]> git.sur5r.net Git - openldap/blobdiff - tests/data/slapd-acl.conf
Rework libldap to not attempt to set LDAP_API_FEATURE_X_OPENLDAP_THREAD_SAFE
[openldap] / tests / data / slapd-acl.conf
index 686c9d54b7c8d1016e633f562ee75e0359b312b4..d1e541a3f0e9b832db8d8f2892cb593b72e5e83d 100644 (file)
@@ -7,7 +7,6 @@ include ./schema/core.schema
 include ./schema/cosine.schema
 include ./schema/inetorgperson.schema
 include ./schema/openldap.schema
-schemacheck    off
 pidfile     ./test-db/slapd.pid
 argsfile    ./test-db/slapd.args
 
@@ -20,7 +19,7 @@ access to * by * read
 #######################################################################
 
 database       @BACKEND@
-cachesize      0
+#ldbm#cachesize        0
 suffix         "o=University of Michigan,c=US"
 directory      ./test-db
 rootdn         "cn=Manager,o=University of Michigan,c=US"
@@ -29,13 +28,15 @@ rootpw              secret
 #ldbm#index            cn,sn,uid       pres,eq,sub
 #bdb#index             objectClass     eq
 #bdb#index             cn,sn,uid       pres,eq,sub
-lastmod                on
 
 #
 # normal installations should protect root dse,
 # cn=monitor, cn=schema, and cn=config
 #
 
+access to dn="" by * read
+access to dn.base="" by * read
+
 access         to attr=objectclass
                by * =rsc stop
 
@@ -52,9 +53,19 @@ access               to attr=member
                by dnattr=member selfwrite
                by * read
 
+access         to attr=member filter=(mail=*edu)
+               by * read
+
 access         to filter="(objectclass=groupofnames)"
                by dn.base="cn=Bjorn Jensen,ou=Information Technology Division,ou=People,o=University of Michigan,c=US" =sc continue
                by dn="^cn=Bjorn Jensen,ou=Information Technology Division,ou=People,o=University of Michigan,c=US$" +rw stop
                by * break
 
+access         to dn.children="ou=Information Technology Division,ou=People,o=University of Michigan,c=US"
+               by group.exact="cn=ITD Staff,ou=Groups,o=University of Michigan,c=US" write
+               by * read
+
+access to filter="(name=X*Y*Z)"
+               by * continue
+
 # fall into global ACLs