# Load dynamic backend modules:
# modulepath %MODULEDIR%
+# moduleload back_bdb.la
# moduleload back_ldap.la
# moduleload back_ldbm.la
# moduleload back_passwd.la
# moduleload back_shell.la
+# Sample security restrictions
#
-# Sample Access Control
-# Allow read access of root DSE
-# Allow self write access
-# Allow authenticated users read access
-# Allow anonymous users to authenticate
+# Disallow clear text exchange of passwords
+# disallow bind_simple_unprotected
#
-#access to dn="" by * read
-#access to *
+# Require integrity protection (prevent hijacking)
+# Require 112-bit (3DES or better) encryption for updates
+# Require 63-bit encryption for simple bind
+# security ssf=1 update_ssf=112 simple_bind=64
+
+# Sample access control policy:
+# Root DSE: allow anyone to read it
+# Subschema (sub)entry DSE: allow anyone to read it
+# Other DSEs:
+# Allow self write access
+# Allow authenticated users read access
+# Allow anonymous users to authenticate
+# Directives needed to implement policy:
+# access to dn.base="" by * read
+# access to dn.base="cn=Subschema" by * read
+# access to *
# by self write
# by users read
# by anonymous auth
#
-# if no access controls are present, the default is:
+# if no access controls are present, the default policy is:
# Allow read by all
#
# rootdn can always write!
# ldbm database definitions
#######################################################################
-database ldbm
+database bdb
suffix "dc=my-domain,dc=com"
-#suffix "o=My Organization Name,c=US"
rootdn "cn=Manager,dc=my-domain,dc=com"
-#rootdn "cn=Manager,o=My Organization Name,c=US"
# Cleartext passwords, especially for the rootdn, should
# be avoid. See slappasswd(8) and slapd.conf(5) for details.
# Use of strong authentication encouraged.
rootpw secret
# The database directory MUST exist prior to running slapd AND
# should only be accessible by the slapd/tools. Mode 700 recommended.
-directory %LOCALSTATEDIR%/openldap-ldbm
+directory %LOCALSTATEDIR%/openldap-data
# Indices to maintain
index objectClass eq