On Dienstag 12 Juli 2011 19:38:57 Jonathan Underwood wrote:
> Hi,
[..]
> where rid=001 corresponds to the entry:
> 
> olcSyncRepl: rid=001
>   provider=ldap://auth0.domain
>   bindmethod=sasl saslmech=gssapi
>   searchbase="cn=config"
>   type=refreshAndPersist
>   retry="30 30 300 +" timeout=1
> 
> The reason this isn't working is clear: slapd on the consumer is not
> binding as the rootdn of the cn=config tree, and so therefore cannot
> search that database.
> 
> I am not sure what the best fix is for this, particularly from a
> security point-of-view. My first thought was to add an ACL to the
> cn=config database such as olcAccess: to * by users read by * none,
> but this then opens up the cn=config tree to be readable by any
> authenticated user, which is somewhat undesirable.
Why not use a more restrictive ACL that only gives the identities read 
access that really need it? E.g. by using the 
UID=<username>[[,CN=<realm>],CN=<mechanism>],CN=auth DN form that slapd 
generates when SASL is used. (If you plan add more mirrormode nodes, it 
might probably be better to create a group for them) 
 
> Does anyone have a suggestion as to a good strategy to allow cn=config
> replication in this situation?
> 
> Thanks in advance,
> Jonathan.

Ralf

Reply via email to