two independent replicationmechanisms. They do not represent the replication peers of each other.The {{EX:starttls}} parameter specifies use of the StartTLS extendedoperation to establish a TLS session before Binding to the provider. If theStartTLS request fails and the {{EX:critical}} argument was used, thesession will be aborted. Otherwise the syncrepl session continues withoutTLS.The content of the syncrepl replica is defined using a searchspecification as its result set. The consumer slapd willsend search requests to the provider slapd according to the searchspecification. The search specification includes {{EX:searchbase}},{{EX:scope}}, {{EX:filter}}, {{EX:attrs}}, {{EX:attrsonly}},{{EX:sizelimit}}, and {{EX:timelimit}} parameters as in the normalsearch specification. The {{EX:searchbase}} parameter has nodefault value and must always be specified. The {{EX:scope}} defaultsto {{EX:sub}}, the {{EX:filter}} defaults to {{EX:(objectclass=*)}},{{EX:attrs}} defaults to {{EX:"*,+"}} to replicate all user and operationalattributes, and {{EX:attrsonly}} is unset by default. Both {{EX:sizelimit}}and {{EX:timelimit}} default to "unlimited", and only positive integersor "unlimited" may be specified.The LDAP Content Synchronization protocol has two operationtypes: {{EX:refreshOnly}} and {{EX:refreshAndPersist}}.The operation type is specified by the {{EX:type}} parameter.In the {{EX:refreshOnly}} operation, the next synchronization search operationis periodically rescheduled at an interval time after eachsynchronization operation finishes. The interval is specifiedby the {{EX:interval}} parameter. It is set to one day by default.In the {{EX:refreshAndPersist}} operation, a synchronization searchremains persistent in the provider slapd. Further updates to themaster replica will generate {{EX:searchResultEntry}} to the consumer slapdas the search responses to the persistent synchronization search.If an error occurs during replication, the consumer will attempt to reconnectaccording to the retry parameter which is a list of the <retry interval>and <# of retries> pairs. For example, retry="60 10 300 3" lets the consumerretry every 60 seconds for the first 10 times and then retry every 300 secondsfor the next three times before stop retrying. + in <#  of retries> meansindefinite number of retries until success.The schema checking can be enforced at the LDAP Sync consumer siteby turning on the {{EX:schemachecking}} parameter.If it is turned on, every replicated entry will be checked for itsschema as the entry is stored into the replica content.Every entry in the replica should contain those attributesrequired by the schema definition.If it is turned off, entries will be stored without checkingschema conformance. The default is off.The {{EX:binddn}} parameter gives the DN to bind as for thesyncrepl searches to the provider slapd. It should be a DNwhich has read access to the replication content in themaster database. The {{EX:bindmethod}} is {{EX:simple}} or {{EX:sasl}},depending on whether simple password-based authentication or{{TERM:SASL}} authentication is to be used when connectingto the provider slapd.Simple authentication should not be used unless adequate dataintegrity and confidentiality protections are in place (e.g. TLSor IPSEC). Simple authentication requires specification of {{EX:binddn}}and {{EX:credentials}} parameters.SASL authentication is generally recommended.  SASL authenticationrequires specification of a mechanism using the {{EX:saslmech}} parameter.Depending on the mechanism, an authentication identity and/orcredentials can be specified using {{EX:authcid}} and {{EX:credentials}},respectively.  The {{EX:authzid}} parameter may be used to specifyan authorization identity.The {{EX:realm}} parameter specifies a realm which a certainmechanisms authenticate the identity within. The {{EX:secprops}}parameter specifies Cyrus SASL security properties.The syncrepl replication mechanism is supported by thethree native backends: back-bdb, back-hdb, and back-ldbm.See the {{SECT:LDAP Sync Replication}} chapter of the admin guidefor more information on how to use this directive.H4: olcTimeLimit: <integer>This directive specifies the maximum number of seconds (in realtime) slapd will spend answering a search request. If arequest is not finished in this time, a result indicating anexceeded timelimit will be returned.\Default:>	olcTimeLimit: 3600H4: olcUpdateDN: <DN>This directive is only applicable in a slave slapd. It specifiesthe DN allowed to make changes to the replica.  This may be the DN{{slurpd}}(8) binds as when making changes to the replica or the DNassociated with a SASL identity.Entry-based Example:>	olcUpdateDN: "cn=Update Daemon,dc=example,dc=com"SASL-based Example:>	olcUpdateDN: "uid=slurpd,cn=example.com,cn=digest-md5,cn=auth"See the {{SECT:Replication with slurpd}} chapter for more information

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -