initslapd.ldif - madhusudana30/AlternativeJPAForWebSphere GitHub Wiki

See slapd-config(5) for details on configuration options.

This file should NOT be world readable.

dn: cn=config objectClass: olcGlobal cn: config

Define global ACLs to disable default read access.

olcArgsFile: /var/run/slapd.args olcPidFile: /var/run/slapd.pid

Do not enable referrals until AFTER you have a working directory

service AND an understanding of referrals.

#olcReferral: ldap://root.openldap.org

Sample security restrictions

Require integrity protection (prevent hijacking)

Require 112-bit (3DES or better) encryption for updates

Require 64-bit encryption for simple bind

#olcSecurity: ssf=1 update_ssf=112 simple_bind=64

Load dynamic backend modules:

dn: cn=module,cn=config objectClass: olcModuleList cn: module olcModulepath: /usr/lib64/openldap ##olcModuleload: back_bdb.la ##olcModuleload: back_hdb.la olcModuleload: back_ldap.la olcModuleload: back_passwd.la olcModuleload: back_shell.la olcModuleload: auditlog.la olcModuleLoad: ppolicy.la

dn: cn=schema,cn=config objectClass: olcSchemaConfig cn: schema

include: file:///etc/openldap/schema/core.ldif include: file:///etc/openldap/schema/cosine.ldif include: file:///etc/openldap/schema/inetorgperson.ldif include: file:///etc/openldap/schema/collective.ldif include: file:///etc/openldap/schema/dyngroup.ldif include: file:///etc/openldap/schema/openldap.ldif include: file:///etc/openldap/schema/corba.ldif include: file:///etc/openldap/schema/misc.ldif include: file:///etc/openldap/schema/pmi.ldif include: file:///etc/openldap/schema/duaconf.ldif include: file:///etc/openldap/schema/nis.ldif include: file:///etc/openldap/schema/java.ldif include: file:///etc/openldap/schema/ppolicy.ldif

dn: olcDatabase={0}config,cn=config objectClass: olcDatabaseConfig olcDatabase: {0}config structuralObjectClass: olcDatabaseConfig olcRootDN: cn=admin,cn=config olcRootPW: secret

Frontend settings

#dn: olcDatabase=frontend,cn=config #objectClass: olcDatabaseConfig #objectClass: olcFrontendConfig #olcDatabase: frontend

Sample global access control policy:

Root DSE: allow anyone to read it

Subschema (sub)entry DSE: allow anyone to read it

Other DSEs:

Allow self write access

Allow authenticated users read access

Allow anonymous users to authenticate

#olcAccess: to dn.base="" by * read #olcAccess: to dn.base="cn=Subschema" by * read #olcAccess: to *

by self write

by users read

by anonymous auth

if no access controls are present, the default policy

allows anyone and everyone to read anything but restricts

updates to rootdn. (e.g., "access to * by * read")

rootdn can always read and write EVERYTHING!

#######################################################################

LMDB database definitions

#######################################################################

dn: olcDatabase=mdb,cn=config objectClass: olcDatabaseConfig objectClass: olcMdbConfig olcDatabase: mdb olcSuffix: dc=fic,dc=com olcRootDN: cn=manager,dc=fic,dc=com

Cleartext passwords, especially for the rootdn, should

be avoided. See slappasswd(8) and slapd-config(5) for details.

Use of strong authentication encouraged.

olcRootPW: secret

The database directory MUST exist prior to running slapd AND

should only be accessible by the slapd and slap tools.

Mode 700 recommended.

olcDbDirectory: /var/openldap-data #olcOverlay: ppolicy #olcPPolicyDefault: cn=default,ou=policies,dc=fic,dc=com

Indices to maintain

olcDbIndex: objectClass eq #dn: olcOverlay=ppolicy,olcDatabase=mdb,cn=config #objectClass: olcOverlayConfig #objectClass: olcPPolicyConfig #olcOverlay: ppolicy #olcPPolicyDefault: cn=passwordDefault,ou=Policies,dc=fic,dc=com #olcPPolicyHashCleartext: FALSE #olcPPolicyUseLockout: FALSE #olcPPolicyForwardUpdates: FALSE