Add docker dev setup
This commit is contained in:
parent
e5537fefc8
commit
3c41d322b8
79
docker-compose.yml
Normal file
79
docker-compose.yml
Normal file
@ -0,0 +1,79 @@
|
||||
version: "3"
|
||||
|
||||
networks:
|
||||
pg_db:
|
||||
internal: true
|
||||
ldap_net:
|
||||
internal: true
|
||||
frontend_net:
|
||||
external: false
|
||||
|
||||
|
||||
services:
|
||||
lama:
|
||||
image: lama:0.1
|
||||
build:
|
||||
context: docker/lama
|
||||
dockerfile: Dockerfile.dev
|
||||
networks:
|
||||
- frontend_net
|
||||
- ldap_net
|
||||
- pg_db
|
||||
env_file:
|
||||
- docker/lama/dev.env
|
||||
volumes:
|
||||
- ./src:/lama
|
||||
labels:
|
||||
- "traefik.port=80"
|
||||
- "traefik.enable=true"
|
||||
- "traefik.frontend.rule=Host:lama.localhost"
|
||||
- "traefik.docker.network=frontend_net"
|
||||
|
||||
dblama:
|
||||
image: postgres:11.2-alpine
|
||||
networks:
|
||||
- pg_db
|
||||
volumes:
|
||||
- ./db/pgdata/:/var/lib/postgresql/data/
|
||||
env_file:
|
||||
- docker/lama/dev.env
|
||||
|
||||
ldap:
|
||||
image: docker.clkl.de/ldap/ladap:0.1
|
||||
build:
|
||||
context: docker/ldap
|
||||
dockerfile: Dockerfile.ldap
|
||||
env_file: docker/ldap/ldap.env
|
||||
volumes:
|
||||
- ./docker/ldap/data/var/:/var/lib/openldap/
|
||||
networks:
|
||||
- ldap_net
|
||||
|
||||
ldap_admin:
|
||||
image: docker.clkl.de/ldap/admin:0.1
|
||||
build:
|
||||
context: docker/ldap
|
||||
dockerfile: Dockerfile.admin
|
||||
networks:
|
||||
- ldap_net
|
||||
- frontend_net
|
||||
labels:
|
||||
- "traefik.port=80"
|
||||
- "traefik.enable=true"
|
||||
- "traefik.frontend.rule=Host:ldap.localhost"
|
||||
- "traefik.docker.network=frontend_net"
|
||||
|
||||
traefik:
|
||||
image: traefik:v1.7.9-alpine
|
||||
command: --api --docker --docker.watch --docker.exposedByDefault=false
|
||||
ports:
|
||||
- 80:80
|
||||
volumes:
|
||||
- /var/run/docker.sock:/var/run/docker.sock
|
||||
networks:
|
||||
- frontend_net
|
||||
labels:
|
||||
- "traefik.port=8080"
|
||||
- "traefik.enable=true"
|
||||
- "traefik.frontend.rule=Host:traefik.localhost"
|
||||
- "traefik.docker.network=frontend_net"
|
||||
12
docker/lama/Dockerfile.dev
Normal file
12
docker/lama/Dockerfile.dev
Normal file
@ -0,0 +1,12 @@
|
||||
FROM alpine:3.9
|
||||
ADD ["requirements.txt", "/requirements.txt"]
|
||||
RUN apk upgrade --update && \
|
||||
apk add --update python3 build-base openldap-dev python3-dev py3-psycopg2 && \
|
||||
pip3 install -r /requirements.txt && rm /requirements.txt
|
||||
WORKDIR /lama
|
||||
EXPOSE 80
|
||||
|
||||
COPY entrypoint.sh /
|
||||
#ENTRYPOINT ["python3", "manage.py"]
|
||||
#CMD ["runserver", "0.0.0.0:80"]
|
||||
CMD ["/entrypoint.sh"]
|
||||
33
docker/lama/dev.env
Normal file
33
docker/lama/dev.env
Normal file
@ -0,0 +1,33 @@
|
||||
DJANGO_SETTINGS_MODULE=core.docker_settings
|
||||
DOMAIN=localhost
|
||||
|
||||
SITE_NAME=LAMa
|
||||
|
||||
SECRET_KEY=supersecret
|
||||
ALLOWED_HOSTS=lama lama.localhost
|
||||
|
||||
DATABASE_HOST=dblama
|
||||
DATABASE_PORT=5432
|
||||
|
||||
POSTGRES_USER=lama
|
||||
POSTGRES_PASSWORD=secret
|
||||
|
||||
DEBUG=True
|
||||
|
||||
LDAP_SERVER_URI=ldap://ldap:389
|
||||
LDAP_BIND_DN=cn=admin,dc=test,dc=de
|
||||
LDAP_BIND_PASSWORD=secret
|
||||
|
||||
LDAP_USER_ENTRY=ou=dc=test,dc=de
|
||||
LDAP_USER_SELECTOR=(cn=%(user)s)
|
||||
|
||||
LDAP_GROUP_ENTRY=dc=test,dc=de
|
||||
LDAP_GROUP_SELECTOR=(objectClass=groupOfNames)
|
||||
LDAP_GROUP_NAME_ATTR=cn
|
||||
|
||||
EMAIL_HOST=smtp.uni-bamberg.de
|
||||
EMAIL_PORT=587
|
||||
EMAIL_USE_TLS=False
|
||||
EMAIL_USE_SSL=False
|
||||
DEFAULT_FROM_EMAIL=
|
||||
SERVER_EMAIL=
|
||||
4
docker/lama/entrypoint.sh
Executable file
4
docker/lama/entrypoint.sh
Executable file
@ -0,0 +1,4 @@
|
||||
#!/bin/sh
|
||||
python3 /lama/manage.py makemigrations account_helper && \
|
||||
python3 /lama/manage.py migrate && \
|
||||
python3 /lama/manage.py runserver 0.0.0.0:80
|
||||
5
docker/lama/requirements.txt
Normal file
5
docker/lama/requirements.txt
Normal file
@ -0,0 +1,5 @@
|
||||
Django==2.1.7
|
||||
python-ldap==3.2.0
|
||||
django-auth-ldap==1.7.0
|
||||
django-ldapdb==1.3.0
|
||||
Jinja2==2.10
|
||||
10
docker/ldap/Dockerfile.admin
Normal file
10
docker/ldap/Dockerfile.admin
Normal file
@ -0,0 +1,10 @@
|
||||
FROM alpine:3.7
|
||||
|
||||
RUN apk add --update --no-cache phpldapadmin apache2 php5-apache2
|
||||
COPY ./admin/httpd.conf /etc/apache2/httpd.conf
|
||||
COPY ./admin/phpldapadmin_conf.php /etc/phpldapadmin/config.php
|
||||
RUN sed -i 's!/run/apache2/httpd.pid!/tmp/apache2.pid!' /etc/apache2/conf.d/mpm.conf
|
||||
|
||||
EXPOSE 80
|
||||
|
||||
ENTRYPOINT ["/usr/sbin/httpd", "-D", "FOREGROUND"]
|
||||
22
docker/ldap/Dockerfile.ldap
Normal file
22
docker/ldap/Dockerfile.ldap
Normal file
@ -0,0 +1,22 @@
|
||||
FROM alpine:3.7
|
||||
|
||||
WORKDIR /
|
||||
|
||||
ENV dc=stuve
|
||||
ENV dcr=test
|
||||
COPY entrypoint.sh /
|
||||
|
||||
RUN apk add --update --no-cache openldap openldap-back-mdb openldap-overlay-ppolicy
|
||||
RUN sed -i 's!/run/openldap/slapd.pid!/tmp/openladp.pid!' /etc/openldap/slapd.conf
|
||||
RUN sed -i 's!/run/openldap/slapd.args!/tmp/openladp.args!' /etc/openldap/slapd.conf
|
||||
|
||||
ADD start.ldif /etc/openldap/start.ldif
|
||||
RUN sed -i s/dc=$dc/dc=$dcr/g /etc/openldap/start.ldif
|
||||
RUN sed -i s/dc:\ $dc/dc:\ $dcr/g /etc/openldap/start.ldif
|
||||
ADD slapd.conf /etc/openldap/slapd.conf
|
||||
RUN chown ldap:ldap -R /etc/openldap
|
||||
RUN chown ldap:ldap -R /var/lib/openldap
|
||||
|
||||
EXPOSE 389
|
||||
|
||||
CMD ["/entrypoint.sh"]
|
||||
10
docker/ldap/admin/Dockerfile
Normal file
10
docker/ldap/admin/Dockerfile
Normal file
@ -0,0 +1,10 @@
|
||||
FROM alpine:3.7
|
||||
|
||||
RUN apk add --update --no-cache phpldapadmin apache2 php5-apache2
|
||||
COPY ./httpd.conf /etc/apache2/httpd.conf
|
||||
COPY ./phpldapadmin_conf.php /etc/phpldapadmin/config.php
|
||||
RUN sed -i 's!/run/apache2/httpd.pid!/tmp/apache2.pid!' /etc/apache2/conf.d/mpm.conf
|
||||
|
||||
EXPOSE 80
|
||||
|
||||
ENTRYPOINT ["/usr/sbin/httpd", "-D", "FOREGROUND"]
|
||||
107
docker/ldap/admin/httpd.conf
Normal file
107
docker/ldap/admin/httpd.conf
Normal file
@ -0,0 +1,107 @@
|
||||
#
|
||||
# ServerTokens
|
||||
# This directive configures what you return as the Server HTTP response
|
||||
# Header. The default is 'Full' which sends information about the OS-Type
|
||||
# and compiled in modules.
|
||||
# Set to one of: Full | OS | Minor | Minimal | Major | Prod
|
||||
# where Full conveys the most information, and Prod the least.
|
||||
#
|
||||
ServerTokens OS
|
||||
|
||||
ServerRoot /var/www
|
||||
Listen 80
|
||||
|
||||
LoadModule mpm_prefork_module modules/mod_mpm_prefork.so
|
||||
LoadModule authn_file_module modules/mod_authn_file.so
|
||||
LoadModule authn_core_module modules/mod_authn_core.so
|
||||
LoadModule authz_host_module modules/mod_authz_host.so
|
||||
LoadModule authz_groupfile_module modules/mod_authz_groupfile.so
|
||||
LoadModule authz_user_module modules/mod_authz_user.so
|
||||
LoadModule authz_core_module modules/mod_authz_core.so
|
||||
LoadModule access_compat_module modules/mod_access_compat.so
|
||||
LoadModule auth_basic_module modules/mod_auth_basic.so
|
||||
LoadModule reqtimeout_module modules/mod_reqtimeout.so
|
||||
LoadModule filter_module modules/mod_filter.so
|
||||
LoadModule mime_module modules/mod_mime.so
|
||||
LoadModule log_config_module modules/mod_log_config.so
|
||||
LoadModule env_module modules/mod_env.so
|
||||
LoadModule headers_module modules/mod_headers.so
|
||||
LoadModule setenvif_module modules/mod_setenvif.so
|
||||
LoadModule version_module modules/mod_version.so
|
||||
LoadModule unixd_module modules/mod_unixd.so
|
||||
LoadModule status_module modules/mod_status.so
|
||||
LoadModule autoindex_module modules/mod_autoindex.so
|
||||
LoadModule dir_module modules/mod_dir.so
|
||||
LoadModule alias_module modules/mod_alias.so
|
||||
LoadModule negotiation_module modules/mod_negotiation.so
|
||||
|
||||
<IfModule unixd_module>
|
||||
User apache
|
||||
Group apache
|
||||
</IfModule>
|
||||
ServerAdmin you@example.com
|
||||
ServerSignature On
|
||||
|
||||
<Directory />
|
||||
AllowOverride none
|
||||
Require all denied
|
||||
</Directory>
|
||||
|
||||
DocumentRoot "/usr/share/webapps/phpldapadmin/"
|
||||
<Directory "/usr/share/webapps/phpldapadmin/">
|
||||
Options Indexes FollowSymLinks
|
||||
AllowOverride All
|
||||
Require all granted
|
||||
</Directory>
|
||||
|
||||
<IfModule dir_module>
|
||||
DirectoryIndex index.html
|
||||
</IfModule>
|
||||
|
||||
#
|
||||
# The following lines prevent .htaccess and .htpasswd files from being
|
||||
# viewed by Web clients.
|
||||
#
|
||||
<Files ".ht*">
|
||||
Require all denied
|
||||
</Files>
|
||||
|
||||
ErrorLog logs/error.log
|
||||
LogLevel warn
|
||||
|
||||
<IfModule log_config_module>
|
||||
LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined
|
||||
LogFormat "%h %l %u %t \"%r\" %>s %b" common
|
||||
|
||||
<IfModule logio_module>
|
||||
# You need to enable mod_logio.c to use %I and %O
|
||||
LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio
|
||||
</IfModule>
|
||||
CustomLog logs/access.log combined
|
||||
</IfModule>
|
||||
|
||||
<IfModule alias_module>
|
||||
ScriptAlias /cgi-bin/ "/var/www/localhost/cgi-bin/"
|
||||
</IfModule>
|
||||
|
||||
<Directory "/var/www/localhost/cgi-bin">
|
||||
AllowOverride None
|
||||
Options None
|
||||
Require all granted
|
||||
</Directory>
|
||||
|
||||
<IfModule headers_module>
|
||||
RequestHeader unset Proxy early
|
||||
</IfModule>
|
||||
|
||||
<IfModule mime_module>
|
||||
TypesConfig /etc/apache2/mime.types
|
||||
AddType application/x-compress .Z
|
||||
AddType application/x-gzip .gz .tgz
|
||||
</IfModule>
|
||||
|
||||
<IfModule mime_magic_module>
|
||||
MIMEMagicFile /etc/apache2/magic
|
||||
</IfModule>
|
||||
IncludeOptional /etc/apache2/conf.d/*.conf
|
||||
|
||||
577
docker/ldap/admin/phpldapadmin_conf.php
Normal file
577
docker/ldap/admin/phpldapadmin_conf.php
Normal file
@ -0,0 +1,577 @@
|
||||
<?php
|
||||
/** NOTE **
|
||||
** Make sure that <?php is the FIRST line of this file!
|
||||
** IE: There should NOT be any blank lines or spaces BEFORE <?php
|
||||
**/
|
||||
|
||||
/**
|
||||
* The phpLDAPadmin config file
|
||||
* See: http://phpldapadmin.sourceforge.net/wiki/index.php/Config.php
|
||||
*
|
||||
* This is where you can customise some of the phpLDAPadmin defaults
|
||||
* that are defined in config_default.php.
|
||||
*
|
||||
* To override a default, use the $config->custom variable to do so.
|
||||
* For example, the default for defining the language in config_default.php
|
||||
*
|
||||
* $this->default->appearance['language'] = array(
|
||||
* 'desc'=>'Language',
|
||||
* 'default'=>'auto');
|
||||
*
|
||||
* to override this, use $config->custom->appearance['language'] = 'en_EN';
|
||||
*
|
||||
* This file is also used to configure your LDAP server connections.
|
||||
*
|
||||
* You must specify at least one LDAP server there. You may add
|
||||
* as many as you like. You can also specify your language, and
|
||||
* many other options.
|
||||
*
|
||||
* NOTE: Commented out values in this file prefixed by //, represent the
|
||||
* defaults that have been defined in config_default.php.
|
||||
* Commented out values prefixed by #, dont reflect their default value, you can
|
||||
* check config_default.php if you want to see what the default is.
|
||||
*
|
||||
* DONT change config_default.php, you changes will be lost by the next release
|
||||
* of PLA. Instead change this file - as it will NOT be replaced by a new
|
||||
* version of phpLDAPadmin.
|
||||
*/
|
||||
|
||||
/*********************************************
|
||||
* Useful important configuration overrides *
|
||||
*********************************************/
|
||||
|
||||
/* If you are asked to put PLA in debug mode, this is how you do it: */
|
||||
# $config->custom->debug['level'] = 255;
|
||||
# $config->custom->debug['syslog'] = true;
|
||||
# $config->custom->debug['file'] = '/tmp/pla_debug.log';
|
||||
|
||||
/* phpLDAPadmin can encrypt the content of sensitive cookies if you set this
|
||||
to a big random string. */
|
||||
// $config->custom->session['blowfish'] = null;
|
||||
|
||||
/* If your auth_type is http, you can override your HTTP Authentication Realm. */
|
||||
// $config->custom->session['http_realm'] = sprintf('%s %s',app_name(),'login');
|
||||
|
||||
/* The language setting. If you set this to 'auto', phpLDAPadmin will attempt
|
||||
to determine your language automatically.
|
||||
If PLA doesnt show (all) strings in your language, then you can do some
|
||||
translation at http://translations.launchpad.net/phpldapadmin and download
|
||||
the translation files, replacing those provided with PLA.
|
||||
(We'll pick up the translations before making the next release too!) */
|
||||
// $config->custom->appearance['language'] = 'auto';
|
||||
|
||||
/* The temporary storage directory where we will put jpegPhoto data
|
||||
This directory must be readable and writable by your web server. */
|
||||
// $config->custom->jpeg['tmpdir'] = '/tmp'; // Example for Unix systems
|
||||
# $config->custom->jpeg['tmpdir'] = 'c:\\temp'; // Example for Windows systems
|
||||
|
||||
/* Set this to (bool)true if you do NOT want a random salt used when
|
||||
calling crypt(). Instead, use the first two letters of the user's
|
||||
password. This is insecure but unfortunately needed for some older
|
||||
environments. */
|
||||
# $config->custom->password['no_random_crypt_salt'] = true;
|
||||
|
||||
/* PHP script timeout control. If php runs longer than this many seconds then
|
||||
PHP will stop with an Maximum Execution time error. Increase this value from
|
||||
the default if queries to your LDAP server are slow. The default is either
|
||||
30 seconds or the setting of max_exection_time if this is null. */
|
||||
// $config->custom->session['timelimit'] = 30;
|
||||
|
||||
/* Our local timezone
|
||||
This is to make sure that when we ask the system for the current time, we
|
||||
get the right local time. If this is not set, all time() calculations will
|
||||
assume UTC if you have not set PHP date.timezone. */
|
||||
// $config->custom->appearance['timezone'] = null;
|
||||
# $config->custom->appearance['timezone'] = 'Australia/Melbourne';
|
||||
|
||||
/*********************************************
|
||||
* Commands *
|
||||
*********************************************/
|
||||
|
||||
/* Command availability ; if you don't authorize a command the command
|
||||
links will not be shown and the command action will not be permitted.
|
||||
For better security, set also ACL in your ldap directory. */
|
||||
/*
|
||||
$config->custom->commands['cmd'] = array(
|
||||
'entry_internal_attributes_show' => true,
|
||||
'entry_refresh' => true,
|
||||
'oslinks' => true,
|
||||
'switch_template' => true
|
||||
);
|
||||
|
||||
$config->custom->commands['script'] = array(
|
||||
'add_attr_form' => true,
|
||||
'add_oclass_form' => true,
|
||||
'add_value_form' => true,
|
||||
'collapse' => true,
|
||||
'compare' => true,
|
||||
'compare_form' => true,
|
||||
'copy' => true,
|
||||
'copy_form' => true,
|
||||
'create' => true,
|
||||
'create_confirm' => true,
|
||||
'delete' => true,
|
||||
'delete_attr' => true,
|
||||
'delete_form' => true,
|
||||
'draw_tree_node' => true,
|
||||
'expand' => true,
|
||||
'export' => true,
|
||||
'export_form' => true,
|
||||
'import' => true,
|
||||
'import_form' => true,
|
||||
'login' => true,
|
||||
'logout' => true,
|
||||
'login_form' => true,
|
||||
'mass_delete' => true,
|
||||
'mass_edit' => true,
|
||||
'mass_update' => true,
|
||||
'modify_member_form' => true,
|
||||
'monitor' => true,
|
||||
'purge_cache' => true,
|
||||
'query_engine' => true,
|
||||
'rename' => true,
|
||||
'rename_form' => true,
|
||||
'rdelete' => true,
|
||||
'refresh' => true,
|
||||
'schema' => true,
|
||||
'server_info' => true,
|
||||
'show_cache' => true,
|
||||
'template_engine' => true,
|
||||
'update_confirm' => true,
|
||||
'update' => true
|
||||
);
|
||||
*/
|
||||
|
||||
/*********************************************
|
||||
* Appearance *
|
||||
*********************************************/
|
||||
|
||||
/* If you want to choose the appearance of the tree, specify a class name which
|
||||
inherits from the Tree class. */
|
||||
// $config->custom->appearance['tree'] = 'AJAXTree';
|
||||
# $config->custom->appearance['tree'] = 'HTMLTree';
|
||||
|
||||
/* Just show your custom templates. */
|
||||
// $config->custom->appearance['custom_templates_only'] = false;
|
||||
|
||||
/* Disable the default template. */
|
||||
// $config->custom->appearance['disable_default_template'] = false;
|
||||
|
||||
/* Hide the warnings for invalid objectClasses/attributes in templates. */
|
||||
// $config->custom->appearance['hide_template_warning'] = false;
|
||||
|
||||
/* Set to true if you would like to hide header and footer parts. */
|
||||
// $config->custom->appearance['minimalMode'] = false;
|
||||
|
||||
/* Configure what objects are shown in left hand tree */
|
||||
// $config->custom->appearance['tree_filter'] = '(objectclass=*)';
|
||||
|
||||
/* The height and width of the tree. If these values are not set, then
|
||||
no tree scroll bars are provided. */
|
||||
// $config->custom->appearance['tree_height'] = null;
|
||||
# $config->custom->appearance['tree_height'] = 600;
|
||||
// $config->custom->appearance['tree_width'] = null;
|
||||
# $config->custom->appearance['tree_width'] = 250;
|
||||
|
||||
/* Confirm create and update operations, allowing you to review the changes
|
||||
and optionally skip attributes during the create/update operation. */
|
||||
// $config->custom->confirm['create'] = true;
|
||||
// $config->custom->confirm['update'] = true;
|
||||
|
||||
/* Confirm copy operations, and treat them like create operations. This allows
|
||||
you to edit the attributes (thus changing any that might conflict with
|
||||
uniqueness) before creating the new entry. */
|
||||
// $config->custom->confirm['copy'] = true;
|
||||
|
||||
/*********************************************
|
||||
* User-friendly attribute translation *
|
||||
*********************************************/
|
||||
|
||||
/* Use this array to map attribute names to user friendly names. For example, if
|
||||
you don't want to see "facsimileTelephoneNumber" but rather "Fax". */
|
||||
// $config->custom->appearance['friendly_attrs'] = array();
|
||||
$config->custom->appearance['friendly_attrs'] = array(
|
||||
'facsimileTelephoneNumber' => 'Fax',
|
||||
'gid' => 'Group',
|
||||
'mail' => 'Email',
|
||||
'telephoneNumber' => 'Telephone',
|
||||
'uid' => 'User Name',
|
||||
'userPassword' => 'Password'
|
||||
);
|
||||
|
||||
/*********************************************
|
||||
* Hidden attributes *
|
||||
*********************************************/
|
||||
|
||||
/* You may want to hide certain attributes from being edited. If you want to
|
||||
hide attributes from the user, you should use your LDAP servers ACLs.
|
||||
NOTE: The user must be able to read the hide_attrs_exempt entry to be
|
||||
excluded. */
|
||||
// $config->custom->appearance['hide_attrs'] = array();
|
||||
# $config->custom->appearance['hide_attrs'] = array('objectClass');
|
||||
|
||||
/* Members of this list will be exempt from the hidden attributes. */
|
||||
// $config->custom->appearance['hide_attrs_exempt'] = null;
|
||||
# $config->custom->appearance['hide_attrs_exempt'] = 'cn=PLA UnHide,ou=Groups,c=AU';
|
||||
|
||||
/*********************************************
|
||||
* Read-only attributes *
|
||||
*********************************************/
|
||||
|
||||
/* You may want to phpLDAPadmin to display certain attributes as read only,
|
||||
meaning that users will not be presented a form for modifying those
|
||||
attributes, and they will not be allowed to be modified on the "back-end"
|
||||
either. You may configure this list here:
|
||||
NOTE: The user must be able to read the readonly_attrs_exempt entry to be
|
||||
excluded. */
|
||||
// $config->custom->appearance['readonly_attrs'] = array();
|
||||
|
||||
/* Members of this list will be exempt from the readonly attributes. */
|
||||
// $config->custom->appearance['readonly_attrs_exempt'] = null;
|
||||
# $config->custom->appearance['readonly_attrs_exempt'] = 'cn=PLA ReadWrite,ou=Groups,c=AU';
|
||||
|
||||
/*********************************************
|
||||
* Group attributes *
|
||||
*********************************************/
|
||||
|
||||
/* Add "modify group members" link to the attribute. */
|
||||
// $config->custom->modify_member['groupattr'] = array('member','uniqueMember','memberUid');
|
||||
|
||||
/* Configure filter for member search. This only applies to "modify group members" feature */
|
||||
// $config->custom->modify_member['filter'] = '(objectclass=Person)';
|
||||
|
||||
/* Attribute that is added to the group member attribute. */
|
||||
// $config->custom->modify_member['attr'] = 'dn';
|
||||
|
||||
/* For Posix attributes */
|
||||
// $config->custom->modify_member['posixattr'] = 'uid';
|
||||
// $config->custom->modify_member['posixfilter'] = '(uid=*)';
|
||||
// $config->custom->modify_member['posixgroupattr'] = 'memberUid';
|
||||
|
||||
/*********************************************
|
||||
* Support for attrs display order *
|
||||
*********************************************/
|
||||
|
||||
/* Use this array if you want to have your attributes displayed in a specific
|
||||
order. You can use default attribute names or their fridenly names.
|
||||
For example, "sn" will be displayed right after "givenName". All the other
|
||||
attributes that are not specified in this array will be displayed after in
|
||||
alphabetical order. */
|
||||
// $config->custom->appearance['attr_display_order'] = array();
|
||||
# $config->custom->appearance['attr_display_order'] = array(
|
||||
# 'givenName',
|
||||
# 'sn',
|
||||
# 'cn',
|
||||
# 'displayName',
|
||||
# 'uid',
|
||||
# 'uidNumber',
|
||||
# 'gidNumber',
|
||||
# 'homeDirectory',
|
||||
# 'mail',
|
||||
# 'userPassword'
|
||||
# );
|
||||
|
||||
/*********************************************
|
||||
* Define your LDAP servers in this section *
|
||||
*********************************************/
|
||||
|
||||
$servers = new Datastore();
|
||||
|
||||
/* $servers->NewServer('ldap_pla') must be called before each new LDAP server
|
||||
declaration. */
|
||||
$servers->newServer('ldap_pla');
|
||||
|
||||
/* A convenient name that will appear in the tree viewer and throughout
|
||||
phpLDAPadmin to identify this LDAP server to users. */
|
||||
$servers->setValue('server','name','Test LDAP Server');
|
||||
|
||||
/* Examples:
|
||||
'ldap.example.com',
|
||||
'ldaps://ldap.example.com/',
|
||||
'ldapi://%2fusr%local%2fvar%2frun%2fldapi'
|
||||
(Unix socket at /usr/local/var/run/ldap) */
|
||||
$servers->setValue('server','host','ldap');
|
||||
|
||||
/* The port your LDAP server listens on (no quotes). 389 is standard. */
|
||||
$servers->setValue('server','port',389);
|
||||
|
||||
/* Array of base DNs of your LDAP server. Leave this blank to have phpLDAPadmin
|
||||
auto-detect it for you. */
|
||||
$servers->setValue('server','base',array('dc=test,dc=de'));
|
||||
|
||||
/* Five options for auth_type:
|
||||
1. 'cookie': you will login via a web form, and a client-side cookie will
|
||||
store your login dn and password.
|
||||
2. 'session': same as cookie but your login dn and password are stored on the
|
||||
web server in a persistent session variable.
|
||||
3. 'http': same as session but your login dn and password are retrieved via
|
||||
HTTP authentication.
|
||||
4. 'config': specify your login dn and password here in this config file. No
|
||||
login will be required to use phpLDAPadmin for this server.
|
||||
5. 'sasl': login will be taken from the webserver's kerberos authentication.
|
||||
Currently only GSSAPI has been tested (using mod_auth_kerb).
|
||||
|
||||
Choose wisely to protect your authentication information appropriately for
|
||||
your situation. If you choose 'cookie', your cookie contents will be
|
||||
encrypted using blowfish and the secret your specify above as
|
||||
session['blowfish']. */
|
||||
// $servers->setValue('login','auth_type','session');
|
||||
|
||||
/* The DN of the user for phpLDAPadmin to bind with. For anonymous binds or
|
||||
'cookie','session' or 'sasl' auth_types, LEAVE THE LOGIN_DN AND LOGIN_PASS
|
||||
BLANK. If you specify a login_attr in conjunction with a cookie or session
|
||||
auth_type, then you can also specify the bind_id/bind_pass here for searching
|
||||
the directory for users (ie, if your LDAP server does not allow anonymous
|
||||
binds. */
|
||||
// $servers->setValue('login','bind_id','');
|
||||
$servers->setValue('login','bind_id','cn=admin,dc=test,dc=de');
|
||||
|
||||
/* Your LDAP password. If you specified an empty bind_id above, this MUST also
|
||||
be blank. */
|
||||
// $servers->setValue('login','bind_pass','');
|
||||
# $servers->setValue('login','bind_pass','secret');
|
||||
|
||||
/* Use TLS (Transport Layer Security) to connect to the LDAP server. */
|
||||
// $servers->setValue('server','tls',false);
|
||||
|
||||
/************************************
|
||||
* SASL Authentication *
|
||||
************************************/
|
||||
|
||||
/* Enable SASL authentication LDAP SASL authentication requires PHP 5.x
|
||||
configured with --with-ldap-sasl=DIR. If this option is disabled (ie, set to
|
||||
false), then all other sasl options are ignored. */
|
||||
// $servers->setValue('login','auth_type','sasl');
|
||||
|
||||
/* SASL auth mechanism */
|
||||
// $servers->setValue('sasl','mech','GSSAPI');
|
||||
|
||||
/* SASL authentication realm name */
|
||||
// $servers->setValue('sasl','realm','');
|
||||
# $servers->setValue('sasl','realm','EXAMPLE.COM');
|
||||
|
||||
/* SASL authorization ID name
|
||||
If this option is undefined, authorization id will be computed from bind DN,
|
||||
using authz_id_regex and authz_id_replacement. */
|
||||
// $servers->setValue('sasl','authz_id', null);
|
||||
|
||||
/* SASL authorization id regex and replacement
|
||||
When authz_id property is not set (default), phpLDAPAdmin will try to
|
||||
figure out authorization id by itself from bind distinguished name (DN).
|
||||
|
||||
This procedure is done by calling preg_replace() php function in the
|
||||
following way:
|
||||
|
||||
$authz_id = preg_replace($sasl_authz_id_regex,$sasl_authz_id_replacement,
|
||||
$bind_dn);
|
||||
|
||||
For info about pcre regexes, see:
|
||||
- pcre(3), perlre(3)
|
||||
- http://www.php.net/preg_replace */
|
||||
// $servers->setValue('sasl','authz_id_regex',null);
|
||||
// $servers->setValue('sasl','authz_id_replacement',null);
|
||||
# $servers->setValue('sasl','authz_id_regex','/^uid=([^,]+)(.+)/i');
|
||||
# $servers->setValue('sasl','authz_id_replacement','$1');
|
||||
|
||||
/* SASL auth security props.
|
||||
See http://beepcore-tcl.sourceforge.net/tclsasl.html#anchor5 for explanation. */
|
||||
// $servers->setValue('sasl','props',null);
|
||||
|
||||
/* Default password hashing algorithm. One of md5, ssha, sha, md5crpyt, smd5,
|
||||
blowfish, crypt or leave blank for now default algorithm. */
|
||||
// $servers->setValue('appearance','password_hash','md5');
|
||||
|
||||
/* If you specified 'cookie' or 'session' as the auth_type above, you can
|
||||
optionally specify here an attribute to use when logging in. If you enter
|
||||
'uid' and login as 'dsmith', phpLDAPadmin will search for (uid=dsmith)
|
||||
and log in as that user.
|
||||
Leave blank or specify 'dn' to use full DN for logging in. Note also that if
|
||||
your LDAP server requires you to login to perform searches, you can enter the
|
||||
DN to use when searching in 'bind_id' and 'bind_pass' above. */
|
||||
// $servers->setValue('login','attr','dn');
|
||||
|
||||
/* Base DNs to used for logins. If this value is not set, then the LDAP server
|
||||
Base DNs are used. */
|
||||
// $servers->setValue('login','base',array());
|
||||
|
||||
/* If 'login,attr' is used above such that phpLDAPadmin will search for your DN
|
||||
at login, you may restrict the search to a specific objectClasses. EG, set this
|
||||
to array('posixAccount') or array('inetOrgPerson',..), depending upon your
|
||||
setup. */
|
||||
// $servers->setValue('login','class',array());
|
||||
|
||||
/* If you specified something different from 'dn', for example 'uid', as the
|
||||
login_attr above, you can optionally specify here to fall back to
|
||||
authentication with dn.
|
||||
This is useful, when users should be able to log in with their uid, but
|
||||
the ldap administrator wants to log in with his root-dn, that does not
|
||||
necessarily have the uid attribute.
|
||||
When using this feature, login_class is ignored. */
|
||||
// $servers->setValue('login','fallback_dn',false);
|
||||
|
||||
/* Specify true If you want phpLDAPadmin to not display or permit any
|
||||
modification to the LDAP server. */
|
||||
// $servers->setValue('server','read_only',false);
|
||||
|
||||
/* Specify false if you do not want phpLDAPadmin to draw the 'Create new' links
|
||||
in the tree viewer. */
|
||||
// $servers->setValue('appearance','show_create',true);
|
||||
|
||||
/* Set to true if you would like to initially open the first level of each tree. */
|
||||
// $servers->setValue('appearance','open_tree',false);
|
||||
|
||||
/* This feature allows phpLDAPadmin to automatically determine the next
|
||||
available uidNumber for a new entry. */
|
||||
// $servers->setValue('auto_number','enable',true);
|
||||
|
||||
/* The mechanism to use when finding the next available uidNumber. Two possible
|
||||
values: 'uidpool' or 'search'.
|
||||
The 'uidpool' mechanism uses an existing uidPool entry in your LDAP server to
|
||||
blindly lookup the next available uidNumber. The 'search' mechanism searches
|
||||
for entries with a uidNumber value and finds the first available uidNumber
|
||||
(slower). */
|
||||
// $servers->setValue('auto_number','mechanism','search');
|
||||
|
||||
/* The DN of the search base when the 'search' mechanism is used above. */
|
||||
# $servers->setValue('auto_number','search_base','ou=People,dc=example,dc=com');
|
||||
|
||||
/* The minimum number to use when searching for the next available number
|
||||
(only when 'search' is used for auto_number. */
|
||||
// $servers->setValue('auto_number','min',array('uidNumber'=>1000,'gidNumber'=>500));
|
||||
|
||||
/* If you set this, then phpldapadmin will bind to LDAP with this user ID when
|
||||
searching for the uidnumber. The idea is, this user id would have full
|
||||
(readonly) access to uidnumber in your ldap directory (the logged in user
|
||||
may not), so that you can be guaranteed to get a unique uidnumber for your
|
||||
directory. */
|
||||
// $servers->setValue('auto_number','dn',null);
|
||||
|
||||
/* The password for the dn above. */
|
||||
// $servers->setValue('auto_number','pass',null);
|
||||
|
||||
/* Enable anonymous bind login. */
|
||||
// $servers->setValue('login','anon_bind',true);
|
||||
|
||||
/* Use customized page with prefix when available. */
|
||||
# $servers->setValue('custom','pages_prefix','custom_');
|
||||
|
||||
/* If you set this, then only these DNs are allowed to log in. This array can
|
||||
contain individual users, groups or ldap search filter(s). Keep in mind that
|
||||
the user has not authenticated yet, so this will be an anonymous search to
|
||||
the LDAP server, so make your ACLs allow these searches to return results! */
|
||||
# $servers->setValue('login','allowed_dns',array(
|
||||
# 'uid=stran,ou=People,dc=example,dc=com',
|
||||
# '(&(gidNumber=811)(objectClass=groupOfNames))',
|
||||
# '(|(uidNumber=200)(uidNumber=201))',
|
||||
# 'cn=callcenter,ou=Group,dc=example,dc=com'));
|
||||
|
||||
/* Set this if you dont want this LDAP server to show in the tree */
|
||||
// $servers->setValue('server','visible',true);
|
||||
|
||||
/* Set this if you want to hide the base DNs that dont exist instead of
|
||||
displaying the message "The base entry doesnt exist, create it?"
|
||||
// $servers->setValue('server','hide_noaccess_base',false);
|
||||
# $servers->setValue('server','hide_noaccess_base',true);
|
||||
|
||||
/* This is the time out value in minutes for the server. After as many minutes
|
||||
of inactivity you will be automatically logged out. If not set, the default
|
||||
value will be ( session_cache_expire()-1 ) */
|
||||
# $servers->setValue('login','timeout',30);
|
||||
|
||||
/* Set this if you want phpldapadmin to perform rename operation on entry which
|
||||
has children. Certain servers are known to allow it, certain are not. */
|
||||
// $servers->setValue('server','branch_rename',false);
|
||||
|
||||
/* If you set this, then phpldapadmin will show these attributes as
|
||||
internal attributes, even if they are not defined in your schema. */
|
||||
// $servers->setValue('server','custom_sys_attrs',array(''));
|
||||
# $servers->setValue('server','custom_sys_attrs',array('passwordExpirationTime','passwordAllowChangeTime'));
|
||||
|
||||
/* If you set this, then phpldapadmin will show these attributes on
|
||||
objects, even if they are not defined in your schema. */
|
||||
// $servers->setValue('server','custom_attrs',array(''));
|
||||
# $servers->setValue('server','custom_attrs',array('nsRoleDN','nsRole','nsAccountLock'));
|
||||
|
||||
/* These attributes will be forced to MAY attributes and become option in the
|
||||
templates. If they are not defined in the templates, then they wont appear
|
||||
as per normal template processing. You may want to do this because your LDAP
|
||||
server may automatically calculate a default value.
|
||||
In Fedora Directory Server using the DNA Plugin one could ignore uidNumber,
|
||||
gidNumber and sambaSID. */
|
||||
// $servers->setValue('server','force_may',array(''));
|
||||
# $servers->setValue('server','force_may',array('uidNumber','gidNumber','sambaSID'));
|
||||
|
||||
/*********************************************
|
||||
* Unique attributes *
|
||||
*********************************************/
|
||||
|
||||
/* You may want phpLDAPadmin to enforce some attributes to have unique values
|
||||
(ie: not belong to other entries in your tree. This (together with
|
||||
'unique','dn' and 'unique','pass' option will not let updates to
|
||||
occur with other attributes have the same value. */
|
||||
# $servers->setValue('unique','attrs',array('mail','uid','uidNumber'));
|
||||
|
||||
/* If you set this, then phpldapadmin will bind to LDAP with this user ID when
|
||||
searching for attribute uniqueness. The idea is, this user id would have full
|
||||
(readonly) access to your ldap directory (the logged in user may not), so
|
||||
that you can be guaranteed to get a unique uidnumber for your directory. */
|
||||
// $servers->setValue('unique','dn',null);
|
||||
|
||||
/* The password for the dn above. */
|
||||
// $servers->setValue('unique','pass',null);
|
||||
|
||||
/**************************************************************************
|
||||
* If you want to configure additional LDAP servers, do so below. *
|
||||
* Remove the commented lines and use this section as a template for all *
|
||||
* your other LDAP servers. *
|
||||
**************************************************************************/
|
||||
|
||||
/*
|
||||
$servers->newServer('ldap_pla');
|
||||
$servers->setValue('server','name','LDAP Server');
|
||||
$servers->setValue('server','host','127.0.0.1');
|
||||
$servers->setValue('server','port',389);
|
||||
$servers->setValue('server','base',array(''));
|
||||
$servers->setValue('login','auth_type','cookie');
|
||||
$servers->setValue('login','bind_id','');
|
||||
$servers->setValue('login','bind_pass','');
|
||||
$servers->setValue('server','tls',false);
|
||||
|
||||
# SASL auth
|
||||
$servers->setValue('login','auth_type','sasl');
|
||||
$servers->setValue('sasl','mech','GSSAPI');
|
||||
$servers->setValue('sasl','realm','EXAMPLE.COM');
|
||||
$servers->setValue('sasl','authz_id',null);
|
||||
$servers->setValue('sasl','authz_id_regex','/^uid=([^,]+)(.+)/i');
|
||||
$servers->setValue('sasl','authz_id_replacement','$1');
|
||||
$servers->setValue('sasl','props',null);
|
||||
|
||||
$servers->setValue('appearance','password_hash','md5');
|
||||
$servers->setValue('login','attr','dn');
|
||||
$servers->setValue('login','fallback_dn',false);
|
||||
$servers->setValue('login','class',null);
|
||||
$servers->setValue('server','read_only',false);
|
||||
$servers->setValue('appearance','show_create',true);
|
||||
|
||||
$servers->setValue('auto_number','enable',true);
|
||||
$servers->setValue('auto_number','mechanism','search');
|
||||
$servers->setValue('auto_number','search_base',null);
|
||||
$servers->setValue('auto_number','min',array('uidNumber'=>1000,'gidNumber'=>500));
|
||||
$servers->setValue('auto_number','dn',null);
|
||||
$servers->setValue('auto_number','pass',null);
|
||||
|
||||
$servers->setValue('login','anon_bind',true);
|
||||
$servers->setValue('custom','pages_prefix','custom_');
|
||||
$servers->setValue('unique','attrs',array('mail','uid','uidNumber'));
|
||||
$servers->setValue('unique','dn',null);
|
||||
$servers->setValue('unique','pass',null);
|
||||
|
||||
$servers->setValue('server','visible',true);
|
||||
$servers->setValue('login','timeout',30);
|
||||
$servers->setValue('server','branch_rename',false);
|
||||
$servers->setValue('server','custom_sys_attrs',array('passwordExpirationTime','passwordAllowChangeTime'));
|
||||
$servers->setValue('server','custom_attrs',array('nsRoleDN','nsRole','nsAccountLock'));
|
||||
$servers->setValue('server','force_may',array('uidNumber','gidNumber','sambaSID'));
|
||||
*/
|
||||
?>
|
||||
|
||||
28
docker/ldap/data/etc/DB_CONFIG.example
Normal file
28
docker/ldap/data/etc/DB_CONFIG.example
Normal file
@ -0,0 +1,28 @@
|
||||
# $OpenLDAP$
|
||||
# Example DB_CONFIG file for use with slapd(8) BDB/HDB databases.
|
||||
#
|
||||
# See the Oracle Berkeley DB documentation
|
||||
# <http://www.oracle.com/technology/documentation/berkeley-db/db/ref/env/db_config.html>
|
||||
# for detail description of DB_CONFIG syntax and semantics.
|
||||
#
|
||||
# Hints can also be found in the OpenLDAP Software FAQ
|
||||
# <http://www.openldap.org/faq/index.cgi?file=2>
|
||||
# in particular:
|
||||
# <http://www.openldap.org/faq/index.cgi?file=1075>
|
||||
|
||||
# Note: most DB_CONFIG settings will take effect only upon rebuilding
|
||||
# the DB environment.
|
||||
|
||||
# one 0.25 GB cache
|
||||
set_cachesize 0 268435456 1
|
||||
|
||||
# Data Directory
|
||||
#set_data_dir db
|
||||
|
||||
# Transaction Log settings
|
||||
set_lg_regionmax 262144
|
||||
set_lg_bsize 2097152
|
||||
#set_lg_dir logs
|
||||
|
||||
# Note: special DB_CONFIG flags are no longer needed for "quick"
|
||||
# slapadd(8) or slapindex(8) access (see their -q option).
|
||||
13
docker/ldap/data/etc/ldap.conf
Normal file
13
docker/ldap/data/etc/ldap.conf
Normal file
@ -0,0 +1,13 @@
|
||||
#
|
||||
# LDAP Defaults
|
||||
#
|
||||
|
||||
# See ldap.conf(5) for details
|
||||
# This file should be world readable but not world writable.
|
||||
|
||||
#BASE dc=example,dc=com
|
||||
#URI ldap://ldap.example.com ldap://ldap-master.example.com:666
|
||||
|
||||
#SIZELIMIT 12
|
||||
#TIMELIMIT 15
|
||||
#DEREF never
|
||||
80
docker/ldap/data/etc/schema/README
Normal file
80
docker/ldap/data/etc/schema/README
Normal file
@ -0,0 +1,80 @@
|
||||
This directory contains user application schema definitions for use
|
||||
with slapd(8).
|
||||
|
||||
File Description
|
||||
---- -----------
|
||||
collective.schema Collective attributes (experimental)
|
||||
corba.schema Corba Object
|
||||
core.schema OpenLDAP "core"
|
||||
cosine.schema COSINE Pilot
|
||||
duaconf.schema Client Configuration (work in progress)
|
||||
dyngroup.schema Dynamic Group (experimental)
|
||||
inetorgperson.schema InetOrgPerson
|
||||
java.schema Java Object
|
||||
misc.schema Miscellaneous Schema (experimental)
|
||||
nadf.schema North American Directory Forum (obsolete)
|
||||
nis.schema Network Information Service (experimental)
|
||||
openldap.schema OpenLDAP Project (FYI)
|
||||
ppolicy.schema Password Policy Schema (work in progress)
|
||||
|
||||
Additional "generally useful" schema definitions can be submitted
|
||||
using the OpenLDAP Issue Tracking System <http://www.openldap.org/its/>.
|
||||
Submissions should include a stable reference to a mature, open
|
||||
technical specification (e.g., an RFC) for the schema.
|
||||
|
||||
The core.ldif and openldap.ldif files are equivalent to their
|
||||
corresponding .schema files. They have been provided as examples
|
||||
for use with the dynamic configuration backend. These example files
|
||||
are not actually necessary since slapd will automatically convert any
|
||||
included *.schema files into LDIF when converting a slapd.conf file
|
||||
to a configuration database, but they serve as a model of how to
|
||||
convert schema files in general.
|
||||
|
||||
---
|
||||
|
||||
This notice applies to all files in this directory.
|
||||
|
||||
Copyright 1998-2017 The OpenLDAP Foundation, Redwood City, California, USA
|
||||
All rights reserved.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted only as authorized by the OpenLDAP
|
||||
Public License. A copy of this license is available at
|
||||
http://www.OpenLDAP.org/license.html or in file LICENSE in the
|
||||
top-level directory of the distribution.
|
||||
|
||||
---
|
||||
|
||||
This notice applies to all schema in this directory which are derived
|
||||
from RFCs and other IETF documents.
|
||||
|
||||
Portions Copyright 1991-2004, The Internet Society. All Rights Reserved.
|
||||
|
||||
This document and translations of it may be copied and furnished
|
||||
to others, and derivative works that comment on or otherwise explain
|
||||
it or assist in its implementation may be prepared, copied, published
|
||||
and distributed, in whole or in part, without restriction of any
|
||||
kind, provided that the above copyright notice and this paragraph
|
||||
are included on all such copies and derivative works. However,
|
||||
this document itself may not be modified in any way, such as by
|
||||
removing the copyright notice or references to the Internet Society
|
||||
or other Internet organizations, except as needed for the purpose
|
||||
of developing Internet standards in which case the procedures for
|
||||
copyrights defined in the Internet Standards process must be
|
||||
followed, or as required to translate it into languages other than
|
||||
English.
|
||||
|
||||
The limited permissions granted above are perpetual and will not
|
||||
be revoked by the Internet Society or its successors or assigns.
|
||||
|
||||
This document and the information contained herein is provided on
|
||||
an "AS IS" basis and THE AUTHORS, THE INTERNET SOCIETY, AND THE
|
||||
INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS
|
||||
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE
|
||||
OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY
|
||||
IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
|
||||
PURPOSE.
|
||||
|
||||
|
||||
---
|
||||
$OpenLDAP$
|
||||
48
docker/ldap/data/etc/schema/collective.ldif
Normal file
48
docker/ldap/data/etc/schema/collective.ldif
Normal file
@ -0,0 +1,48 @@
|
||||
# collective.ldif -- Collective attribute schema
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
## Portions Copyright (C) The Internet Society (2003).
|
||||
## Please see full copyright statement below.
|
||||
#
|
||||
# From RFC 3671 [portions trimmed]:
|
||||
# Collective Attributes in LDAP
|
||||
#
|
||||
# This file was automatically generated from collective.schema; see that file
|
||||
# for complete references.
|
||||
#
|
||||
dn: cn=collective,cn=schema,cn=config
|
||||
objectClass: olcSchemaConfig
|
||||
cn: collective
|
||||
olcAttributeTypes: {0}( 2.5.4.7.1 NAME 'c-l' SUP l COLLECTIVE )
|
||||
olcAttributeTypes: {1}( 2.5.4.8.1 NAME 'c-st' SUP st COLLECTIVE )
|
||||
olcAttributeTypes: {2}( 2.5.4.9.1 NAME 'c-street' SUP street COLLECTIVE )
|
||||
olcAttributeTypes: {3}( 2.5.4.10.1 NAME 'c-o' SUP o COLLECTIVE )
|
||||
olcAttributeTypes: {4}( 2.5.4.11.1 NAME 'c-ou' SUP ou COLLECTIVE )
|
||||
olcAttributeTypes: {5}( 2.5.4.16.1 NAME 'c-PostalAddress' SUP postalAddress CO
|
||||
LLECTIVE )
|
||||
olcAttributeTypes: {6}( 2.5.4.17.1 NAME 'c-PostalCode' SUP postalCode COLLECTI
|
||||
VE )
|
||||
olcAttributeTypes: {7}( 2.5.4.18.1 NAME 'c-PostOfficeBox' SUP postOfficeBox CO
|
||||
LLECTIVE )
|
||||
olcAttributeTypes: {8}( 2.5.4.19.1 NAME 'c-PhysicalDeliveryOfficeName' SUP phy
|
||||
sicalDeliveryOfficeName COLLECTIVE )
|
||||
olcAttributeTypes: {9}( 2.5.4.20.1 NAME 'c-TelephoneNumber' SUP telephoneNumbe
|
||||
r COLLECTIVE )
|
||||
olcAttributeTypes: {10}( 2.5.4.21.1 NAME 'c-TelexNumber' SUP telexNumber COLLE
|
||||
CTIVE )
|
||||
olcAttributeTypes: {11}( 2.5.4.23.1 NAME 'c-FacsimileTelephoneNumber' SUP facs
|
||||
imileTelephoneNumber COLLECTIVE )
|
||||
olcAttributeTypes: {12}( 2.5.4.25.1 NAME 'c-InternationalISDNNumber' SUP inter
|
||||
nationalISDNNumber COLLECTIVE )
|
||||
190
docker/ldap/data/etc/schema/collective.schema
Normal file
190
docker/ldap/data/etc/schema/collective.schema
Normal file
@ -0,0 +1,190 @@
|
||||
# collective.schema -- Collective attribute schema
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
## Portions Copyright (C) The Internet Society (2003).
|
||||
## Please see full copyright statement below.
|
||||
|
||||
# From RFC 3671 [portions trimmed]:
|
||||
# Collective Attributes in LDAP
|
||||
|
||||
#Abstract
|
||||
#
|
||||
# X.500 collective attributes allow common characteristics to be shared
|
||||
# between collections of entries. This document summarizes the X.500
|
||||
# information model for collective attributes and describes use of
|
||||
# collective attributes in LDAP (Lightweight Directory Access Protocol).
|
||||
# This document provides schema definitions for collective attributes
|
||||
# for use in LDAP.
|
||||
|
||||
#3. Collective Attribute Types
|
||||
#
|
||||
# A userApplications attribute type can be defined to be COLLECTIVE
|
||||
# [RFC2252]. This indicates that the same attribute values will appear
|
||||
# in the entries of an entry collection subject to the use of the
|
||||
# collectiveExclusions attribute and other administrative controls.
|
||||
#
|
||||
# Collective attribute types are commonly defined as subtypes of non-
|
||||
# collective attribute types. By convention, collective attributes are
|
||||
# named by prefixing the name of their non-collective supertype with
|
||||
# "c-". For example, the collective telephone attribute is named
|
||||
# c-TelephoneNumber after its non-collective supertype telephoneNumber.
|
||||
#
|
||||
# Non-collective attributes types SHALL NOT subtype collective
|
||||
# attributes.
|
||||
#
|
||||
# Collective attributes SHALL NOT be SINGLE-VALUED. Collective
|
||||
# attribute types SHALL NOT appear in the attribute types of an object
|
||||
# class definition.
|
||||
#
|
||||
# Operational attributes SHALL NOT be defined to be collective.
|
||||
#
|
||||
# The remainder of section provides a summary of collective attributes
|
||||
# derived from those defined in [X.520]. Implementations of this
|
||||
# specification SHOULD support the following collective attributes and
|
||||
# MAY support additional collective attributes.
|
||||
#
|
||||
#
|
||||
#3.1. Collective Locality Name
|
||||
#
|
||||
# The c-l attribute type specifies a locality name for a collection of
|
||||
# entries.
|
||||
#
|
||||
attributeType ( 2.5.4.7.1 NAME 'c-l'
|
||||
SUP l COLLECTIVE )
|
||||
#
|
||||
#
|
||||
#3.2. Collective State or Province Name
|
||||
#
|
||||
# The c-st attribute type specifies a state or province name for a
|
||||
# collection of entries.
|
||||
#
|
||||
attributeType ( 2.5.4.8.1 NAME 'c-st'
|
||||
SUP st COLLECTIVE )
|
||||
#
|
||||
#
|
||||
#3.3. Collective Street Address
|
||||
#
|
||||
# The c-street attribute type specifies a street address for a
|
||||
# collection of entries.
|
||||
#
|
||||
attributeType ( 2.5.4.9.1 NAME 'c-street'
|
||||
SUP street COLLECTIVE )
|
||||
#
|
||||
#
|
||||
#3.4. Collective Organization Name
|
||||
#
|
||||
# The c-o attribute type specifies an organization name for a collection
|
||||
# of entries.
|
||||
#
|
||||
attributeType ( 2.5.4.10.1 NAME 'c-o'
|
||||
SUP o COLLECTIVE )
|
||||
#
|
||||
#
|
||||
#3.5. Collective Organizational Unit Name
|
||||
#
|
||||
# The c-ou attribute type specifies an organizational unit name for a
|
||||
# collection of entries.
|
||||
#
|
||||
attributeType ( 2.5.4.11.1 NAME 'c-ou'
|
||||
SUP ou COLLECTIVE )
|
||||
#
|
||||
#
|
||||
#3.6. Collective Postal Address
|
||||
#
|
||||
# The c-PostalAddress attribute type specifies a postal address for a
|
||||
# collection of entries.
|
||||
#
|
||||
attributeType ( 2.5.4.16.1 NAME 'c-PostalAddress'
|
||||
SUP postalAddress COLLECTIVE )
|
||||
#
|
||||
#
|
||||
#3.7. Collective Postal Code
|
||||
#
|
||||
# The c-PostalCode attribute type specifies a postal code for a
|
||||
# collection of entries.
|
||||
#
|
||||
attributeType ( 2.5.4.17.1 NAME 'c-PostalCode'
|
||||
SUP postalCode COLLECTIVE )
|
||||
#
|
||||
#
|
||||
#3.8. Collective Post Office Box
|
||||
#
|
||||
# The c-PostOfficeBox attribute type specifies a post office box for a
|
||||
# collection of entries.
|
||||
#
|
||||
attributeType ( 2.5.4.18.1 NAME 'c-PostOfficeBox'
|
||||
SUP postOfficeBox COLLECTIVE )
|
||||
#
|
||||
#
|
||||
#3.9. Collective Physical Delivery Office Name
|
||||
#
|
||||
# The c-PhysicalDeliveryOfficeName attribute type specifies a physical
|
||||
# delivery office name for a collection of entries.
|
||||
#
|
||||
attributeType ( 2.5.4.19.1 NAME 'c-PhysicalDeliveryOfficeName'
|
||||
SUP physicalDeliveryOfficeName COLLECTIVE )
|
||||
#
|
||||
#
|
||||
#3.10. Collective Telephone Number
|
||||
#
|
||||
# The c-TelephoneNumber attribute type specifies a telephone number for
|
||||
# a collection of entries.
|
||||
#
|
||||
attributeType ( 2.5.4.20.1 NAME 'c-TelephoneNumber'
|
||||
SUP telephoneNumber COLLECTIVE )
|
||||
#
|
||||
#
|
||||
#3.11. Collective Telex Number
|
||||
#
|
||||
# The c-TelexNumber attribute type specifies a telex number for a
|
||||
# collection of entries.
|
||||
#
|
||||
attributeType ( 2.5.4.21.1 NAME 'c-TelexNumber'
|
||||
SUP telexNumber COLLECTIVE )
|
||||
#
|
||||
#
|
||||
#3.13. Collective Facsimile Telephone Number
|
||||
#
|
||||
# The c-FacsimileTelephoneNumber attribute type specifies a facsimile
|
||||
# telephone number for a collection of entries.
|
||||
#
|
||||
attributeType ( 2.5.4.23.1 NAME 'c-FacsimileTelephoneNumber'
|
||||
SUP facsimileTelephoneNumber COLLECTIVE )
|
||||
#
|
||||
#
|
||||
#3.14. Collective International ISDN Number
|
||||
#
|
||||
# The c-InternationalISDNNumber attribute type specifies an
|
||||
# international ISDN number for a collection of entries.
|
||||
#
|
||||
attributeType ( 2.5.4.25.1 NAME 'c-InternationalISDNNumber'
|
||||
SUP internationalISDNNumber COLLECTIVE )
|
||||
|
||||
# Full Copyright
|
||||
#
|
||||
# Copyright (C) The Internet Society (2003). All Rights Reserved.
|
||||
#
|
||||
# This document and translations of it may be copied and furnished
|
||||
# to others, and derivative works that comment on or otherwise explain
|
||||
# it or assist in its implmentation may be prepared, copied, published
|
||||
# and distributed, in whole or in part, without restriction of any
|
||||
# kind, provided that the above copyright notice and this paragraph
|
||||
# are included on all such copies and derivative works. However,
|
||||
# this document itself may not be modified in any way, such as by
|
||||
# removing the copyright notice or references to the Internet Society
|
||||
# or other Internet organizations, except as needed for the purpose
|
||||
# of developing Internet standards in which case the procedures for
|
||||
# copyrights defined in the Internet Standards process must be followed,
|
||||
# or as required to translate it into languages other than English.
|
||||
42
docker/ldap/data/etc/schema/corba.ldif
Normal file
42
docker/ldap/data/etc/schema/corba.ldif
Normal file
@ -0,0 +1,42 @@
|
||||
# corba.ldif -- Corba Object Schema
|
||||
# depends upon core.ldif
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
## Portions Copyright (C) The Internet Society (1999).
|
||||
## Please see full copyright statement below.
|
||||
#
|
||||
# From RFC 2714 [portions trimmed]:
|
||||
# Schema for Representing CORBA Object References in an LDAP Directory
|
||||
#
|
||||
# This file was automatically generated from corba.schema; see that file
|
||||
# for complete references.
|
||||
#
|
||||
dn: cn=corba,cn=schema,cn=config
|
||||
objectClass: olcSchemaConfig
|
||||
cn: corba
|
||||
olcAttributeTypes: {0}( 1.3.6.1.4.1.42.2.27.4.1.14 NAME 'corbaIor' DESC 'Strin
|
||||
gified interoperable object reference of a CORBA object' EQUALITY caseIgnoreI
|
||||
A5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||
olcAttributeTypes: {1}( 1.3.6.1.4.1.42.2.27.4.1.15 NAME 'corbaRepositoryId' DE
|
||||
SC 'Repository ids of interfaces implemented by a CORBA object' EQUALITY case
|
||||
ExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
olcObjectClasses: {0}( 1.3.6.1.4.1.42.2.27.4.2.10 NAME 'corbaContainer' DESC '
|
||||
Container for a CORBA object' SUP top STRUCTURAL MUST cn )
|
||||
olcObjectClasses: {1}( 1.3.6.1.4.1.42.2.27.4.2.9 NAME 'corbaObject' DESC 'CORB
|
||||
A object representation' SUP top ABSTRACT MAY ( corbaRepositoryId $ descripti
|
||||
on ) )
|
||||
olcObjectClasses: {2}( 1.3.6.1.4.1.42.2.27.4.2.11 NAME 'corbaObjectReference'
|
||||
DESC 'CORBA interoperable object reference' SUP corbaObject AUXILIARY MUST co
|
||||
rbaIor )
|
||||
239
docker/ldap/data/etc/schema/corba.schema
Normal file
239
docker/ldap/data/etc/schema/corba.schema
Normal file
@ -0,0 +1,239 @@
|
||||
# corba.schema -- Corba Object Schema
|
||||
# depends upon core.schema
|
||||
# $OpenLDAP$
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
## Portions Copyright (C) The Internet Society (1999).
|
||||
## Please see full copyright statement below.
|
||||
|
||||
|
||||
# Network Working Group V. Ryan
|
||||
# Request for Comments: 2714 R. Lee
|
||||
# Category: Informational S. Seligman
|
||||
# Sun Microsystems, Inc.
|
||||
# October 1999
|
||||
#
|
||||
#
|
||||
# Schema for Representing CORBA Object References in an LDAP Directory
|
||||
#
|
||||
# Status of this Memo
|
||||
#
|
||||
# This memo provides information for the Internet community. It does
|
||||
# not specify an Internet standard of any kind. Distribution of this
|
||||
# memo is unlimited.
|
||||
#
|
||||
# Copyright Notice
|
||||
#
|
||||
# Copyright (C) The Internet Society (1999). All Rights Reserved.
|
||||
#
|
||||
# Abstract
|
||||
#
|
||||
# CORBA [CORBA] is the Common Object Request Broker Architecture
|
||||
# defined by the Object Management Group. This document defines the
|
||||
# schema for representing CORBA object references in an LDAP directory
|
||||
# [LDAPv3].
|
||||
#
|
||||
# [trimmed]
|
||||
|
||||
# 3. Attribute Type Definitions
|
||||
#
|
||||
# The following attribute types are defined in this document:
|
||||
#
|
||||
# corbaIor
|
||||
# corbaRepositoryId
|
||||
#
|
||||
# 3.1 corbaIor
|
||||
#
|
||||
# This attribute stores the string representation of the interoperable
|
||||
# object reference (IOR) for a CORBA object. An IOR is an opaque handle
|
||||
# for the object which contains the information necessary to locate the
|
||||
# object, even if the object is in another ORB.
|
||||
#
|
||||
# This attribute's syntax is 'IA5 String' and its case is
|
||||
# insignificant.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.1.14
|
||||
# NAME 'corbaIor'
|
||||
# DESC 'Stringified interoperable object reference of a CORBA object'
|
||||
# EQUALITY caseIgnoreIA5Match
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||
# SINGLE-VALUE
|
||||
# )
|
||||
#
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.14
|
||||
NAME 'corbaIor'
|
||||
DESC 'Stringified interoperable object reference of a CORBA object'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||
SINGLE-VALUE )
|
||||
|
||||
# 3.2 corbaRepositoryId
|
||||
#
|
||||
# Each CORBA interface has a unique "repository id" (also called "type
|
||||
# id") that identifies the interface. A CORBA object has one or more
|
||||
# repository ids, one for each interface that it implements.
|
||||
#
|
||||
# The format of a repository id can be any string, but the OMG
|
||||
# specifies four standard formats:
|
||||
#
|
||||
# a. IDL-style
|
||||
#
|
||||
# IDL:Prefix/ModuleName/InterfaceName:VersionNumber
|
||||
#
|
||||
# For example, the repository id for the "NamingContext" in OMG's COS
|
||||
# Naming module is: "IDL:omg.org/CosNaming/NamingContext:1.0".
|
||||
#
|
||||
# b. RMI-style
|
||||
#
|
||||
# RMI:ClassName:HashCode[:SUID]
|
||||
#
|
||||
# This format is used by RMI-IIOP remote objects [RMI-IIOP].
|
||||
# "ClassName" is the fully qualified name of the class (for example,
|
||||
# "java.lang.String"). "HashCode" is the object's hash code (that is,
|
||||
# that obtained by invoking the "hashCode()" method). "SUID" is the
|
||||
# "stream unique identifier", which is a 64-bit number that uniquely
|
||||
# identifies the serialization version of the class; SUID is optional
|
||||
# in the repository id.
|
||||
#
|
||||
# c. DCE-style
|
||||
#
|
||||
# DCE:UUID
|
||||
#
|
||||
# This format is used for DCE/CORBA interoperability [CORBA-DCE].
|
||||
# "UUID" represents a DCE UUID.
|
||||
#
|
||||
# d. "local"
|
||||
#
|
||||
# This format is defined by the local Object Request Broker (ORB).
|
||||
#
|
||||
# The corbaRepositoryId attribute is a multivalued attribute; each
|
||||
# value records a single repository id of an interface implemented by
|
||||
# the CORBA object. This attribute need not contain a complete list of
|
||||
# the interfaces implemented by the CORBA object.
|
||||
#
|
||||
# This attribute's syntax is 'Directory String' and its case is
|
||||
# significant. The values of this attribute are encoded using UTF-8.
|
||||
# Some values may require translation from their native representation
|
||||
# in order to be correctly encoded using UTF-8.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.1.15
|
||||
# NAME 'corbaRepositoryId'
|
||||
# DESC 'Repository ids of interfaces implemented by a CORBA object'
|
||||
# EQUALITY caseExactMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||
# )
|
||||
#
|
||||
#
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.15
|
||||
NAME 'corbaRepositoryId'
|
||||
DESC 'Repository ids of interfaces implemented by a CORBA object'
|
||||
EQUALITY caseExactMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
|
||||
# 4. Object Class Definitions
|
||||
#
|
||||
# The following object classes are defined in this document:
|
||||
#
|
||||
# corbaContainer
|
||||
# corbaObject
|
||||
# corbaObjectReference
|
||||
#
|
||||
# 4.1 corbaContainer
|
||||
#
|
||||
# This structural object class represents a container for a CORBA
|
||||
# object.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.2.10
|
||||
# NAME 'corbaContainer'
|
||||
# DESC 'Container for a CORBA object'
|
||||
# SUP top
|
||||
# STRUCTURAL
|
||||
# MUST ( cn )
|
||||
# )
|
||||
#
|
||||
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.10
|
||||
NAME 'corbaContainer'
|
||||
DESC 'Container for a CORBA object'
|
||||
SUP top
|
||||
STRUCTURAL
|
||||
MUST cn )
|
||||
|
||||
# 4.2 corbaObject
|
||||
#
|
||||
# This abstract object class is the root class for representing a CORBA
|
||||
# object.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.2.9
|
||||
# NAME 'corbaObject'
|
||||
# DESC 'CORBA object representation'
|
||||
# SUP top
|
||||
# ABSTRACT
|
||||
# MAY ( corbaRepositoryId $ description )
|
||||
# )
|
||||
#
|
||||
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.9
|
||||
NAME 'corbaObject'
|
||||
DESC 'CORBA object representation'
|
||||
SUP top
|
||||
ABSTRACT
|
||||
MAY ( corbaRepositoryId $ description ) )
|
||||
|
||||
# 4.3 corbaObjectReference
|
||||
#
|
||||
# This auxiliary object class represents a CORBA object reference. It
|
||||
# must be mixed in with a structural object class.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.2.11
|
||||
# NAME 'corbaObjectReference'
|
||||
# DESC 'CORBA interoperable object reference'
|
||||
# SUP corbaObject
|
||||
# AUXILIARY
|
||||
# MUST ( corbaIor )
|
||||
# )
|
||||
#
|
||||
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.11
|
||||
NAME 'corbaObjectReference'
|
||||
DESC 'CORBA interoperable object reference'
|
||||
SUP corbaObject
|
||||
AUXILIARY
|
||||
MUST corbaIor )
|
||||
|
||||
# 10. Full Copyright Statement
|
||||
#
|
||||
# Copyright (C) The Internet Society (1999). All Rights Reserved.
|
||||
#
|
||||
# This document and translations of it may be copied and furnished to
|
||||
# others, and derivative works that comment on or otherwise explain it
|
||||
# or assist in its implementation may be prepared, copied, published
|
||||
# and distributed, in whole or in part, without restriction of any
|
||||
# kind, provided that the above copyright notice and this paragraph are
|
||||
# included on all such copies and derivative works. However, this
|
||||
# document itself may not be modified in any way, such as by removing
|
||||
# the copyright notice or references to the Internet Society or other
|
||||
# Internet organizations, except as needed for the purpose of
|
||||
# developing Internet standards in which case the procedures for
|
||||
# copyrights defined in the Internet Standards process must be
|
||||
# followed, or as required to translate it into languages other than
|
||||
# English.
|
||||
#
|
||||
# The limited permissions granted above are perpetual and will not be
|
||||
# revoked by the Internet Society or its successors or assigns.
|
||||
#
|
||||
# This document and the information contained herein is provided on an
|
||||
# "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||||
# TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||||
# BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||||
# HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||||
# MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
591
docker/ldap/data/etc/schema/core.ldif
Normal file
591
docker/ldap/data/etc/schema/core.ldif
Normal file
@ -0,0 +1,591 @@
|
||||
# OpenLDAP Core schema
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
## Portions Copyright (C) The Internet Society (1997-2003).
|
||||
## All Rights Reserved.
|
||||
##
|
||||
## This document and translations of it may be copied and furnished to
|
||||
## others, and derivative works that comment on or otherwise explain it
|
||||
## or assist in its implementation may be prepared, copied, published
|
||||
## and distributed, in whole or in part, without restriction of any
|
||||
## kind, provided that the above copyright notice and this paragraph are
|
||||
## included on all such copies and derivative works. However, this
|
||||
## document itself may not be modified in any way, such as by removing
|
||||
## the copyright notice or references to the Internet Society or other
|
||||
## Internet organizations, except as needed for the purpose of
|
||||
## developing Internet standards in which case the procedures for
|
||||
## copyrights defined in the Internet Standards process must be
|
||||
## followed, or as required to translate it into languages other than
|
||||
## English.
|
||||
##
|
||||
## The limited permissions granted above are perpetual and will not be
|
||||
## revoked by the Internet Society or its successors or assigns.
|
||||
##
|
||||
## This document and the information contained herein is provided on an
|
||||
## "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||||
## TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||||
## BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||||
## HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||||
## MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
#
|
||||
#
|
||||
#
|
||||
# Includes LDAPv3 schema items from:
|
||||
# RFC 2252/2256 (LDAPv3)
|
||||
#
|
||||
# Select standard track schema items:
|
||||
# RFC 1274 (uid/dc)
|
||||
# RFC 2079 (URI)
|
||||
# RFC 2247 (dc/dcObject)
|
||||
# RFC 2587 (PKI)
|
||||
# RFC 2589 (Dynamic Directory Services)
|
||||
#
|
||||
# Select informational schema items:
|
||||
# RFC 2377 (uidObject)
|
||||
#
|
||||
#
|
||||
# Standard attribute types from RFC 2256
|
||||
#
|
||||
dn: cn=core,cn=schema,cn=config
|
||||
objectClass: olcSchemaConfig
|
||||
cn: core
|
||||
#
|
||||
# system schema
|
||||
#olcAttributeTypes: ( 2.5.4.0 NAME 'objectClass'
|
||||
# DESC 'RFC2256: object classes of the entity'
|
||||
# EQUALITY objectIdentifierMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
|
||||
#
|
||||
# system schema
|
||||
#olcAttributeTypes: ( 2.5.4.1 NAME ( 'aliasedObjectName' 'aliasedEntryName' )
|
||||
# DESC 'RFC2256: name of aliased object'
|
||||
# EQUALITY distinguishedNameMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 SINGLE-VALUE )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.2 NAME 'knowledgeInformation'
|
||||
DESC 'RFC2256: knowledge information'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} )
|
||||
#
|
||||
# system schema
|
||||
#olcAttributeTypes: ( 2.5.4.3 NAME ( 'cn' 'commonName' )
|
||||
# DESC 'RFC2256: common name(s) for which the entity is known by'
|
||||
# SUP name )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.4 NAME ( 'sn' 'surname' )
|
||||
DESC 'RFC2256: last (family) name(s) for which the entity is known by'
|
||||
SUP name )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.5 NAME 'serialNumber'
|
||||
DESC 'RFC2256: serial number of the entity'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.44{64} )
|
||||
#
|
||||
# RFC 4519 definition ('countryName' in X.500 and RFC2256)
|
||||
olcAttributeTypes: ( 2.5.4.6 NAME ( 'c' 'countryName' )
|
||||
DESC 'RFC4519: two-letter ISO-3166 country code'
|
||||
SUP name
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.11
|
||||
SINGLE-VALUE )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.7 NAME ( 'l' 'localityName' )
|
||||
DESC 'RFC2256: locality which this object resides in'
|
||||
SUP name )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.8 NAME ( 'st' 'stateOrProvinceName' )
|
||||
DESC 'RFC2256: state or province which this object resides in'
|
||||
SUP name )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.9 NAME ( 'street' 'streetAddress' )
|
||||
DESC 'RFC2256: street address of this object'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.10 NAME ( 'o' 'organizationName' )
|
||||
DESC 'RFC2256: organization this object belongs to'
|
||||
SUP name )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.11 NAME ( 'ou' 'organizationalUnitName' )
|
||||
DESC 'RFC2256: organizational unit this object belongs to'
|
||||
SUP name )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.12 NAME 'title'
|
||||
DESC 'RFC2256: title associated with the entity'
|
||||
SUP name )
|
||||
#
|
||||
# system schema
|
||||
#olcAttributeTypes: ( 2.5.4.13 NAME 'description'
|
||||
# DESC 'RFC2256: descriptive information'
|
||||
# EQUALITY caseIgnoreMatch
|
||||
# SUBSTR caseIgnoreSubstringsMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1024} )
|
||||
#
|
||||
# Deprecated by enhancedSearchGuide
|
||||
olcAttributeTypes: ( 2.5.4.14 NAME 'searchGuide'
|
||||
DESC 'RFC2256: search guide, deprecated by enhancedSearchGuide'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.25 )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.15 NAME 'businessCategory'
|
||||
DESC 'RFC2256: business category'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.16 NAME 'postalAddress'
|
||||
DESC 'RFC2256: postal address'
|
||||
EQUALITY caseIgnoreListMatch
|
||||
SUBSTR caseIgnoreListSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.17 NAME 'postalCode'
|
||||
DESC 'RFC2256: postal code'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{40} )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.18 NAME 'postOfficeBox'
|
||||
DESC 'RFC2256: Post Office Box'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{40} )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.19 NAME 'physicalDeliveryOfficeName'
|
||||
DESC 'RFC2256: Physical Delivery Office Name'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.20 NAME 'telephoneNumber'
|
||||
DESC 'RFC2256: Telephone Number'
|
||||
EQUALITY telephoneNumberMatch
|
||||
SUBSTR telephoneNumberSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.50{32} )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.21 NAME 'telexNumber'
|
||||
DESC 'RFC2256: Telex Number'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.52 )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.22 NAME 'teletexTerminalIdentifier'
|
||||
DESC 'RFC2256: Teletex Terminal Identifier'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.51 )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.23 NAME ( 'facsimileTelephoneNumber' 'fax' )
|
||||
DESC 'RFC2256: Facsimile (Fax) Telephone Number'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.22 )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.24 NAME 'x121Address'
|
||||
DESC 'RFC2256: X.121 Address'
|
||||
EQUALITY numericStringMatch
|
||||
SUBSTR numericStringSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.36{15} )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.25 NAME 'internationaliSDNNumber'
|
||||
DESC 'RFC2256: international ISDN number'
|
||||
EQUALITY numericStringMatch
|
||||
SUBSTR numericStringSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.36{16} )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.26 NAME 'registeredAddress'
|
||||
DESC 'RFC2256: registered postal address'
|
||||
SUP postalAddress
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.27 NAME 'destinationIndicator'
|
||||
DESC 'RFC2256: destination indicator'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.44{128} )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.28 NAME 'preferredDeliveryMethod'
|
||||
DESC 'RFC2256: preferred delivery method'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.14
|
||||
SINGLE-VALUE )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.29 NAME 'presentationAddress'
|
||||
DESC 'RFC2256: presentation address'
|
||||
EQUALITY presentationAddressMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.43
|
||||
SINGLE-VALUE )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.30 NAME 'supportedApplicationContext'
|
||||
DESC 'RFC2256: supported application context'
|
||||
EQUALITY objectIdentifierMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.31 NAME 'member'
|
||||
DESC 'RFC2256: member of a group'
|
||||
SUP distinguishedName )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.32 NAME 'owner'
|
||||
DESC 'RFC2256: owner (of the object)'
|
||||
SUP distinguishedName )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.33 NAME 'roleOccupant'
|
||||
DESC 'RFC2256: occupant of role'
|
||||
SUP distinguishedName )
|
||||
#
|
||||
# system schema
|
||||
#olcAttributeTypes: ( 2.5.4.34 NAME 'seeAlso'
|
||||
# DESC 'RFC2256: DN of related object'
|
||||
# SUP distinguishedName )
|
||||
#
|
||||
# system schema
|
||||
#olcAttributeTypes: ( 2.5.4.35 NAME 'userPassword'
|
||||
# DESC 'RFC2256/2307: password of user'
|
||||
# EQUALITY octetStringMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.40{128} )
|
||||
#
|
||||
# Must be transferred using ;binary
|
||||
# with certificateExactMatch rule (per X.509)
|
||||
olcAttributeTypes: ( 2.5.4.36 NAME 'userCertificate'
|
||||
DESC 'RFC2256: X.509 user certificate, use ;binary'
|
||||
EQUALITY certificateExactMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.8 )
|
||||
#
|
||||
# Must be transferred using ;binary
|
||||
# with certificateExactMatch rule (per X.509)
|
||||
olcAttributeTypes: ( 2.5.4.37 NAME 'cACertificate'
|
||||
DESC 'RFC2256: X.509 CA certificate, use ;binary'
|
||||
EQUALITY certificateExactMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.8 )
|
||||
#
|
||||
# Must be transferred using ;binary
|
||||
olcAttributeTypes: ( 2.5.4.38 NAME 'authorityRevocationList'
|
||||
DESC 'RFC2256: X.509 authority revocation list, use ;binary'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
|
||||
#
|
||||
# Must be transferred using ;binary
|
||||
olcAttributeTypes: ( 2.5.4.39 NAME 'certificateRevocationList'
|
||||
DESC 'RFC2256: X.509 certificate revocation list, use ;binary'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
|
||||
#
|
||||
# Must be stored and requested in the binary form
|
||||
olcAttributeTypes: ( 2.5.4.40 NAME 'crossCertificatePair'
|
||||
DESC 'RFC2256: X.509 cross certificate pair, use ;binary'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.10 )
|
||||
#
|
||||
# 2.5.4.41 is defined above as it's used for subtyping
|
||||
#olcAttributeTypes: ( 2.5.4.41 NAME 'name'
|
||||
# EQUALITY caseIgnoreMatch
|
||||
# SUBSTR caseIgnoreSubstringsMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.42 NAME ( 'givenName' 'gn' )
|
||||
DESC 'RFC2256: first name(s) for which the entity is known by'
|
||||
SUP name )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.43 NAME 'initials'
|
||||
DESC 'RFC2256: initials of some or all of names, but not the surname(s).'
|
||||
SUP name )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.44 NAME 'generationQualifier'
|
||||
DESC 'RFC2256: name qualifier indicating a generation'
|
||||
SUP name )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.45 NAME 'x500UniqueIdentifier'
|
||||
DESC 'RFC2256: X.500 unique identifier'
|
||||
EQUALITY bitStringMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.6 )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.46 NAME 'dnQualifier'
|
||||
DESC 'RFC2256: DN qualifier'
|
||||
EQUALITY caseIgnoreMatch
|
||||
ORDERING caseIgnoreOrderingMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.44 )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.47 NAME 'enhancedSearchGuide'
|
||||
DESC 'RFC2256: enhanced search guide'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.21 )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.48 NAME 'protocolInformation'
|
||||
DESC 'RFC2256: protocol information'
|
||||
EQUALITY protocolInformationMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.42 )
|
||||
#
|
||||
# 2.5.4.49 is defined above as it's used for subtyping
|
||||
#olcAttributeTypes: ( 2.5.4.49 NAME 'distinguishedName'
|
||||
# EQUALITY distinguishedNameMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.50 NAME 'uniqueMember'
|
||||
DESC 'RFC2256: unique member of a group'
|
||||
EQUALITY uniqueMemberMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.34 )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.51 NAME 'houseIdentifier'
|
||||
DESC 'RFC2256: house identifier'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} )
|
||||
#
|
||||
# Must be transferred using ;binary
|
||||
olcAttributeTypes: ( 2.5.4.52 NAME 'supportedAlgorithms'
|
||||
DESC 'RFC2256: supported algorithms'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.49 )
|
||||
#
|
||||
# Must be transferred using ;binary
|
||||
olcAttributeTypes: ( 2.5.4.53 NAME 'deltaRevocationList'
|
||||
DESC 'RFC2256: delta revocation list; use ;binary'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.54 NAME 'dmdName'
|
||||
DESC 'RFC2256: name of DMD'
|
||||
SUP name )
|
||||
#
|
||||
olcAttributeTypes: ( 2.5.4.65 NAME 'pseudonym'
|
||||
DESC 'X.520(4th): pseudonym for the object'
|
||||
SUP name )
|
||||
#
|
||||
# Standard object classes from RFC2256
|
||||
#
|
||||
# system schema
|
||||
#olcObjectClasses: ( 2.5.6.1 NAME 'alias'
|
||||
# DESC 'RFC2256: an alias'
|
||||
# SUP top STRUCTURAL
|
||||
# MUST aliasedObjectName )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.2 NAME 'country'
|
||||
DESC 'RFC2256: a country'
|
||||
SUP top STRUCTURAL
|
||||
MUST c
|
||||
MAY ( searchGuide $ description ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.3 NAME 'locality'
|
||||
DESC 'RFC2256: a locality'
|
||||
SUP top STRUCTURAL
|
||||
MAY ( street $ seeAlso $ searchGuide $ st $ l $ description ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.4 NAME 'organization'
|
||||
DESC 'RFC2256: an organization'
|
||||
SUP top STRUCTURAL
|
||||
MUST o
|
||||
MAY ( userPassword $ searchGuide $ seeAlso $ businessCategory $
|
||||
x121Address $ registeredAddress $ destinationIndicator $
|
||||
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||
telephoneNumber $ internationaliSDNNumber $
|
||||
facsimileTelephoneNumber $ street $ postOfficeBox $ postalCode $
|
||||
postalAddress $ physicalDeliveryOfficeName $ st $ l $ description ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.5 NAME 'organizationalUnit'
|
||||
DESC 'RFC2256: an organizational unit'
|
||||
SUP top STRUCTURAL
|
||||
MUST ou
|
||||
MAY ( userPassword $ searchGuide $ seeAlso $ businessCategory $
|
||||
x121Address $ registeredAddress $ destinationIndicator $
|
||||
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||
telephoneNumber $ internationaliSDNNumber $
|
||||
facsimileTelephoneNumber $ street $ postOfficeBox $ postalCode $
|
||||
postalAddress $ physicalDeliveryOfficeName $ st $ l $ description ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.6 NAME 'person'
|
||||
DESC 'RFC2256: a person'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( sn $ cn )
|
||||
MAY ( userPassword $ telephoneNumber $ seeAlso $ description ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.7 NAME 'organizationalPerson'
|
||||
DESC 'RFC2256: an organizational person'
|
||||
SUP person STRUCTURAL
|
||||
MAY ( title $ x121Address $ registeredAddress $ destinationIndicator $
|
||||
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||
telephoneNumber $ internationaliSDNNumber $
|
||||
facsimileTelephoneNumber $ street $ postOfficeBox $ postalCode $
|
||||
postalAddress $ physicalDeliveryOfficeName $ ou $ st $ l ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.8 NAME 'organizationalRole'
|
||||
DESC 'RFC2256: an organizational role'
|
||||
SUP top STRUCTURAL
|
||||
MUST cn
|
||||
MAY ( x121Address $ registeredAddress $ destinationIndicator $
|
||||
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||
telephoneNumber $ internationaliSDNNumber $ facsimileTelephoneNumber $
|
||||
seeAlso $ roleOccupant $ preferredDeliveryMethod $ street $
|
||||
postOfficeBox $ postalCode $ postalAddress $
|
||||
physicalDeliveryOfficeName $ ou $ st $ l $ description ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.9 NAME 'groupOfNames'
|
||||
DESC 'RFC2256: a group of names (DNs)'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( member $ cn )
|
||||
MAY ( businessCategory $ seeAlso $ owner $ ou $ o $ description ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.10 NAME 'residentialPerson'
|
||||
DESC 'RFC2256: an residential person'
|
||||
SUP person STRUCTURAL
|
||||
MUST l
|
||||
MAY ( businessCategory $ x121Address $ registeredAddress $
|
||||
destinationIndicator $ preferredDeliveryMethod $ telexNumber $
|
||||
teletexTerminalIdentifier $ telephoneNumber $ internationaliSDNNumber $
|
||||
facsimileTelephoneNumber $ preferredDeliveryMethod $ street $
|
||||
postOfficeBox $ postalCode $ postalAddress $
|
||||
physicalDeliveryOfficeName $ st $ l ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.11 NAME 'applicationProcess'
|
||||
DESC 'RFC2256: an application process'
|
||||
SUP top STRUCTURAL
|
||||
MUST cn
|
||||
MAY ( seeAlso $ ou $ l $ description ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.12 NAME 'applicationEntity'
|
||||
DESC 'RFC2256: an application entity'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( presentationAddress $ cn )
|
||||
MAY ( supportedApplicationContext $ seeAlso $ ou $ o $ l $
|
||||
description ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.13 NAME 'dSA'
|
||||
DESC 'RFC2256: a directory system agent (a server)'
|
||||
SUP applicationEntity STRUCTURAL
|
||||
MAY knowledgeInformation )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.14 NAME 'device'
|
||||
DESC 'RFC2256: a device'
|
||||
SUP top STRUCTURAL
|
||||
MUST cn
|
||||
MAY ( serialNumber $ seeAlso $ owner $ ou $ o $ l $ description ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.15 NAME 'strongAuthenticationUser'
|
||||
DESC 'RFC2256: a strong authentication user'
|
||||
SUP top AUXILIARY
|
||||
MUST userCertificate )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.16 NAME 'certificationAuthority'
|
||||
DESC 'RFC2256: a certificate authority'
|
||||
SUP top AUXILIARY
|
||||
MUST ( authorityRevocationList $ certificateRevocationList $
|
||||
cACertificate ) MAY crossCertificatePair )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.17 NAME 'groupOfUniqueNames'
|
||||
DESC 'RFC2256: a group of unique names (DN and Unique Identifier)'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( uniqueMember $ cn )
|
||||
MAY ( businessCategory $ seeAlso $ owner $ ou $ o $ description ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.18 NAME 'userSecurityInformation'
|
||||
DESC 'RFC2256: a user security information'
|
||||
SUP top AUXILIARY
|
||||
MAY ( supportedAlgorithms ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.16.2 NAME 'certificationAuthority-V2'
|
||||
SUP certificationAuthority
|
||||
AUXILIARY MAY ( deltaRevocationList ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.19 NAME 'cRLDistributionPoint'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( cn )
|
||||
MAY ( certificateRevocationList $ authorityRevocationList $
|
||||
deltaRevocationList ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.20 NAME 'dmd'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( dmdName )
|
||||
MAY ( userPassword $ searchGuide $ seeAlso $ businessCategory $
|
||||
x121Address $ registeredAddress $ destinationIndicator $
|
||||
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||
telephoneNumber $ internationaliSDNNumber $ facsimileTelephoneNumber $
|
||||
street $ postOfficeBox $ postalCode $ postalAddress $
|
||||
physicalDeliveryOfficeName $ st $ l $ description ) )
|
||||
#
|
||||
#
|
||||
# Object Classes from RFC 2587
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.21 NAME 'pkiUser'
|
||||
DESC 'RFC2587: a PKI user'
|
||||
SUP top AUXILIARY
|
||||
MAY userCertificate )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.22 NAME 'pkiCA'
|
||||
DESC 'RFC2587: PKI certificate authority'
|
||||
SUP top AUXILIARY
|
||||
MAY ( authorityRevocationList $ certificateRevocationList $
|
||||
cACertificate $ crossCertificatePair ) )
|
||||
#
|
||||
olcObjectClasses: ( 2.5.6.23 NAME 'deltaCRL'
|
||||
DESC 'RFC2587: PKI user'
|
||||
SUP top AUXILIARY
|
||||
MAY deltaRevocationList )
|
||||
#
|
||||
#
|
||||
# Standard Track URI label schema from RFC 2079
|
||||
# system schema
|
||||
#olcAttributeTypes: ( 1.3.6.1.4.1.250.1.57 NAME 'labeledURI'
|
||||
# DESC 'RFC2079: Uniform Resource Identifier with optional label'
|
||||
# EQUALITY caseExactMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
#
|
||||
olcObjectClasses: ( 1.3.6.1.4.1.250.3.15 NAME 'labeledURIObject'
|
||||
DESC 'RFC2079: object that contains the URI attribute type'
|
||||
MAY ( labeledURI )
|
||||
SUP top AUXILIARY )
|
||||
#
|
||||
#
|
||||
# Derived from RFC 1274, but with new "short names"
|
||||
#
|
||||
#olcAttributeTypes: ( 0.9.2342.19200300.100.1.1
|
||||
# NAME ( 'uid' 'userid' )
|
||||
# DESC 'RFC1274: user identifier'
|
||||
# EQUALITY caseIgnoreMatch
|
||||
# SUBSTR caseIgnoreSubstringsMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||
#
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.3
|
||||
NAME ( 'mail' 'rfc822Mailbox' )
|
||||
DESC 'RFC1274: RFC822 Mailbox'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256} )
|
||||
#
|
||||
olcObjectClasses: ( 0.9.2342.19200300.100.4.19 NAME 'simpleSecurityObject'
|
||||
DESC 'RFC1274: simple security object'
|
||||
SUP top AUXILIARY
|
||||
MUST userPassword )
|
||||
#
|
||||
# RFC 1274 + RFC 2247
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.25
|
||||
NAME ( 'dc' 'domainComponent' )
|
||||
DESC 'RFC1274/2247: domain component'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||
#
|
||||
# RFC 2247
|
||||
olcObjectClasses: ( 1.3.6.1.4.1.1466.344 NAME 'dcObject'
|
||||
DESC 'RFC2247: domain component object'
|
||||
SUP top AUXILIARY MUST dc )
|
||||
#
|
||||
# RFC 2377
|
||||
olcObjectClasses: ( 1.3.6.1.1.3.1 NAME 'uidObject'
|
||||
DESC 'RFC2377: uid object'
|
||||
SUP top AUXILIARY MUST uid )
|
||||
#
|
||||
# From COSINE Pilot
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.37
|
||||
NAME 'associatedDomain'
|
||||
DESC 'RFC1274: domain associated with object'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
#
|
||||
# RFC 2459 -- deprecated in favor of 'mail' (in cosine.schema)
|
||||
olcAttributeTypes: ( 1.2.840.113549.1.9.1
|
||||
NAME ( 'email' 'emailAddress' 'pkcs9email' )
|
||||
DESC 'RFC3280: legacy attribute for email addresses in DNs'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
|
||||
#
|
||||
610
docker/ldap/data/etc/schema/core.schema
Normal file
610
docker/ldap/data/etc/schema/core.schema
Normal file
@ -0,0 +1,610 @@
|
||||
# OpenLDAP Core schema
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
## Portions Copyright (C) The Internet Society (1997-2006).
|
||||
## All Rights Reserved.
|
||||
##
|
||||
## This document and translations of it may be copied and furnished to
|
||||
## others, and derivative works that comment on or otherwise explain it
|
||||
## or assist in its implementation may be prepared, copied, published
|
||||
## and distributed, in whole or in part, without restriction of any
|
||||
## kind, provided that the above copyright notice and this paragraph are
|
||||
## included on all such copies and derivative works. However, this
|
||||
## document itself may not be modified in any way, such as by removing
|
||||
## the copyright notice or references to the Internet Society or other
|
||||
## Internet organizations, except as needed for the purpose of
|
||||
## developing Internet standards in which case the procedures for
|
||||
## copyrights defined in the Internet Standards process must be
|
||||
## followed, or as required to translate it into languages other than
|
||||
## English.
|
||||
##
|
||||
## The limited permissions granted above are perpetual and will not be
|
||||
## revoked by the Internet Society or its successors or assigns.
|
||||
##
|
||||
## This document and the information contained herein is provided on an
|
||||
## "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||||
## TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||||
## BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||||
## HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||||
## MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
|
||||
#
|
||||
#
|
||||
# Includes LDAPv3 schema items from:
|
||||
# RFC 2252/2256 (LDAPv3)
|
||||
#
|
||||
# Select standard track schema items:
|
||||
# RFC 1274 (uid/dc)
|
||||
# RFC 2079 (URI)
|
||||
# RFC 2247 (dc/dcObject)
|
||||
# RFC 2587 (PKI)
|
||||
# RFC 2589 (Dynamic Directory Services)
|
||||
# RFC 4524 (associatedDomain)
|
||||
#
|
||||
# Select informational schema items:
|
||||
# RFC 2377 (uidObject)
|
||||
|
||||
#
|
||||
# Standard attribute types from RFC 2256
|
||||
#
|
||||
|
||||
# system schema
|
||||
#attributetype ( 2.5.4.0 NAME 'objectClass'
|
||||
# DESC 'RFC2256: object classes of the entity'
|
||||
# EQUALITY objectIdentifierMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
|
||||
|
||||
# system schema
|
||||
#attributetype ( 2.5.4.1 NAME ( 'aliasedObjectName' 'aliasedEntryName' )
|
||||
# DESC 'RFC2256: name of aliased object'
|
||||
# EQUALITY distinguishedNameMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 SINGLE-VALUE )
|
||||
|
||||
attributetype ( 2.5.4.2 NAME 'knowledgeInformation'
|
||||
DESC 'RFC2256: knowledge information'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} )
|
||||
|
||||
# system schema
|
||||
#attributetype ( 2.5.4.3 NAME ( 'cn' 'commonName' )
|
||||
# DESC 'RFC2256: common name(s) for which the entity is known by'
|
||||
# SUP name )
|
||||
|
||||
attributetype ( 2.5.4.4 NAME ( 'sn' 'surname' )
|
||||
DESC 'RFC2256: last (family) name(s) for which the entity is known by'
|
||||
SUP name )
|
||||
|
||||
attributetype ( 2.5.4.5 NAME 'serialNumber'
|
||||
DESC 'RFC2256: serial number of the entity'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.44{64} )
|
||||
|
||||
# RFC 4519 definition ('countryName' in X.500 and RFC2256)
|
||||
attributetype ( 2.5.4.6 NAME ( 'c' 'countryName' )
|
||||
DESC 'RFC4519: two-letter ISO-3166 country code'
|
||||
SUP name
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.11
|
||||
SINGLE-VALUE )
|
||||
|
||||
#attributetype ( 2.5.4.6 NAME ( 'c' 'countryName' )
|
||||
# DESC 'RFC2256: ISO-3166 country 2-letter code'
|
||||
# SUP name SINGLE-VALUE )
|
||||
|
||||
attributetype ( 2.5.4.7 NAME ( 'l' 'localityName' )
|
||||
DESC 'RFC2256: locality which this object resides in'
|
||||
SUP name )
|
||||
|
||||
attributetype ( 2.5.4.8 NAME ( 'st' 'stateOrProvinceName' )
|
||||
DESC 'RFC2256: state or province which this object resides in'
|
||||
SUP name )
|
||||
|
||||
attributetype ( 2.5.4.9 NAME ( 'street' 'streetAddress' )
|
||||
DESC 'RFC2256: street address of this object'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
|
||||
|
||||
attributetype ( 2.5.4.10 NAME ( 'o' 'organizationName' )
|
||||
DESC 'RFC2256: organization this object belongs to'
|
||||
SUP name )
|
||||
|
||||
attributetype ( 2.5.4.11 NAME ( 'ou' 'organizationalUnitName' )
|
||||
DESC 'RFC2256: organizational unit this object belongs to'
|
||||
SUP name )
|
||||
|
||||
attributetype ( 2.5.4.12 NAME 'title'
|
||||
DESC 'RFC2256: title associated with the entity'
|
||||
SUP name )
|
||||
|
||||
# system schema
|
||||
#attributetype ( 2.5.4.13 NAME 'description'
|
||||
# DESC 'RFC2256: descriptive information'
|
||||
# EQUALITY caseIgnoreMatch
|
||||
# SUBSTR caseIgnoreSubstringsMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1024} )
|
||||
|
||||
# Deprecated by enhancedSearchGuide
|
||||
attributetype ( 2.5.4.14 NAME 'searchGuide'
|
||||
DESC 'RFC2256: search guide, deprecated by enhancedSearchGuide'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.25 )
|
||||
|
||||
attributetype ( 2.5.4.15 NAME 'businessCategory'
|
||||
DESC 'RFC2256: business category'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
|
||||
|
||||
attributetype ( 2.5.4.16 NAME 'postalAddress'
|
||||
DESC 'RFC2256: postal address'
|
||||
EQUALITY caseIgnoreListMatch
|
||||
SUBSTR caseIgnoreListSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )
|
||||
|
||||
attributetype ( 2.5.4.17 NAME 'postalCode'
|
||||
DESC 'RFC2256: postal code'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{40} )
|
||||
|
||||
attributetype ( 2.5.4.18 NAME 'postOfficeBox'
|
||||
DESC 'RFC2256: Post Office Box'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{40} )
|
||||
|
||||
attributetype ( 2.5.4.19 NAME 'physicalDeliveryOfficeName'
|
||||
DESC 'RFC2256: Physical Delivery Office Name'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
|
||||
|
||||
attributetype ( 2.5.4.20 NAME 'telephoneNumber'
|
||||
DESC 'RFC2256: Telephone Number'
|
||||
EQUALITY telephoneNumberMatch
|
||||
SUBSTR telephoneNumberSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.50{32} )
|
||||
|
||||
attributetype ( 2.5.4.21 NAME 'telexNumber'
|
||||
DESC 'RFC2256: Telex Number'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.52 )
|
||||
|
||||
attributetype ( 2.5.4.22 NAME 'teletexTerminalIdentifier'
|
||||
DESC 'RFC2256: Teletex Terminal Identifier'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.51 )
|
||||
|
||||
attributetype ( 2.5.4.23 NAME ( 'facsimileTelephoneNumber' 'fax' )
|
||||
DESC 'RFC2256: Facsimile (Fax) Telephone Number'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.22 )
|
||||
|
||||
attributetype ( 2.5.4.24 NAME 'x121Address'
|
||||
DESC 'RFC2256: X.121 Address'
|
||||
EQUALITY numericStringMatch
|
||||
SUBSTR numericStringSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.36{15} )
|
||||
|
||||
attributetype ( 2.5.4.25 NAME 'internationaliSDNNumber'
|
||||
DESC 'RFC2256: international ISDN number'
|
||||
EQUALITY numericStringMatch
|
||||
SUBSTR numericStringSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.36{16} )
|
||||
|
||||
attributetype ( 2.5.4.26 NAME 'registeredAddress'
|
||||
DESC 'RFC2256: registered postal address'
|
||||
SUP postalAddress
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )
|
||||
|
||||
attributetype ( 2.5.4.27 NAME 'destinationIndicator'
|
||||
DESC 'RFC2256: destination indicator'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.44{128} )
|
||||
|
||||
attributetype ( 2.5.4.28 NAME 'preferredDeliveryMethod'
|
||||
DESC 'RFC2256: preferred delivery method'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.14
|
||||
SINGLE-VALUE )
|
||||
|
||||
attributetype ( 2.5.4.29 NAME 'presentationAddress'
|
||||
DESC 'RFC2256: presentation address'
|
||||
EQUALITY presentationAddressMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.43
|
||||
SINGLE-VALUE )
|
||||
|
||||
attributetype ( 2.5.4.30 NAME 'supportedApplicationContext'
|
||||
DESC 'RFC2256: supported application context'
|
||||
EQUALITY objectIdentifierMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
|
||||
|
||||
attributetype ( 2.5.4.31 NAME 'member'
|
||||
DESC 'RFC2256: member of a group'
|
||||
SUP distinguishedName )
|
||||
|
||||
attributetype ( 2.5.4.32 NAME 'owner'
|
||||
DESC 'RFC2256: owner (of the object)'
|
||||
SUP distinguishedName )
|
||||
|
||||
attributetype ( 2.5.4.33 NAME 'roleOccupant'
|
||||
DESC 'RFC2256: occupant of role'
|
||||
SUP distinguishedName )
|
||||
|
||||
# system schema
|
||||
#attributetype ( 2.5.4.34 NAME 'seeAlso'
|
||||
# DESC 'RFC2256: DN of related object'
|
||||
# SUP distinguishedName )
|
||||
|
||||
# system schema
|
||||
#attributetype ( 2.5.4.35 NAME 'userPassword'
|
||||
# DESC 'RFC2256/2307: password of user'
|
||||
# EQUALITY octetStringMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.40{128} )
|
||||
|
||||
# Must be transferred using ;binary
|
||||
# with certificateExactMatch rule (per X.509)
|
||||
attributetype ( 2.5.4.36 NAME 'userCertificate'
|
||||
DESC 'RFC2256: X.509 user certificate, use ;binary'
|
||||
EQUALITY certificateExactMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.8 )
|
||||
|
||||
# Must be transferred using ;binary
|
||||
# with certificateExactMatch rule (per X.509)
|
||||
attributetype ( 2.5.4.37 NAME 'cACertificate'
|
||||
DESC 'RFC2256: X.509 CA certificate, use ;binary'
|
||||
EQUALITY certificateExactMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.8 )
|
||||
|
||||
# Must be transferred using ;binary
|
||||
attributetype ( 2.5.4.38 NAME 'authorityRevocationList'
|
||||
DESC 'RFC2256: X.509 authority revocation list, use ;binary'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
|
||||
|
||||
# Must be transferred using ;binary
|
||||
attributetype ( 2.5.4.39 NAME 'certificateRevocationList'
|
||||
DESC 'RFC2256: X.509 certificate revocation list, use ;binary'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
|
||||
|
||||
# Must be stored and requested in the binary form
|
||||
attributetype ( 2.5.4.40 NAME 'crossCertificatePair'
|
||||
DESC 'RFC2256: X.509 cross certificate pair, use ;binary'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.10 )
|
||||
|
||||
# system schema
|
||||
#attributetype ( 2.5.4.41 NAME 'name'
|
||||
# EQUALITY caseIgnoreMatch
|
||||
# SUBSTR caseIgnoreSubstringsMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} )
|
||||
|
||||
attributetype ( 2.5.4.42 NAME ( 'givenName' 'gn' )
|
||||
DESC 'RFC2256: first name(s) for which the entity is known by'
|
||||
SUP name )
|
||||
|
||||
attributetype ( 2.5.4.43 NAME 'initials'
|
||||
DESC 'RFC2256: initials of some or all of names, but not the surname(s).'
|
||||
SUP name )
|
||||
|
||||
attributetype ( 2.5.4.44 NAME 'generationQualifier'
|
||||
DESC 'RFC2256: name qualifier indicating a generation'
|
||||
SUP name )
|
||||
|
||||
attributetype ( 2.5.4.45 NAME 'x500UniqueIdentifier'
|
||||
DESC 'RFC2256: X.500 unique identifier'
|
||||
EQUALITY bitStringMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.6 )
|
||||
|
||||
attributetype ( 2.5.4.46 NAME 'dnQualifier'
|
||||
DESC 'RFC2256: DN qualifier'
|
||||
EQUALITY caseIgnoreMatch
|
||||
ORDERING caseIgnoreOrderingMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.44 )
|
||||
|
||||
attributetype ( 2.5.4.47 NAME 'enhancedSearchGuide'
|
||||
DESC 'RFC2256: enhanced search guide'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.21 )
|
||||
|
||||
attributetype ( 2.5.4.48 NAME 'protocolInformation'
|
||||
DESC 'RFC2256: protocol information'
|
||||
EQUALITY protocolInformationMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.42 )
|
||||
|
||||
# system schema
|
||||
#attributetype ( 2.5.4.49 NAME 'distinguishedName'
|
||||
# EQUALITY distinguishedNameMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 )
|
||||
|
||||
attributetype ( 2.5.4.50 NAME 'uniqueMember'
|
||||
DESC 'RFC2256: unique member of a group'
|
||||
EQUALITY uniqueMemberMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.34 )
|
||||
|
||||
attributetype ( 2.5.4.51 NAME 'houseIdentifier'
|
||||
DESC 'RFC2256: house identifier'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} )
|
||||
|
||||
# Must be transferred using ;binary
|
||||
attributetype ( 2.5.4.52 NAME 'supportedAlgorithms'
|
||||
DESC 'RFC2256: supported algorithms'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.49 )
|
||||
|
||||
# Must be transferred using ;binary
|
||||
attributetype ( 2.5.4.53 NAME 'deltaRevocationList'
|
||||
DESC 'RFC2256: delta revocation list; use ;binary'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
|
||||
|
||||
attributetype ( 2.5.4.54 NAME 'dmdName'
|
||||
DESC 'RFC2256: name of DMD'
|
||||
SUP name )
|
||||
|
||||
attributetype ( 2.5.4.65 NAME 'pseudonym'
|
||||
DESC 'X.520(4th): pseudonym for the object'
|
||||
SUP name )
|
||||
|
||||
# Standard object classes from RFC2256
|
||||
|
||||
# system schema
|
||||
#objectclass ( 2.5.6.0 NAME 'top'
|
||||
# DESC 'RFC2256: top of the superclass chain'
|
||||
# ABSTRACT
|
||||
# MUST objectClass )
|
||||
|
||||
# system schema
|
||||
#objectclass ( 2.5.6.1 NAME 'alias'
|
||||
# DESC 'RFC2256: an alias'
|
||||
# SUP top STRUCTURAL
|
||||
# MUST aliasedObjectName )
|
||||
|
||||
objectclass ( 2.5.6.2 NAME 'country'
|
||||
DESC 'RFC2256: a country'
|
||||
SUP top STRUCTURAL
|
||||
MUST c
|
||||
MAY ( searchGuide $ description ) )
|
||||
|
||||
objectclass ( 2.5.6.3 NAME 'locality'
|
||||
DESC 'RFC2256: a locality'
|
||||
SUP top STRUCTURAL
|
||||
MAY ( street $ seeAlso $ searchGuide $ st $ l $ description ) )
|
||||
|
||||
objectclass ( 2.5.6.4 NAME 'organization'
|
||||
DESC 'RFC2256: an organization'
|
||||
SUP top STRUCTURAL
|
||||
MUST o
|
||||
MAY ( userPassword $ searchGuide $ seeAlso $ businessCategory $
|
||||
x121Address $ registeredAddress $ destinationIndicator $
|
||||
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||
telephoneNumber $ internationaliSDNNumber $
|
||||
facsimileTelephoneNumber $ street $ postOfficeBox $ postalCode $
|
||||
postalAddress $ physicalDeliveryOfficeName $ st $ l $ description ) )
|
||||
|
||||
objectclass ( 2.5.6.5 NAME 'organizationalUnit'
|
||||
DESC 'RFC2256: an organizational unit'
|
||||
SUP top STRUCTURAL
|
||||
MUST ou
|
||||
MAY ( userPassword $ searchGuide $ seeAlso $ businessCategory $
|
||||
x121Address $ registeredAddress $ destinationIndicator $
|
||||
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||
telephoneNumber $ internationaliSDNNumber $
|
||||
facsimileTelephoneNumber $ street $ postOfficeBox $ postalCode $
|
||||
postalAddress $ physicalDeliveryOfficeName $ st $ l $ description ) )
|
||||
|
||||
objectclass ( 2.5.6.6 NAME 'person'
|
||||
DESC 'RFC2256: a person'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( sn $ cn )
|
||||
MAY ( userPassword $ telephoneNumber $ seeAlso $ description ) )
|
||||
|
||||
objectclass ( 2.5.6.7 NAME 'organizationalPerson'
|
||||
DESC 'RFC2256: an organizational person'
|
||||
SUP person STRUCTURAL
|
||||
MAY ( title $ x121Address $ registeredAddress $ destinationIndicator $
|
||||
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||
telephoneNumber $ internationaliSDNNumber $
|
||||
facsimileTelephoneNumber $ street $ postOfficeBox $ postalCode $
|
||||
postalAddress $ physicalDeliveryOfficeName $ ou $ st $ l ) )
|
||||
|
||||
objectclass ( 2.5.6.8 NAME 'organizationalRole'
|
||||
DESC 'RFC2256: an organizational role'
|
||||
SUP top STRUCTURAL
|
||||
MUST cn
|
||||
MAY ( x121Address $ registeredAddress $ destinationIndicator $
|
||||
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||
telephoneNumber $ internationaliSDNNumber $ facsimileTelephoneNumber $
|
||||
seeAlso $ roleOccupant $ preferredDeliveryMethod $ street $
|
||||
postOfficeBox $ postalCode $ postalAddress $
|
||||
physicalDeliveryOfficeName $ ou $ st $ l $ description ) )
|
||||
|
||||
objectclass ( 2.5.6.9 NAME 'groupOfNames'
|
||||
DESC 'RFC2256: a group of names (DNs)'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( member $ cn )
|
||||
MAY ( businessCategory $ seeAlso $ owner $ ou $ o $ description ) )
|
||||
|
||||
objectclass ( 2.5.6.10 NAME 'residentialPerson'
|
||||
DESC 'RFC2256: an residential person'
|
||||
SUP person STRUCTURAL
|
||||
MUST l
|
||||
MAY ( businessCategory $ x121Address $ registeredAddress $
|
||||
destinationIndicator $ preferredDeliveryMethod $ telexNumber $
|
||||
teletexTerminalIdentifier $ telephoneNumber $ internationaliSDNNumber $
|
||||
facsimileTelephoneNumber $ preferredDeliveryMethod $ street $
|
||||
postOfficeBox $ postalCode $ postalAddress $
|
||||
physicalDeliveryOfficeName $ st $ l ) )
|
||||
|
||||
objectclass ( 2.5.6.11 NAME 'applicationProcess'
|
||||
DESC 'RFC2256: an application process'
|
||||
SUP top STRUCTURAL
|
||||
MUST cn
|
||||
MAY ( seeAlso $ ou $ l $ description ) )
|
||||
|
||||
objectclass ( 2.5.6.12 NAME 'applicationEntity'
|
||||
DESC 'RFC2256: an application entity'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( presentationAddress $ cn )
|
||||
MAY ( supportedApplicationContext $ seeAlso $ ou $ o $ l $
|
||||
description ) )
|
||||
|
||||
objectclass ( 2.5.6.13 NAME 'dSA'
|
||||
DESC 'RFC2256: a directory system agent (a server)'
|
||||
SUP applicationEntity STRUCTURAL
|
||||
MAY knowledgeInformation )
|
||||
|
||||
objectclass ( 2.5.6.14 NAME 'device'
|
||||
DESC 'RFC2256: a device'
|
||||
SUP top STRUCTURAL
|
||||
MUST cn
|
||||
MAY ( serialNumber $ seeAlso $ owner $ ou $ o $ l $ description ) )
|
||||
|
||||
objectclass ( 2.5.6.15 NAME 'strongAuthenticationUser'
|
||||
DESC 'RFC2256: a strong authentication user'
|
||||
SUP top AUXILIARY
|
||||
MUST userCertificate )
|
||||
|
||||
objectclass ( 2.5.6.16 NAME 'certificationAuthority'
|
||||
DESC 'RFC2256: a certificate authority'
|
||||
SUP top AUXILIARY
|
||||
MUST ( authorityRevocationList $ certificateRevocationList $
|
||||
cACertificate ) MAY crossCertificatePair )
|
||||
|
||||
objectclass ( 2.5.6.17 NAME 'groupOfUniqueNames'
|
||||
DESC 'RFC2256: a group of unique names (DN and Unique Identifier)'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( uniqueMember $ cn )
|
||||
MAY ( businessCategory $ seeAlso $ owner $ ou $ o $ description ) )
|
||||
|
||||
objectclass ( 2.5.6.18 NAME 'userSecurityInformation'
|
||||
DESC 'RFC2256: a user security information'
|
||||
SUP top AUXILIARY
|
||||
MAY ( supportedAlgorithms ) )
|
||||
|
||||
objectclass ( 2.5.6.16.2 NAME 'certificationAuthority-V2'
|
||||
SUP certificationAuthority
|
||||
AUXILIARY MAY ( deltaRevocationList ) )
|
||||
|
||||
objectclass ( 2.5.6.19 NAME 'cRLDistributionPoint'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( cn )
|
||||
MAY ( certificateRevocationList $ authorityRevocationList $
|
||||
deltaRevocationList ) )
|
||||
|
||||
objectclass ( 2.5.6.20 NAME 'dmd'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( dmdName )
|
||||
MAY ( userPassword $ searchGuide $ seeAlso $ businessCategory $
|
||||
x121Address $ registeredAddress $ destinationIndicator $
|
||||
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||
telephoneNumber $ internationaliSDNNumber $ facsimileTelephoneNumber $
|
||||
street $ postOfficeBox $ postalCode $ postalAddress $
|
||||
physicalDeliveryOfficeName $ st $ l $ description ) )
|
||||
|
||||
#
|
||||
# Object Classes from RFC 2587
|
||||
#
|
||||
objectclass ( 2.5.6.21 NAME 'pkiUser'
|
||||
DESC 'RFC2587: a PKI user'
|
||||
SUP top AUXILIARY
|
||||
MAY userCertificate )
|
||||
|
||||
objectclass ( 2.5.6.22 NAME 'pkiCA'
|
||||
DESC 'RFC2587: PKI certificate authority'
|
||||
SUP top AUXILIARY
|
||||
MAY ( authorityRevocationList $ certificateRevocationList $
|
||||
cACertificate $ crossCertificatePair ) )
|
||||
|
||||
objectclass ( 2.5.6.23 NAME 'deltaCRL'
|
||||
DESC 'RFC2587: PKI user'
|
||||
SUP top AUXILIARY
|
||||
MAY deltaRevocationList )
|
||||
|
||||
#
|
||||
# Standard Track URI label schema from RFC 2079
|
||||
# system schema
|
||||
#attributetype ( 1.3.6.1.4.1.250.1.57 NAME 'labeledURI'
|
||||
# DESC 'RFC2079: Uniform Resource Identifier with optional label'
|
||||
# EQUALITY caseExactMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
|
||||
objectclass ( 1.3.6.1.4.1.250.3.15 NAME 'labeledURIObject'
|
||||
DESC 'RFC2079: object that contains the URI attribute type'
|
||||
SUP top AUXILIARY
|
||||
MAY ( labeledURI ) )
|
||||
|
||||
#
|
||||
# Derived from RFC 1274, but with new "short names"
|
||||
#
|
||||
#attributetype ( 0.9.2342.19200300.100.1.1
|
||||
# NAME ( 'uid' 'userid' )
|
||||
# DESC 'RFC1274: user identifier'
|
||||
# EQUALITY caseIgnoreMatch
|
||||
# SUBSTR caseIgnoreSubstringsMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||
|
||||
attributetype ( 0.9.2342.19200300.100.1.3
|
||||
NAME ( 'mail' 'rfc822Mailbox' )
|
||||
DESC 'RFC1274: RFC822 Mailbox'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256} )
|
||||
|
||||
objectclass ( 0.9.2342.19200300.100.4.19 NAME 'simpleSecurityObject'
|
||||
DESC 'RFC1274: simple security object'
|
||||
SUP top AUXILIARY
|
||||
MUST userPassword )
|
||||
|
||||
# RFC 1274 + RFC 2247
|
||||
attributetype ( 0.9.2342.19200300.100.1.25
|
||||
NAME ( 'dc' 'domainComponent' )
|
||||
DESC 'RFC1274/2247: domain component'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||
|
||||
# RFC 2247
|
||||
objectclass ( 1.3.6.1.4.1.1466.344 NAME 'dcObject'
|
||||
DESC 'RFC2247: domain component object'
|
||||
SUP top AUXILIARY MUST dc )
|
||||
|
||||
# RFC 2377
|
||||
objectclass ( 1.3.6.1.1.3.1 NAME 'uidObject'
|
||||
DESC 'RFC2377: uid object'
|
||||
SUP top AUXILIARY MUST uid )
|
||||
|
||||
# RFC 4524
|
||||
# The 'associatedDomain' attribute specifies DNS [RFC1034][RFC2181]
|
||||
# host names [RFC1123] that are associated with an object. That is,
|
||||
# values of this attribute should conform to the following ABNF:
|
||||
#
|
||||
# domain = root / label *( DOT label )
|
||||
# root = SPACE
|
||||
# label = LETDIG [ *61( LETDIG / HYPHEN ) LETDIG ]
|
||||
# LETDIG = %x30-39 / %x41-5A / %x61-7A ; "0" - "9" / "A"-"Z" / "a"-"z"
|
||||
# SPACE = %x20 ; space (" ")
|
||||
# HYPHEN = %x2D ; hyphen ("-")
|
||||
# DOT = %x2E ; period (".")
|
||||
attributetype ( 0.9.2342.19200300.100.1.37
|
||||
NAME 'associatedDomain'
|
||||
DESC 'RFC1274: domain associated with object'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
|
||||
# RFC 2459 -- deprecated in favor of 'mail' (in cosine.schema)
|
||||
attributetype ( 1.2.840.113549.1.9.1
|
||||
NAME ( 'email' 'emailAddress' 'pkcs9email' )
|
||||
DESC 'RFC3280: legacy attribute for email addresses in DNs'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
|
||||
|
||||
200
docker/ldap/data/etc/schema/cosine.ldif
Normal file
200
docker/ldap/data/etc/schema/cosine.ldif
Normal file
@ -0,0 +1,200 @@
|
||||
# RFC1274: Cosine and Internet X.500 schema
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
# RFC1274: Cosine and Internet X.500 schema
|
||||
#
|
||||
# This file contains LDAPv3 schema derived from X.500 COSINE "pilot"
|
||||
# schema. As this schema was defined for X.500(89), some
|
||||
# oddities were introduced in the mapping to LDAPv3. The
|
||||
# mappings were based upon: draft-ietf-asid-ldapv3-attributes-03.txt
|
||||
# (a work in progress)
|
||||
#
|
||||
# Note: It seems that the pilot schema evolved beyond what was
|
||||
# described in RFC1274. However, this document attempts to describes
|
||||
# RFC1274 as published.
|
||||
#
|
||||
# Depends on core.ldif
|
||||
#
|
||||
# This file was automatically generated from cosine.schema; see that
|
||||
# file for complete background.
|
||||
#
|
||||
dn: cn=cosine,cn=schema,cn=config
|
||||
objectClass: olcSchemaConfig
|
||||
cn: cosine
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.2 NAME 'textEncodedORAddress'
|
||||
EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.
|
||||
1466.115.121.1.15{256} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.4 NAME 'info' DESC 'RFC1274: g
|
||||
eneral information' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{2048} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.5 NAME ( 'drink' 'favouriteDri
|
||||
nk' ) DESC 'RFC1274: favorite drink' EQUALITY caseIgnoreMatch SUBSTR caseIgno
|
||||
reSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.6 NAME 'roomNumber' DESC 'RFC1
|
||||
274: room number' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch S
|
||||
YNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.7 NAME 'photo' DESC 'RFC1274:
|
||||
photo (G3 fax)' SYNTAX 1.3.6.1.4.1.1466.115.121.1.23{25000} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.8 NAME 'userClass' DESC 'RFC12
|
||||
74: category of user' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMat
|
||||
ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.9 NAME 'host' DESC 'RFC1274: h
|
||||
ost computer' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTA
|
||||
X 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.10 NAME 'manager' DESC 'RFC127
|
||||
4: DN of manager' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115
|
||||
.121.1.12 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.11 NAME 'documentIdentifier' D
|
||||
ESC 'RFC1274: unique identifier of document' EQUALITY caseIgnoreMatch SUBSTR
|
||||
caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.12 NAME 'documentTitle' DESC '
|
||||
RFC1274: title of document' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstri
|
||||
ngsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.13 NAME 'documentVersion' DES
|
||||
C 'RFC1274: version of document' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSu
|
||||
bstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.14 NAME 'documentAuthor' DESC
|
||||
'RFC1274: DN of author of document' EQUALITY distinguishedNameMatch SYNTAX 1
|
||||
.3.6.1.4.1.1466.115.121.1.12 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.15 NAME 'documentLocation' DE
|
||||
SC 'RFC1274: location of document original' EQUALITY caseIgnoreMatch SUBSTR c
|
||||
aseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.20 NAME ( 'homePhone' 'homeTe
|
||||
lephoneNumber' ) DESC 'RFC1274: home telephone number' EQUALITY telephoneNumb
|
||||
erMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121
|
||||
.1.50 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.21 NAME 'secretary' DESC 'RFC
|
||||
1274: DN of secretary' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.146
|
||||
6.115.121.1.12 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.22 NAME 'otherMailbox' SYNTAX
|
||||
1.3.6.1.4.1.1466.115.121.1.39 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.26 NAME 'aRecord' EQUALITY ca
|
||||
seIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.27 NAME 'mDRecord' EQUALITY c
|
||||
aseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.28 NAME 'mXRecord' EQUALITY c
|
||||
aseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.29 NAME 'nSRecord' EQUALITY c
|
||||
aseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.30 NAME 'sOARecord' EQUALITY
|
||||
caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.31 NAME 'cNAMERecord' EQUALIT
|
||||
Y caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.38 NAME 'associatedName' DESC
|
||||
'RFC1274: DN of entry associated with domain' EQUALITY distinguishedNameMatc
|
||||
h SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.39 NAME 'homePostalAddress' D
|
||||
ESC 'RFC1274: home postal address' EQUALITY caseIgnoreListMatch SUBSTR caseIg
|
||||
noreListSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.40 NAME 'personalTitle' DESC
|
||||
'RFC1274: personal title' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstring
|
||||
sMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.41 NAME ( 'mobile' 'mobileTel
|
||||
ephoneNumber' ) DESC 'RFC1274: mobile telephone number' EQUALITY telephoneNum
|
||||
berMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.12
|
||||
1.1.50 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.42 NAME ( 'pager' 'pagerTelep
|
||||
honeNumber' ) DESC 'RFC1274: pager telephone number' EQUALITY telephoneNumber
|
||||
Match SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1
|
||||
.50 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.43 NAME ( 'co' 'friendlyCount
|
||||
ryName' ) DESC 'RFC1274: friendly country name' EQUALITY caseIgnoreMatch SUBS
|
||||
TR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.44 NAME 'uniqueIdentifier' DE
|
||||
SC 'RFC1274: unique identifer' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.14
|
||||
66.115.121.1.15{256} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.45 NAME 'organizationalStatus
|
||||
' DESC 'RFC1274: organizational status' EQUALITY caseIgnoreMatch SUBSTR caseI
|
||||
gnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.46 NAME 'janetMailbox' DESC '
|
||||
RFC1274: Janet mailbox' EQUALITY caseIgnoreIA5Match SUBSTR caseIgnoreIA5Subst
|
||||
ringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.47 NAME 'mailPreferenceOption
|
||||
' DESC 'RFC1274: mail preference option' SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
)
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.48 NAME 'buildingName' DESC '
|
||||
RFC1274: name of building' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstrin
|
||||
gsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.49 NAME 'dSAQuality' DESC 'RF
|
||||
C1274: DSA Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.19 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.50 NAME 'singleLevelQuality'
|
||||
DESC 'RFC1274: Single Level Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.13 SIN
|
||||
GLE-VALUE )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.51 NAME 'subtreeMinimumQualit
|
||||
y' DESC 'RFC1274: Subtree Mininum Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.
|
||||
13 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.52 NAME 'subtreeMaximumQualit
|
||||
y' DESC 'RFC1274: Subtree Maximun Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.
|
||||
13 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.53 NAME 'personalSignature' D
|
||||
ESC 'RFC1274: Personal Signature (G3 fax)' SYNTAX 1.3.6.1.4.1.1466.115.121.1.
|
||||
23 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.54 NAME 'dITRedirect' DESC 'R
|
||||
FC1274: DIT Redirect' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466
|
||||
.115.121.1.12 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.55 NAME 'audio' DESC 'RFC1274
|
||||
: audio (u-law)' SYNTAX 1.3.6.1.4.1.1466.115.121.1.4{25000} )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.56 NAME 'documentPublisher' D
|
||||
ESC 'RFC1274: publisher of document' EQUALITY caseIgnoreMatch SUBSTR caseIgno
|
||||
reSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
olcObjectClasses: ( 0.9.2342.19200300.100.4.4 NAME ( 'pilotPerson' 'newPilo
|
||||
tPerson' ) SUP person STRUCTURAL MAY ( userid $ textEncodedORAddress $ rfc822
|
||||
Mailbox $ favouriteDrink $ roomNumber $ userClass $ homeTelephoneNumber $ hom
|
||||
ePostalAddress $ secretary $ personalTitle $ preferredDeliveryMethod $ busine
|
||||
ssCategory $ janetMailbox $ otherMailbox $ mobileTelephoneNumber $ pagerTelep
|
||||
honeNumber $ organizationalStatus $ mailPreferenceOption $ personalSignature
|
||||
) )
|
||||
olcObjectClasses: ( 0.9.2342.19200300.100.4.5 NAME 'account' SUP top STRUCT
|
||||
URAL MUST userid MAY ( description $ seeAlso $ localityName $ organizationNam
|
||||
e $ organizationalUnitName $ host ) )
|
||||
olcObjectClasses: ( 0.9.2342.19200300.100.4.6 NAME 'document' SUP top STRUC
|
||||
TURAL MUST documentIdentifier MAY ( commonName $ description $ seeAlso $ loca
|
||||
lityName $ organizationName $ organizationalUnitName $ documentTitle $ docume
|
||||
ntVersion $ documentAuthor $ documentLocation $ documentPublisher ) )
|
||||
olcObjectClasses: ( 0.9.2342.19200300.100.4.7 NAME 'room' SUP top STRUCTURA
|
||||
L MUST commonName MAY ( roomNumber $ description $ seeAlso $ telephoneNumber
|
||||
) )
|
||||
olcObjectClasses: ( 0.9.2342.19200300.100.4.9 NAME 'documentSeries' SUP top
|
||||
STRUCTURAL MUST commonName MAY ( description $ seeAlso $ telephonenumber $ l
|
||||
ocalityName $ organizationName $ organizationalUnitName ) )
|
||||
olcObjectClasses: ( 0.9.2342.19200300.100.4.13 NAME 'domain' SUP top STRUCT
|
||||
URAL MUST domainComponent MAY ( associatedName $ organizationName $ descripti
|
||||
on $ businessCategory $ seeAlso $ searchGuide $ userPassword $ localityName $
|
||||
stateOrProvinceName $ streetAddress $ physicalDeliveryOfficeName $ postalAdd
|
||||
ress $ postalCode $ postOfficeBox $ streetAddress $ facsimileTelephoneNumber
|
||||
$ internationalISDNNumber $ telephoneNumber $ teletexTerminalIdentifier $ tel
|
||||
exNumber $ preferredDeliveryMethod $ destinationIndicator $ registeredAddress
|
||||
$ x121Address ) )
|
||||
olcObjectClasses: ( 0.9.2342.19200300.100.4.14 NAME 'RFC822localPart' SUP d
|
||||
omain STRUCTURAL MAY ( commonName $ surname $ description $ seeAlso $ telepho
|
||||
neNumber $ physicalDeliveryOfficeName $ postalAddress $ postalCode $ postOffi
|
||||
ceBox $ streetAddress $ facsimileTelephoneNumber $ internationalISDNNumber $
|
||||
telephoneNumber $ teletexTerminalIdentifier $ telexNumber $ preferredDelivery
|
||||
Method $ destinationIndicator $ registeredAddress $ x121Address ) )
|
||||
olcObjectClasses: ( 0.9.2342.19200300.100.4.15 NAME 'dNSDomain' SUP domain
|
||||
STRUCTURAL MAY ( ARecord $ MDRecord $ MXRecord $ NSRecord $ SOARecord $ CNAME
|
||||
Record ) )
|
||||
olcObjectClasses: ( 0.9.2342.19200300.100.4.17 NAME 'domainRelatedObject' D
|
||||
ESC 'RFC1274: an object related to an domain' SUP top AUXILIARY MUST associat
|
||||
edDomain )
|
||||
olcObjectClasses: ( 0.9.2342.19200300.100.4.18 NAME 'friendlyCountry' SUP c
|
||||
ountry STRUCTURAL MUST friendlyCountryName )
|
||||
olcObjectClasses: ( 0.9.2342.19200300.100.4.20 NAME 'pilotOrganization' SU
|
||||
P ( organization $ organizationalUnit ) STRUCTURAL MAY buildingName )
|
||||
olcObjectClasses: ( 0.9.2342.19200300.100.4.21 NAME 'pilotDSA' SUP dsa STR
|
||||
UCTURAL MAY dSAQuality )
|
||||
olcObjectClasses: ( 0.9.2342.19200300.100.4.22 NAME 'qualityLabelledData'
|
||||
SUP top AUXILIARY MUST dsaQuality MAY ( subtreeMinimumQuality $ subtreeMaximu
|
||||
mQuality ) )
|
||||
2571
docker/ldap/data/etc/schema/cosine.schema
Normal file
2571
docker/ldap/data/etc/schema/cosine.schema
Normal file
File diff suppressed because it is too large
Load Diff
83
docker/ldap/data/etc/schema/duaconf.ldif
Normal file
83
docker/ldap/data/etc/schema/duaconf.ldif
Normal file
@ -0,0 +1,83 @@
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
# DUA schema from draft-joslin-config-schema (a work in progress)
|
||||
#
|
||||
# This file was automatically generated from duaconf.schema; see that file
|
||||
# for complete references.
|
||||
#
|
||||
dn: cn=duaconf,cn=schema,cn=config
|
||||
objectClass: olcSchemaConfig
|
||||
cn: duaconf
|
||||
olcObjectIdentifier: {0}DUAConfSchemaOID 1.3.6.1.4.1.11.1.3.1
|
||||
olcAttributeTypes: {0}( DUAConfSchemaOID:1.0 NAME 'defaultServerList' DESC 'De
|
||||
fault LDAP server host address used by a DUA' EQUALITY caseIgnoreMatch SYNTAX
|
||||
1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
|
||||
olcAttributeTypes: {1}( DUAConfSchemaOID:1.1 NAME 'defaultSearchBase' DESC 'De
|
||||
fault LDAP base DN used by a DUA' EQUALITY distinguishedNameMatch SYNTAX 1.3.
|
||||
6.1.4.1.1466.115.121.1.12 SINGLE-VALUE )
|
||||
olcAttributeTypes: {2}( DUAConfSchemaOID:1.2 NAME 'preferredServerList' DESC '
|
||||
Preferred LDAP server host addresses to be used by a DUA' EQUALITY
|
||||
caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
|
||||
olcAttributeTypes: {3}( DUAConfSchemaOID:1.3 NAME 'searchTimeLimit' DESC 'Maxi
|
||||
mum time in seconds a DUA should allow for a search to complete' E
|
||||
QUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: {4}( DUAConfSchemaOID:1.4 NAME 'bindTimeLimit' DESC 'Maximu
|
||||
m time in seconds a DUA should allow for the bind operation to com
|
||||
plete' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALU
|
||||
E )
|
||||
olcAttributeTypes: {5}( DUAConfSchemaOID:1.5 NAME 'followReferrals' DESC 'Tell
|
||||
s DUA if it should follow referrals returned by a DSA search resul
|
||||
t' EQUALITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
|
||||
olcAttributeTypes: {6}( DUAConfSchemaOID:1.16 NAME 'dereferenceAliases' DESC '
|
||||
Tells DUA if it should dereference aliases' EQUALITY booleanMatch SYNTAX 1.3.
|
||||
6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
|
||||
olcAttributeTypes: {7}( DUAConfSchemaOID:1.6 NAME 'authenticationMethod' DESC
|
||||
'A keystring which identifies the type of authentication method us
|
||||
ed to contact the DSA' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.1
|
||||
21.1.15 SINGLE-VALUE )
|
||||
olcAttributeTypes: {8}( DUAConfSchemaOID:1.7 NAME 'profileTTL' DESC 'Time to l
|
||||
ive, in seconds, before a client DUA should re-read this configura
|
||||
tion profile' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SING
|
||||
LE-VALUE )
|
||||
olcAttributeTypes: {9}( DUAConfSchemaOID:1.14 NAME 'serviceSearchDescriptor' D
|
||||
ESC 'LDAP search descriptor list used by a DUA' EQUALITY caseExactMatch SYNTA
|
||||
X 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
olcAttributeTypes: {10}( DUAConfSchemaOID:1.9 NAME 'attributeMap' DESC 'Attrib
|
||||
ute mappings used by a DUA' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.14
|
||||
66.115.121.1.26 )
|
||||
olcAttributeTypes: {11}( DUAConfSchemaOID:1.10 NAME 'credentialLevel' DESC 'Id
|
||||
entifies type of credentials a DUA should use when binding to the
|
||||
LDAP server' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||
SINGLE-VALUE )
|
||||
olcAttributeTypes: {12}( DUAConfSchemaOID:1.11 NAME 'objectclassMap' DESC 'Obj
|
||||
ectclass mappings used by a DUA' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4
|
||||
.1.1466.115.121.1.26 )
|
||||
olcAttributeTypes: {13}( DUAConfSchemaOID:1.12 NAME 'defaultSearchScope' DESC
|
||||
'Default search scope used by a DUA' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6
|
||||
.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||
olcAttributeTypes: {14}( DUAConfSchemaOID:1.13 NAME 'serviceCredentialLevel' D
|
||||
ESC 'Identifies type of credentials a DUA should use when binding
|
||||
to the LDAP server for a specific service' EQUALITY caseIgnoreIA5M
|
||||
atch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
olcAttributeTypes: {15}( DUAConfSchemaOID:1.15 NAME 'serviceAuthenticationMeth
|
||||
od' DESC 'Authentication method used by a service of the DUA' EQUALITY caseIg
|
||||
noreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
olcObjectClasses: {0}( DUAConfSchemaOID:2.5 NAME 'DUAConfigProfile' DESC 'Abst
|
||||
raction of a base configuration for a DUA' SUP top STRUCTURAL MUST cn MAY ( d
|
||||
efaultServerList $ preferredServerList $ defaultSearchBase $ defaultSearchSco
|
||||
pe $ searchTimeLimit $ bindTimeLimit $ credentialLevel $ authenticationMethod
|
||||
$ followReferrals $ dereferenceAliases $ serviceSearchDescriptor $ serviceCr
|
||||
edentialLevel $ serviceAuthenticationMethod $ objectclassMap $ attributeMap $
|
||||
profileTTL ) )
|
||||
261
docker/ldap/data/etc/schema/duaconf.schema
Normal file
261
docker/ldap/data/etc/schema/duaconf.schema
Normal file
@ -0,0 +1,261 @@
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
|
||||
# DUA schema from draft-joslin-config-schema (a work in progress)
|
||||
|
||||
# Contents of this file are subject to change (including deletion)
|
||||
# without notice.
|
||||
#
|
||||
# Not recommended for production use!
|
||||
# Use with extreme caution!
|
||||
|
||||
## Notes:
|
||||
## - The matching rule for attributes followReferrals and dereferenceAliases
|
||||
## has been changed to booleanMatch since their syntax is boolean
|
||||
## - There was a typo in the name of the dereferenceAliases attributeType
|
||||
## in the DUAConfigProfile objectClass definition
|
||||
## - Credit goes to the original Authors
|
||||
|
||||
#
|
||||
# Application Working Group M. Ansari
|
||||
# INTERNET-DRAFT Sun Microsystems, Inc.
|
||||
# Expires Febuary 2003 L. Howard
|
||||
# PADL Software Pty. Ltd.
|
||||
# B. Joslin [ed.]
|
||||
# Hewlett-Packard Company
|
||||
#
|
||||
# September 15th, 2003
|
||||
# Intended Category: Informational
|
||||
#
|
||||
#
|
||||
# A Configuration Schema for LDAP Based
|
||||
# Directory User Agents
|
||||
# <draft-joslin-config-schema-07.txt>
|
||||
#
|
||||
#Status of this Memo
|
||||
#
|
||||
# This memo provides information for the Internet community. This
|
||||
# memo does not specify an Internet standard of any kind. Distribu-
|
||||
# tion of this memo is unlimited.
|
||||
#
|
||||
# This document is an Internet-Draft and is in full conformance with
|
||||
# all provisions of Section 10 of RFC2026.
|
||||
#
|
||||
# This document is an Internet-Draft. Internet-Drafts are working
|
||||
# documents of the Internet Engineering Task Force (IETF), its areas,
|
||||
# and its working groups. Note that other groups may also distribute
|
||||
# working documents as Internet-Drafts.
|
||||
#
|
||||
# Internet-Drafts are draft documents valid for a maximum of six
|
||||
# months. Internet-Drafts may be updated, replaced, or made obsolete
|
||||
# by other documents at any time. It is not appropriate to use
|
||||
# Internet-Drafts as reference material or to cite them other than as
|
||||
# a "working draft" or "work in progress".
|
||||
#
|
||||
# To learn the current status of any Internet-Draft, please check the
|
||||
# 1id-abstracts.txt listing contained in the Internet-Drafts Shadow
|
||||
# Directories on ds.internic.net (US East Coast), nic.nordu.net
|
||||
# (Europe), ftp.isi.edu (US West Coast), or munnari.oz.au (Pacific
|
||||
# Rim).
|
||||
#
|
||||
# Distribution of this document is unlimited.
|
||||
#
|
||||
#
|
||||
# Abstract
|
||||
#
|
||||
# This document describes a mechanism for global configuration of
|
||||
# similar directory user agents. This document defines a schema for
|
||||
# configuration of these DUAs that may be discovered using the Light-
|
||||
# weight Directory Access Protocol in RFC 2251[17]. A set of attri-
|
||||
# bute types and an objectclass are proposed, along with specific
|
||||
# guidelines for interpreting them. A significant feature of the
|
||||
# global configuration policy for DUAs is a mechanism that allows
|
||||
# DUAs to re-configure their schema to that of the end user's
|
||||
# environment. This configuration is achieved through attribute and
|
||||
# objectclass mapping. This document is intended to be a skeleton
|
||||
# for future documents that describe configuration of specific DUA
|
||||
# services.
|
||||
#
|
||||
#
|
||||
# [trimmed]
|
||||
#
|
||||
#
|
||||
# 2. General Issues
|
||||
#
|
||||
# The schema defined by this document is defined under the "DUA Con-
|
||||
# figuration Schema." This schema is derived from the OID: iso (1)
|
||||
# org (3) dod (6) internet (1) private (4) enterprises (1) Hewlett-
|
||||
# Packard Company (11) directory (1) LDAP-UX Integration Project (3)
|
||||
# DUA Configuration Schema (1). This OID is represented in this
|
||||
# document by the keystring "DUAConfSchemaOID"
|
||||
# (1.3.6.1.4.1.11.1.3.1).
|
||||
objectidentifier DUAConfSchemaOID 1.3.6.1.4.1.11.1.3.1
|
||||
#
|
||||
# 2.2 Attributes
|
||||
#
|
||||
# The attributes and classes defined in this document are summarized
|
||||
# below.
|
||||
#
|
||||
# The following attributes are defined in this document:
|
||||
#
|
||||
# preferredServerList
|
||||
# defaultServerList
|
||||
# defaultSearchBase
|
||||
# defaultSearchScope
|
||||
# authenticationMethod
|
||||
# credentialLevel
|
||||
# serviceSearchDescriptor
|
||||
#
|
||||
#
|
||||
#
|
||||
# Joslin [Page 3]
|
||||
# Internet-Draft DUA Configuration Schema October 2002
|
||||
#
|
||||
#
|
||||
# serviceCredentialLevel
|
||||
# serviceAuthenticationMethod
|
||||
# attributeMap
|
||||
# objectclassMap
|
||||
# searchTimeLimit
|
||||
# bindTimeLimit
|
||||
# followReferrals
|
||||
# dereferenceAliases
|
||||
# profileTTL
|
||||
#
|
||||
# 2.3 Object Classes
|
||||
#
|
||||
# The following object class is defined in this document:
|
||||
#
|
||||
# DUAConfigProfile
|
||||
#
|
||||
#
|
||||
attributeType ( DUAConfSchemaOID:1.0 NAME 'defaultServerList'
|
||||
DESC 'Default LDAP server host address used by a DUA'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||
SINGLE-VALUE )
|
||||
|
||||
attributeType ( DUAConfSchemaOID:1.1 NAME 'defaultSearchBase'
|
||||
DESC 'Default LDAP base DN used by a DUA'
|
||||
EQUALITY distinguishedNameMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
|
||||
SINGLE-VALUE )
|
||||
|
||||
attributeType ( DUAConfSchemaOID:1.2 NAME 'preferredServerList'
|
||||
DESC 'Preferred LDAP server host addresses to be used by a
|
||||
DUA'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||
SINGLE-VALUE )
|
||||
|
||||
attributeType ( DUAConfSchemaOID:1.3 NAME 'searchTimeLimit'
|
||||
DESC 'Maximum time in seconds a DUA should allow for a
|
||||
search to complete'
|
||||
EQUALITY integerMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
|
||||
attributeType ( DUAConfSchemaOID:1.4 NAME 'bindTimeLimit'
|
||||
DESC 'Maximum time in seconds a DUA should allow for the
|
||||
bind operation to complete'
|
||||
EQUALITY integerMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
|
||||
attributeType ( DUAConfSchemaOID:1.5 NAME 'followReferrals'
|
||||
DESC 'Tells DUA if it should follow referrals
|
||||
returned by a DSA search result'
|
||||
EQUALITY booleanMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
||||
SINGLE-VALUE )
|
||||
|
||||
attributeType ( DUAConfSchemaOID:1.16 NAME 'dereferenceAliases'
|
||||
DESC 'Tells DUA if it should dereference aliases'
|
||||
EQUALITY booleanMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
||||
SINGLE-VALUE )
|
||||
|
||||
attributeType ( DUAConfSchemaOID:1.6 NAME 'authenticationMethod'
|
||||
DESC 'A keystring which identifies the type of
|
||||
authentication method used to contact the DSA'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||
SINGLE-VALUE )
|
||||
|
||||
attributeType ( DUAConfSchemaOID:1.7 NAME 'profileTTL'
|
||||
DESC 'Time to live, in seconds, before a client DUA
|
||||
should re-read this configuration profile'
|
||||
EQUALITY integerMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
|
||||
attributeType ( DUAConfSchemaOID:1.14 NAME 'serviceSearchDescriptor'
|
||||
DESC 'LDAP search descriptor list used by a DUA'
|
||||
EQUALITY caseExactMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
|
||||
attributeType ( DUAConfSchemaOID:1.9 NAME 'attributeMap'
|
||||
DESC 'Attribute mappings used by a DUA'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
|
||||
attributeType ( DUAConfSchemaOID:1.10 NAME 'credentialLevel'
|
||||
DESC 'Identifies type of credentials a DUA should
|
||||
use when binding to the LDAP server'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||
SINGLE-VALUE )
|
||||
|
||||
attributeType ( DUAConfSchemaOID:1.11 NAME 'objectclassMap'
|
||||
DESC 'Objectclass mappings used by a DUA'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
|
||||
attributeType ( DUAConfSchemaOID:1.12 NAME 'defaultSearchScope'
|
||||
DESC 'Default search scope used by a DUA'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||
SINGLE-VALUE )
|
||||
|
||||
attributeType ( DUAConfSchemaOID:1.13 NAME 'serviceCredentialLevel'
|
||||
DESC 'Identifies type of credentials a DUA
|
||||
should use when binding to the LDAP server for a
|
||||
specific service'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
|
||||
attributeType ( DUAConfSchemaOID:1.15 NAME 'serviceAuthenticationMethod'
|
||||
DESC 'Authentication method used by a service of the DUA'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
#
|
||||
# 4. Class Definition
|
||||
#
|
||||
# The objectclass below is constructed from the attributes defined in
|
||||
# 3, with the exception of the cn attribute, which is defined in RFC
|
||||
# 2256 [8]. cn is used to represent the name of the DUA configura-
|
||||
# tion profile.
|
||||
#
|
||||
objectClass ( DUAConfSchemaOID:2.5 NAME 'DUAConfigProfile'
|
||||
SUP top STRUCTURAL
|
||||
DESC 'Abstraction of a base configuration for a DUA'
|
||||
MUST ( cn )
|
||||
MAY ( defaultServerList $ preferredServerList $
|
||||
defaultSearchBase $ defaultSearchScope $
|
||||
searchTimeLimit $ bindTimeLimit $
|
||||
credentialLevel $ authenticationMethod $
|
||||
followReferrals $ dereferenceAliases $
|
||||
serviceSearchDescriptor $ serviceCredentialLevel $
|
||||
serviceAuthenticationMethod $ objectclassMap $
|
||||
attributeMap $ profileTTL ) )
|
||||
71
docker/ldap/data/etc/schema/dyngroup.ldif
Normal file
71
docker/ldap/data/etc/schema/dyngroup.ldif
Normal file
@ -0,0 +1,71 @@
|
||||
# dyngroup.schema -- Dynamic Group schema
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
# Dynamic Group schema (experimental), as defined by Netscape. See
|
||||
# http://www.redhat.com/docs/manuals/ent-server/pdf/esadmin611.pdf
|
||||
# page 70 for details on how these groups were used.
|
||||
#
|
||||
# A description of the objectclass definition is available here:
|
||||
# http://www.redhat.com/docs/manuals/dir-server/schema/7.1/oc_dir.html#1303745
|
||||
#
|
||||
# depends upon:
|
||||
# core.schema
|
||||
#
|
||||
# These definitions are considered experimental due to the lack of
|
||||
# a formal specification (e.g., RFC).
|
||||
#
|
||||
# NOT RECOMMENDED FOR PRODUCTION USE! USE WITH CAUTION!
|
||||
#
|
||||
# The Netscape documentation describes this as an auxiliary objectclass
|
||||
# but their implementations have always defined it as a structural class.
|
||||
# The sloppiness here is because Netscape-derived servers don't actually
|
||||
# implement the X.500 data model, and they don't honor the distinction
|
||||
# between structural and auxiliary classes. This fact is noted here:
|
||||
# http://forum.java.sun.com/thread.jspa?threadID=5016864&messageID=9034636
|
||||
#
|
||||
# In accordance with other existing implementations, we define it as a
|
||||
# structural class.
|
||||
#
|
||||
# Our definition of memberURL also does not match theirs but again
|
||||
# their published definition and what works in practice do not agree.
|
||||
# In other words, the Netscape definitions are broken and interoperability
|
||||
# is not guaranteed.
|
||||
#
|
||||
# Also see the new DynGroup proposed spec at
|
||||
# http://tools.ietf.org/html/draft-haripriya-dynamicgroup-02
|
||||
dn: cn=dyngroup,cn=schema,cn=config
|
||||
objectClass: olcSchemaConfig
|
||||
cn: dyngroup
|
||||
olcObjectIdentifier: {0}NetscapeRoot 2.16.840.1.113730
|
||||
olcObjectIdentifier: {1}NetscapeLDAP NetscapeRoot:3
|
||||
olcObjectIdentifier: {2}NetscapeLDAPattributeType NetscapeLDAP:1
|
||||
olcObjectIdentifier: {3}NetscapeLDAPobjectClass NetscapeLDAP:2
|
||||
olcObjectIdentifier: {4}OpenLDAPExp11 1.3.6.1.4.1.4203.666.11
|
||||
olcObjectIdentifier: {5}DynGroupBase OpenLDAPExp11:8
|
||||
olcObjectIdentifier: {6}DynGroupAttr DynGroupBase:1
|
||||
olcObjectIdentifier: {7}DynGroupOC DynGroupBase:2
|
||||
olcAttributeTypes: {0}( NetscapeLDAPattributeType:198 NAME 'memberURL' DESC 'I
|
||||
dentifies an URL associated with each member of a group. Any type of labeled
|
||||
URL can be used.' SUP labeledURI )
|
||||
olcAttributeTypes: {1}( DynGroupAttr:1 NAME 'dgIdentity' DESC 'Identity to use
|
||||
when processing the memberURL' SUP distinguishedName SINGLE-VALUE )
|
||||
olcAttributeTypes: {2}( DynGroupAttr:2 NAME 'dgAuthz' DESC 'Optional authoriza
|
||||
tion rules that determine who is allowed to assume the dgIdentity' EQUALITY a
|
||||
uthzMatch SYNTAX 1.3.6.1.4.1.4203.666.2.7 X-ORDERED 'VALUES' )
|
||||
olcObjectClasses: {0}( NetscapeLDAPobjectClass:33 NAME 'groupOfURLs' SUP top S
|
||||
TRUCTURAL MUST cn MAY ( memberURL $ businessCategory $ description $ o $ ou $
|
||||
owner $ seeAlso ) )
|
||||
olcObjectClasses: {1}( DynGroupOC:1 NAME 'dgIdentityAux' SUP top AUXILIARY MAY
|
||||
( dgIdentity $ dgAuthz ) )
|
||||
91
docker/ldap/data/etc/schema/dyngroup.schema
Normal file
91
docker/ldap/data/etc/schema/dyngroup.schema
Normal file
@ -0,0 +1,91 @@
|
||||
# dyngroup.schema -- Dynamic Group schema
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
# Dynamic Group schema (experimental), as defined by Netscape. See
|
||||
# http://www.redhat.com/docs/manuals/ent-server/pdf/esadmin611.pdf
|
||||
# page 70 for details on how these groups were used.
|
||||
#
|
||||
# A description of the objectclass definition is available here:
|
||||
# http://www.redhat.com/docs/manuals/dir-server/schema/7.1/oc_dir.html#1303745
|
||||
#
|
||||
# depends upon:
|
||||
# core.schema
|
||||
#
|
||||
# These definitions are considered experimental due to the lack of
|
||||
# a formal specification (e.g., RFC).
|
||||
#
|
||||
# NOT RECOMMENDED FOR PRODUCTION USE! USE WITH CAUTION!
|
||||
#
|
||||
# The Netscape documentation describes this as an auxiliary objectclass
|
||||
# but their implementations have always defined it as a structural class.
|
||||
# The sloppiness here is because Netscape-derived servers don't actually
|
||||
# implement the X.500 data model, and they don't honor the distinction
|
||||
# between structural and auxiliary classes. This fact is noted here:
|
||||
# http://forum.java.sun.com/thread.jspa?threadID=5016864&messageID=9034636
|
||||
#
|
||||
# In accordance with other existing implementations, we define it as a
|
||||
# structural class.
|
||||
#
|
||||
# Our definition of memberURL also does not match theirs but again
|
||||
# their published definition and what works in practice do not agree.
|
||||
# In other words, the Netscape definitions are broken and interoperability
|
||||
# is not guaranteed.
|
||||
#
|
||||
# Also see the new DynGroup proposed spec at
|
||||
# http://tools.ietf.org/html/draft-haripriya-dynamicgroup-02
|
||||
|
||||
objectIdentifier NetscapeRoot 2.16.840.1.113730
|
||||
|
||||
objectIdentifier NetscapeLDAP NetscapeRoot:3
|
||||
objectIdentifier NetscapeLDAPattributeType NetscapeLDAP:1
|
||||
objectIdentifier NetscapeLDAPobjectClass NetscapeLDAP:2
|
||||
|
||||
objectIdentifier OpenLDAPExp11 1.3.6.1.4.1.4203.666.11
|
||||
objectIdentifier DynGroupBase OpenLDAPExp11:8
|
||||
objectIdentifier DynGroupAttr DynGroupBase:1
|
||||
objectIdentifier DynGroupOC DynGroupBase:2
|
||||
|
||||
attributetype ( NetscapeLDAPattributeType:198
|
||||
NAME 'memberURL'
|
||||
DESC 'Identifies an URL associated with each member of a group. Any type of labeled URL can be used.'
|
||||
SUP labeledURI )
|
||||
|
||||
attributetype ( DynGroupAttr:1
|
||||
NAME 'dgIdentity'
|
||||
DESC 'Identity to use when processing the memberURL'
|
||||
SUP distinguishedName SINGLE-VALUE )
|
||||
|
||||
attributeType ( DynGroupAttr:2
|
||||
NAME 'dgAuthz'
|
||||
DESC 'Optional authorization rules that determine who is allowed to assume the dgIdentity'
|
||||
EQUALITY authzMatch
|
||||
SYNTAX 1.3.6.1.4.1.4203.666.2.7
|
||||
X-ORDERED 'VALUES' )
|
||||
|
||||
objectClass ( NetscapeLDAPobjectClass:33
|
||||
NAME 'groupOfURLs'
|
||||
SUP top STRUCTURAL
|
||||
MUST cn
|
||||
MAY ( memberURL $ businessCategory $ description $ o $ ou $
|
||||
owner $ seeAlso ) )
|
||||
|
||||
# The Haripriya dyngroup schema still needs a lot of work.
|
||||
# We're just adding support for the dgIdentity attribute for now...
|
||||
objectClass ( DynGroupOC:1
|
||||
NAME 'dgIdentityAux'
|
||||
SUP top AUXILIARY
|
||||
MAY ( dgIdentity $ dgAuthz ) )
|
||||
|
||||
|
||||
69
docker/ldap/data/etc/schema/inetorgperson.ldif
Normal file
69
docker/ldap/data/etc/schema/inetorgperson.ldif
Normal file
@ -0,0 +1,69 @@
|
||||
# InetOrgPerson (RFC2798)
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
# InetOrgPerson (RFC2798)
|
||||
#
|
||||
# Depends upon
|
||||
# Definition of an X.500 Attribute Type and an Object Class to Hold
|
||||
# Uniform Resource Identifiers (URIs) [RFC2079]
|
||||
# (core.ldif)
|
||||
#
|
||||
# A Summary of the X.500(96) User Schema for use with LDAPv3 [RFC2256]
|
||||
# (core.ldif)
|
||||
#
|
||||
# The COSINE and Internet X.500 Schema [RFC1274] (cosine.ldif)
|
||||
#
|
||||
# This file was automatically generated from inetorgperson.schema; see
|
||||
# that file for complete references.
|
||||
#
|
||||
dn: cn=inetorgperson,cn=schema,cn=config
|
||||
objectClass: olcSchemaConfig
|
||||
cn: inetorgperson
|
||||
olcAttributeTypes: ( 2.16.840.1.113730.3.1.1 NAME 'carLicense' DESC 'RFC279
|
||||
8: vehicle license or registration plate' EQUALITY caseIgnoreMatch SUBSTR cas
|
||||
eIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
olcAttributeTypes: ( 2.16.840.1.113730.3.1.2 NAME 'departmentNumber' DESC '
|
||||
RFC2798: identifies a department within an organization' EQUALITY caseIgnoreM
|
||||
atch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
olcAttributeTypes: ( 2.16.840.1.113730.3.1.241 NAME 'displayName' DESC 'RFC
|
||||
2798: preferred name to be used when displaying entries' EQUALITY caseIgnoreM
|
||||
atch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SI
|
||||
NGLE-VALUE )
|
||||
olcAttributeTypes: ( 2.16.840.1.113730.3.1.3 NAME 'employeeNumber' DESC 'RF
|
||||
C2798: numerically identifies an employee within an organization' EQUALITY ca
|
||||
seIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.12
|
||||
1.1.15 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 2.16.840.1.113730.3.1.4 NAME 'employeeType' DESC 'RFC2
|
||||
798: type of employment for a person' EQUALITY caseIgnoreMatch SUBSTR caseIgn
|
||||
oreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
olcAttributeTypes: ( 0.9.2342.19200300.100.1.60 NAME 'jpegPhoto' DESC 'RFC2
|
||||
798: a JPEG image' SYNTAX 1.3.6.1.4.1.1466.115.121.1.28 )
|
||||
olcAttributeTypes: ( 2.16.840.1.113730.3.1.39 NAME 'preferredLanguage' DESC
|
||||
'RFC2798: preferred written or spoken language for a person' EQUALITY caseIg
|
||||
noreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.
|
||||
15 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 2.16.840.1.113730.3.1.40 NAME 'userSMIMECertificate' D
|
||||
ESC 'RFC2798: PKCS#7 SignedData used to support S/MIME' SYNTAX 1.3.6.1.4.1.14
|
||||
66.115.121.1.5 )
|
||||
olcAttributeTypes: ( 2.16.840.1.113730.3.1.216 NAME 'userPKCS12' DESC 'RFC2
|
||||
798: personal identity information, a PKCS #12 PFX' SYNTAX 1.3.6.1.4.1.1466.1
|
||||
15.121.1.5 )
|
||||
olcObjectClasses: ( 2.16.840.1.113730.3.2.2 NAME 'inetOrgPerson' DESC 'RFC2
|
||||
798: Internet Organizational Person' SUP organizationalPerson STRUCTURAL MAY
|
||||
( audio $ businessCategory $ carLicense $ departmentNumber $ displayName $ em
|
||||
ployeeNumber $ employeeType $ givenName $ homePhone $ homePostalAddress $ ini
|
||||
tials $ jpegPhoto $ labeledURI $ mail $ manager $ mobile $ o $ pager $ photo
|
||||
$ roomNumber $ secretary $ uid $ userCertificate $ x500uniqueIdentifier $ pre
|
||||
ferredLanguage $ userSMIMECertificate $ userPKCS12 ) )
|
||||
155
docker/ldap/data/etc/schema/inetorgperson.schema
Normal file
155
docker/ldap/data/etc/schema/inetorgperson.schema
Normal file
@ -0,0 +1,155 @@
|
||||
# inetorgperson.schema -- InetOrgPerson (RFC2798)
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
# InetOrgPerson (RFC2798)
|
||||
#
|
||||
# Depends upon
|
||||
# Definition of an X.500 Attribute Type and an Object Class to Hold
|
||||
# Uniform Resource Identifiers (URIs) [RFC2079]
|
||||
# (core.schema)
|
||||
#
|
||||
# A Summary of the X.500(96) User Schema for use with LDAPv3 [RFC2256]
|
||||
# (core.schema)
|
||||
#
|
||||
# The COSINE and Internet X.500 Schema [RFC1274] (cosine.schema)
|
||||
|
||||
# carLicense
|
||||
# This multivalued field is used to record the values of the license or
|
||||
# registration plate associated with an individual.
|
||||
attributetype ( 2.16.840.1.113730.3.1.1
|
||||
NAME 'carLicense'
|
||||
DESC 'RFC2798: vehicle license or registration plate'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
|
||||
# departmentNumber
|
||||
# Code for department to which a person belongs. This can also be
|
||||
# strictly numeric (e.g., 1234) or alphanumeric (e.g., ABC/123).
|
||||
attributetype ( 2.16.840.1.113730.3.1.2
|
||||
NAME 'departmentNumber'
|
||||
DESC 'RFC2798: identifies a department within an organization'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
|
||||
# displayName
|
||||
# When displaying an entry, especially within a one-line summary list, it
|
||||
# is useful to be able to identify a name to be used. Since other attri-
|
||||
# bute types such as 'cn' are multivalued, an additional attribute type is
|
||||
# needed. Display name is defined for this purpose.
|
||||
attributetype ( 2.16.840.1.113730.3.1.241
|
||||
NAME 'displayName'
|
||||
DESC 'RFC2798: preferred name to be used when displaying entries'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||
SINGLE-VALUE )
|
||||
|
||||
# employeeNumber
|
||||
# Numeric or alphanumeric identifier assigned to a person, typically based
|
||||
# on order of hire or association with an organization. Single valued.
|
||||
attributetype ( 2.16.840.1.113730.3.1.3
|
||||
NAME 'employeeNumber'
|
||||
DESC 'RFC2798: numerically identifies an employee within an organization'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||
SINGLE-VALUE )
|
||||
|
||||
# employeeType
|
||||
# Used to identify the employer to employee relationship. Typical values
|
||||
# used will be "Contractor", "Employee", "Intern", "Temp", "External", and
|
||||
# "Unknown" but any value may be used.
|
||||
attributetype ( 2.16.840.1.113730.3.1.4
|
||||
NAME 'employeeType'
|
||||
DESC 'RFC2798: type of employment for a person'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
|
||||
# jpegPhoto
|
||||
# Used to store one or more images of a person using the JPEG File
|
||||
# Interchange Format [JFIF].
|
||||
# Note that the jpegPhoto attribute type was defined for use in the
|
||||
# Internet X.500 pilots but no referencable definition for it could be
|
||||
# located.
|
||||
attributetype ( 0.9.2342.19200300.100.1.60
|
||||
NAME 'jpegPhoto'
|
||||
DESC 'RFC2798: a JPEG image'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.28 )
|
||||
|
||||
# preferredLanguage
|
||||
# Used to indicate an individual's preferred written or spoken
|
||||
# language. This is useful for international correspondence or human-
|
||||
# computer interaction. Values for this attribute type MUST conform to
|
||||
# the definition of the Accept-Language header field defined in
|
||||
# [RFC2068] with one exception: the sequence "Accept-Language" ":"
|
||||
# should be omitted. This is a single valued attribute type.
|
||||
attributetype ( 2.16.840.1.113730.3.1.39
|
||||
NAME 'preferredLanguage'
|
||||
DESC 'RFC2798: preferred written or spoken language for a person'
|
||||
EQUALITY caseIgnoreMatch
|
||||
SUBSTR caseIgnoreSubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||
SINGLE-VALUE )
|
||||
|
||||
# userSMIMECertificate
|
||||
# A PKCS#7 [RFC2315] SignedData, where the content that is signed is
|
||||
# ignored by consumers of userSMIMECertificate values. It is
|
||||
# recommended that values have a `contentType' of data with an absent
|
||||
# `content' field. Values of this attribute contain a person's entire
|
||||
# certificate chain and an smimeCapabilities field [RFC2633] that at a
|
||||
# minimum describes their SMIME algorithm capabilities. Values for
|
||||
# this attribute are to be stored and requested in binary form, as
|
||||
# 'userSMIMECertificate;binary'. If available, this attribute is
|
||||
# preferred over the userCertificate attribute for S/MIME applications.
|
||||
## OpenLDAP note: ";binary" transfer should NOT be used as syntax is binary
|
||||
attributetype ( 2.16.840.1.113730.3.1.40
|
||||
NAME 'userSMIMECertificate'
|
||||
DESC 'RFC2798: PKCS#7 SignedData used to support S/MIME'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.5 )
|
||||
|
||||
# userPKCS12
|
||||
# PKCS #12 [PKCS12] provides a format for exchange of personal identity
|
||||
# information. When such information is stored in a directory service,
|
||||
# the userPKCS12 attribute should be used. This attribute is to be stored
|
||||
# and requested in binary form, as 'userPKCS12;binary'. The attribute
|
||||
# values are PFX PDUs stored as binary data.
|
||||
## OpenLDAP note: ";binary" transfer should NOT be used as syntax is binary
|
||||
attributetype ( 2.16.840.1.113730.3.1.216
|
||||
NAME 'userPKCS12'
|
||||
DESC 'RFC2798: personal identity information, a PKCS #12 PFX'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.5 )
|
||||
|
||||
|
||||
# inetOrgPerson
|
||||
# The inetOrgPerson represents people who are associated with an
|
||||
# organization in some way. It is a structural class and is derived
|
||||
# from the organizationalPerson which is defined in X.521 [X521].
|
||||
objectclass ( 2.16.840.1.113730.3.2.2
|
||||
NAME 'inetOrgPerson'
|
||||
DESC 'RFC2798: Internet Organizational Person'
|
||||
SUP organizationalPerson
|
||||
STRUCTURAL
|
||||
MAY (
|
||||
audio $ businessCategory $ carLicense $ departmentNumber $
|
||||
displayName $ employeeNumber $ employeeType $ givenName $
|
||||
homePhone $ homePostalAddress $ initials $ jpegPhoto $
|
||||
labeledURI $ mail $ manager $ mobile $ o $ pager $
|
||||
photo $ roomNumber $ secretary $ uid $ userCertificate $
|
||||
x500uniqueIdentifier $ preferredLanguage $
|
||||
userSMIMECertificate $ userPKCS12 )
|
||||
)
|
||||
59
docker/ldap/data/etc/schema/java.ldif
Normal file
59
docker/ldap/data/etc/schema/java.ldif
Normal file
@ -0,0 +1,59 @@
|
||||
# java.ldif -- Java Object Schema
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
# Java Object Schema (defined in RFC 2713)
|
||||
# depends upon core.ldif
|
||||
#
|
||||
# This file was automatically generated from java.schema; see that file
|
||||
# for complete references.
|
||||
#
|
||||
dn: cn=java,cn=schema,cn=config
|
||||
objectClass: olcSchemaConfig
|
||||
cn: java
|
||||
olcAttributeTypes: {0}( 1.3.6.1.4.1.42.2.27.4.1.6 NAME 'javaClassName' DESC 'F
|
||||
ully qualified name of distinguished Java class or interface' EQUALITY caseEx
|
||||
actMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
|
||||
olcAttributeTypes: {1}( 1.3.6.1.4.1.42.2.27.4.1.7 NAME 'javaCodebase' DESC 'UR
|
||||
L(s) specifying the location of class definition' EQUALITY caseExactIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
olcAttributeTypes: {2}( 1.3.6.1.4.1.42.2.27.4.1.13 NAME 'javaClassNames' DESC
|
||||
'Fully qualified Java class or interface name' EQUALITY caseExactMatch SYNTAX
|
||||
1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
olcAttributeTypes: {3}( 1.3.6.1.4.1.42.2.27.4.1.8 NAME 'javaSerializedData' DE
|
||||
SC 'Serialized form of a Java object' SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 SI
|
||||
NGLE-VALUE )
|
||||
olcAttributeTypes: {4}( 1.3.6.1.4.1.42.2.27.4.1.10 NAME 'javaFactory' DESC 'Fu
|
||||
lly qualified Java class name of a JNDI object factory' EQUALITY caseExactMat
|
||||
ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
|
||||
olcAttributeTypes: {5}( 1.3.6.1.4.1.42.2.27.4.1.11 NAME 'javaReferenceAddress'
|
||||
DESC 'Addresses associated with a JNDI Reference' EQUALITY caseExactMatch SY
|
||||
NTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
olcAttributeTypes: {6}( 1.3.6.1.4.1.42.2.27.4.1.12 NAME 'javaDoc' DESC 'The Ja
|
||||
va documentation for the class' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1
|
||||
.1466.115.121.1.26 )
|
||||
olcObjectClasses: {0}( 1.3.6.1.4.1.42.2.27.4.2.1 NAME 'javaContainer' DESC 'Co
|
||||
ntainer for a Java object' SUP top STRUCTURAL MUST cn )
|
||||
olcObjectClasses: {1}( 1.3.6.1.4.1.42.2.27.4.2.4 NAME 'javaObject' DESC 'Java
|
||||
object representation' SUP top ABSTRACT MUST javaClassName MAY ( javaClassNam
|
||||
es $ javaCodebase $ javaDoc $ description ) )
|
||||
olcObjectClasses: {2}( 1.3.6.1.4.1.42.2.27.4.2.5 NAME 'javaSerializedObject' D
|
||||
ESC 'Java serialized object' SUP javaObject AUXILIARY MUST javaSerializedData
|
||||
)
|
||||
olcObjectClasses: {3}( 1.3.6.1.4.1.42.2.27.4.2.8 NAME 'javaMarshalledObject' D
|
||||
ESC 'Java marshalled object' SUP javaObject AUXILIARY MUST javaSerializedData
|
||||
)
|
||||
olcObjectClasses: {4}( 1.3.6.1.4.1.42.2.27.4.2.7 NAME 'javaNamingReference' DE
|
||||
SC 'JNDI reference' SUP javaObject AUXILIARY MAY ( javaReferenceAddress $ jav
|
||||
aFactory ) )
|
||||
403
docker/ldap/data/etc/schema/java.schema
Normal file
403
docker/ldap/data/etc/schema/java.schema
Normal file
@ -0,0 +1,403 @@
|
||||
# java.schema -- Java Object Schema
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
# Java Object Schema (defined in RFC 2713)
|
||||
# depends upon core.schema
|
||||
#
|
||||
|
||||
# Network Working Group V. Ryan
|
||||
# Request for Comments: 2713 S. Seligman
|
||||
# Category: Informational R. Lee
|
||||
# Sun Microsystems, Inc.
|
||||
# October 1999
|
||||
#
|
||||
#
|
||||
# Schema for Representing Java(tm) Objects in an LDAP Directory
|
||||
#
|
||||
# Status of this Memo
|
||||
#
|
||||
# This memo provides information for the Internet community. It does
|
||||
# not specify an Internet standard of any kind. Distribution of this
|
||||
# memo is unlimited.
|
||||
#
|
||||
# Copyright Notice
|
||||
#
|
||||
# Copyright (C) The Internet Society (1999). All Rights Reserved.
|
||||
#
|
||||
# Abstract
|
||||
#
|
||||
# This document defines the schema for representing Java(tm) objects in
|
||||
# an LDAP directory [LDAPv3]. It defines schema elements to represent
|
||||
# a Java serialized object [Serial], a Java marshalled object [RMI], a
|
||||
# Java remote object [RMI], and a JNDI reference [JNDI].
|
||||
#
|
||||
|
||||
# [trimmed]
|
||||
|
||||
# 3 Attribute Type Definitions
|
||||
#
|
||||
# The following attribute types are defined in this document:
|
||||
#
|
||||
# javaClassName
|
||||
# javaClassNames
|
||||
# javaCodebase
|
||||
# javaSerializedData
|
||||
# javaFactory
|
||||
# javaReferenceAddress
|
||||
# javaDoc
|
||||
#
|
||||
# 3.1 javaClassName
|
||||
#
|
||||
# This attribute stores the fully qualified name of the Java object's
|
||||
# "distinguished" class or interface (for example, "java.lang.String").
|
||||
# It is a single-valued attribute. This attribute's syntax is '
|
||||
# Directory String' and its case is significant.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.1.6
|
||||
# NAME 'javaClassName'
|
||||
# DESC 'Fully qualified name of distinguished Java class or
|
||||
# interface'
|
||||
# EQUALITY caseExactMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||
# SINGLE-VALUE
|
||||
# )
|
||||
#
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.6
|
||||
NAME 'javaClassName'
|
||||
DESC 'Fully qualified name of distinguished Java class or interface'
|
||||
EQUALITY caseExactMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||
SINGLE-VALUE )
|
||||
|
||||
# 3.2 javaCodebase
|
||||
#
|
||||
# This attribute stores the Java class definition's locations. It
|
||||
# specifies the locations from which to load the class definition for
|
||||
# the class specified by the javaClassName attribute. Each value of
|
||||
# the attribute contains an ordered list of URLs, separated by spaces.
|
||||
# For example, a value of "url1 url2 url3" means that the three
|
||||
# (possibly interdependent) URLs (url1, url2, and url3) form the
|
||||
# codebase for loading in the Java class definition.
|
||||
#
|
||||
# If the javaCodebase attribute contains more than one value, each
|
||||
# value is an independent codebase. That is, there is no relationship
|
||||
# between the URLs in one value and those in another; each value can be
|
||||
# viewed as an alternate source for loading the Java class definition.
|
||||
# See [Java] for information regarding class loading.
|
||||
#
|
||||
# This attribute's syntax is 'IA5 String' and its case is significant.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.1.7
|
||||
# NAME 'javaCodebase'
|
||||
# DESC 'URL(s) specifying the location of class definition'
|
||||
# EQUALITY caseExactIA5Match
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||
# )
|
||||
#
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.7
|
||||
NAME 'javaCodebase'
|
||||
DESC 'URL(s) specifying the location of class definition'
|
||||
EQUALITY caseExactIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
|
||||
# 3.3 javaClassNames
|
||||
#
|
||||
# This attribute stores the Java object's fully qualified class or
|
||||
# interface names (for example, "java.lang.String"). It is a
|
||||
# multivalued attribute. When more than one value is present, each is
|
||||
# the name of a class or interface, or ancestor class or interface, of
|
||||
# this object.
|
||||
#
|
||||
# This attribute's syntax is 'Directory String' and its case is
|
||||
# significant.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.1.13
|
||||
# NAME 'javaClassNames'
|
||||
# DESC 'Fully qualified Java class or interface name'
|
||||
# EQUALITY caseExactMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||
# )
|
||||
#
|
||||
#
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.13
|
||||
NAME 'javaClassNames'
|
||||
DESC 'Fully qualified Java class or interface name'
|
||||
EQUALITY caseExactMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
|
||||
# 3.4 javaSerializedData
|
||||
#
|
||||
# This attribute stores the serialized form of a Java object. The
|
||||
# serialized form is described in [Serial].
|
||||
#
|
||||
# This attribute's syntax is 'Octet String'.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.1.8
|
||||
# NAME 'javaSerializedData
|
||||
# DESC 'Serialized form of a Java object'
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.40
|
||||
# SINGLE-VALUE
|
||||
# )
|
||||
#
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.8
|
||||
NAME 'javaSerializedData'
|
||||
DESC 'Serialized form of a Java object'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.40
|
||||
SINGLE-VALUE )
|
||||
|
||||
# 3.5 javaFactory
|
||||
#
|
||||
# This attribute stores the fully qualified class name of the object
|
||||
# factory (for example, "com.wiz.jndi.WizObjectFactory") that can be
|
||||
# used to create an instance of the object identified by the
|
||||
# javaClassName attribute.
|
||||
#
|
||||
# This attribute's syntax is 'Directory String' and its case is
|
||||
# significant.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.1.10
|
||||
# NAME 'javaFactory'
|
||||
# DESC 'Fully qualified Java class name of a JNDI object factory'
|
||||
# EQUALITY caseExactMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||
# SINGLE-VALUE
|
||||
# )
|
||||
#
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.10
|
||||
NAME 'javaFactory'
|
||||
DESC 'Fully qualified Java class name of a JNDI object factory'
|
||||
EQUALITY caseExactMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||
SINGLE-VALUE )
|
||||
|
||||
# 3.6 javaReferenceAddress
|
||||
#
|
||||
# This attribute represents the sequence of addresses of a JNDI
|
||||
# reference. Each of its values represents one address, a Java object
|
||||
# of type javax.naming.RefAddr. Its value is a concatenation of the
|
||||
# address type and address contents, preceded by a sequence number (the
|
||||
# order of addresses in a JNDI reference is significant). For example:
|
||||
#
|
||||
# #0#TypeA#ValA
|
||||
# #1#TypeB#ValB
|
||||
# #2#TypeC##rO0ABXNyABpq...
|
||||
#
|
||||
# In more detail, the value is encoded as follows:
|
||||
#
|
||||
# The delimiter is the first character of the value. For readability
|
||||
# the character '#' is recommended when it is not otherwise used
|
||||
# anywhere in the value, but any character may be used subject to
|
||||
# restrictions given below.
|
||||
#
|
||||
# The first delimiter is followed by the sequence number. The sequence
|
||||
# number of an address is its position in the JNDI reference, with the
|
||||
# first address being numbered 0. It is represented by its shortest
|
||||
# string form, in decimal notation.
|
||||
#
|
||||
# The sequence number is followed by a delimiter, then by the address
|
||||
# type, and then by another delimiter. If the address is of Java class
|
||||
# javax.naming.StringRefAddr, then this delimiter is followed by the
|
||||
# value of the address contents (which is a string). Otherwise, this
|
||||
# delimiter is followed immediately by another delimiter, and then by
|
||||
# the Base64 encoding of the serialized form of the entire address.
|
||||
#
|
||||
# The delimiter may be any character other than a digit or a character
|
||||
# contained in the address type. In addition, if the address contents
|
||||
# is a string, the delimiter may not be the first character of that
|
||||
# string.
|
||||
#
|
||||
# This attribute's syntax is 'Directory String' and its case is
|
||||
# significant. It can contain multiple values.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.1.11
|
||||
# NAME 'javaReferenceAddress'
|
||||
# DESC 'Addresses associated with a JNDI Reference'
|
||||
# EQUALITY caseExactMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||
# )
|
||||
#
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.11
|
||||
NAME 'javaReferenceAddress'
|
||||
DESC 'Addresses associated with a JNDI Reference'
|
||||
EQUALITY caseExactMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
|
||||
# 3.7 javaDoc
|
||||
#
|
||||
# This attribute stores a pointer to the Java documentation for the
|
||||
# class. It's value is a URL. For example, the following URL points to
|
||||
# the specification of the java.lang.String class:
|
||||
# http://java.sun.com/products/jdk/1.2/docs/api/java/lang/String.html
|
||||
#
|
||||
# This attribute's syntax is 'IA5 String' and its case is significant.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.1.12
|
||||
# NAME 'javaDoc'
|
||||
# DESC 'The Java documentation for the class'
|
||||
# EQUALITY caseExactIA5Match
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||
# )
|
||||
#
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.12
|
||||
NAME 'javaDoc'
|
||||
DESC 'The Java documentation for the class'
|
||||
EQUALITY caseExactIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
|
||||
# 4 Object Class Definitions
|
||||
#
|
||||
# The following object classes are defined in this document:
|
||||
#
|
||||
# javaContainer
|
||||
# javaObject
|
||||
# javaSerializedObject
|
||||
# javaMarshalledObject
|
||||
# javaNamingReference
|
||||
#
|
||||
# 4.1 javaContainer
|
||||
#
|
||||
# This structural object class represents a container for a Java
|
||||
# object.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.2.1
|
||||
# NAME 'javaContainer'
|
||||
# DESC 'Container for a Java object'
|
||||
# SUP top
|
||||
# STRUCTURAL
|
||||
# MUST ( cn )
|
||||
# )
|
||||
#
|
||||
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.1
|
||||
NAME 'javaContainer'
|
||||
DESC 'Container for a Java object'
|
||||
SUP top
|
||||
STRUCTURAL
|
||||
MUST cn )
|
||||
|
||||
# 4.2 javaObject
|
||||
#
|
||||
# This abstract object class represents a Java object. A javaObject
|
||||
# cannot exist in the directory; only auxiliary or structural
|
||||
# subclasses of it can exist in the directory.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.2.4
|
||||
# NAME 'javaObject'
|
||||
# DESC 'Java object representation'
|
||||
# SUP top
|
||||
# ABSTRACT
|
||||
# MUST ( javaClassName )
|
||||
# MAY ( javaClassNames $
|
||||
# javaCodebase $
|
||||
# javaDoc $
|
||||
# description )
|
||||
# )
|
||||
#
|
||||
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.4
|
||||
NAME 'javaObject'
|
||||
DESC 'Java object representation'
|
||||
SUP top
|
||||
ABSTRACT
|
||||
MUST javaClassName
|
||||
MAY ( javaClassNames $ javaCodebase $
|
||||
javaDoc $ description ) )
|
||||
|
||||
# 4.3 javaSerializedObject
|
||||
#
|
||||
# This auxiliary object class represents a Java serialized object. It
|
||||
# must be mixed in with a structural object class.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.2.5
|
||||
# NAME 'javaSerializedObject'
|
||||
# DESC 'Java serialized object'
|
||||
# SUP javaObject
|
||||
# AUXILIARY
|
||||
# MUST ( javaSerializedData )
|
||||
# )
|
||||
#
|
||||
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.5
|
||||
NAME 'javaSerializedObject'
|
||||
DESC 'Java serialized object'
|
||||
SUP javaObject
|
||||
AUXILIARY
|
||||
MUST javaSerializedData )
|
||||
|
||||
# 4.4 javaMarshalledObject
|
||||
#
|
||||
# This auxiliary object class represents a Java marshalled object. It
|
||||
# must be mixed in with a structural object class.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.2.8
|
||||
# NAME 'javaMarshalledObject'
|
||||
# DESC 'Java marshalled object'
|
||||
# SUP javaObject
|
||||
# AUXILIARY
|
||||
# MUST ( javaSerializedData )
|
||||
# )
|
||||
#
|
||||
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.8
|
||||
NAME 'javaMarshalledObject'
|
||||
DESC 'Java marshalled object'
|
||||
SUP javaObject
|
||||
AUXILIARY
|
||||
MUST javaSerializedData )
|
||||
|
||||
# 4.5 javaNamingReference
|
||||
#
|
||||
# This auxiliary object class represents a JNDI reference. It must be
|
||||
# mixed in with a structural object class.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.4.2.7
|
||||
# NAME 'javaNamingReference'
|
||||
# DESC 'JNDI reference'
|
||||
# SUP javaObject
|
||||
# AUXILIARY
|
||||
# MAY ( javaReferenceAddress $
|
||||
# javaFactory )
|
||||
# )
|
||||
#
|
||||
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.7
|
||||
NAME 'javaNamingReference'
|
||||
DESC 'JNDI reference'
|
||||
SUP javaObject
|
||||
AUXILIARY
|
||||
MAY ( javaReferenceAddress $ javaFactory ) )
|
||||
|
||||
# Full Copyright Statement
|
||||
#
|
||||
# Copyright (C) The Internet Society (1999). All Rights Reserved.
|
||||
#
|
||||
# This document and translations of it may be copied and furnished to
|
||||
# others, and derivative works that comment on or otherwise explain it
|
||||
# or assist in its implementation may be prepared, copied, published
|
||||
# and distributed, in whole or in part, without restriction of any
|
||||
# kind, provided that the above copyright notice and this paragraph are
|
||||
# included on all such copies and derivative works. However, this
|
||||
# document itself may not be modified in any way, such as by removing
|
||||
# the copyright notice or references to the Internet Society or other
|
||||
# Internet organizations, except as needed for the purpose of
|
||||
# developing Internet standards in which case the procedures for
|
||||
# copyrights defined in the Internet Standards process must be
|
||||
# followed, or as required to translate it into languages other than
|
||||
# English.
|
||||
#
|
||||
# The limited permissions granted above are perpetual and will not be
|
||||
# revoked by the Internet Society or its successors or assigns.
|
||||
#
|
||||
# This document and the information contained herein is provided on an
|
||||
# "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||||
# TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||||
# BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||||
# HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||||
# MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
45
docker/ldap/data/etc/schema/misc.ldif
Normal file
45
docker/ldap/data/etc/schema/misc.ldif
Normal file
@ -0,0 +1,45 @@
|
||||
# misc.ldif -- assorted schema definitions
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
# Assorted definitions from several sources, including
|
||||
# ''works in progress''. Contents of this file are
|
||||
# subject to change (including deletion) without notice.
|
||||
#
|
||||
# Not recommended for production use!
|
||||
# Use with extreme caution!
|
||||
#
|
||||
# This file was automatically generated from misc.schema; see that file
|
||||
# for complete references.
|
||||
#
|
||||
dn: cn=misc,cn=schema,cn=config
|
||||
objectClass: olcSchemaConfig
|
||||
cn: misc
|
||||
olcAttributeTypes: {0}( 2.16.840.1.113730.3.1.13 NAME 'mailLocalAddress' DESC
|
||||
'RFC822 email address of this recipient' EQUALITY caseIgnoreIA5Match SYNTAX 1
|
||||
.3.6.1.4.1.1466.115.121.1.26{256} )
|
||||
olcAttributeTypes: {1}( 2.16.840.1.113730.3.1.18 NAME 'mailHost' DESC 'FQDN of
|
||||
the SMTP/MTA of this recipient' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4
|
||||
.1.1466.115.121.1.26{256} SINGLE-VALUE )
|
||||
olcAttributeTypes: {2}( 2.16.840.1.113730.3.1.47 NAME 'mailRoutingAddress' DES
|
||||
C 'RFC822 routing address of this recipient' EQUALITY caseIgnoreIA5Match SYNT
|
||||
AX 1.3.6.1.4.1.1466.115.121.1.26{256} SINGLE-VALUE )
|
||||
olcAttributeTypes: {3}( 1.3.6.1.4.1.42.2.27.2.1.15 NAME 'rfc822MailMember' DES
|
||||
C 'rfc822 mail address of group member(s)' EQUALITY caseIgnoreIA5Match SYNTAX
|
||||
1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
olcObjectClasses: {0}( 2.16.840.1.113730.3.2.147 NAME 'inetLocalMailRecipient'
|
||||
DESC 'Internet local mail recipient' SUP top AUXILIARY MAY ( mailLocalAddres
|
||||
s $ mailHost $ mailRoutingAddress ) )
|
||||
olcObjectClasses: {1}( 1.3.6.1.4.1.42.2.27.1.2.5 NAME 'nisMailAlias' DESC 'NIS
|
||||
mail alias' SUP top STRUCTURAL MUST cn MAY rfc822MailMember )
|
||||
75
docker/ldap/data/etc/schema/misc.schema
Normal file
75
docker/ldap/data/etc/schema/misc.schema
Normal file
@ -0,0 +1,75 @@
|
||||
# misc.schema -- assorted schema definitions
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
# Assorted definitions from several sources, including
|
||||
# ''works in progress''. Contents of this file are
|
||||
# subject to change (including deletion) without notice.
|
||||
#
|
||||
# Not recommended for production use!
|
||||
# Use with extreme caution!
|
||||
|
||||
#-----------------------------------------------------------
|
||||
# draft-lachman-laser-ldap-mail-routing-02.txt !!!EXPIRED!!!
|
||||
# (a work in progress)
|
||||
#
|
||||
attributetype ( 2.16.840.1.113730.3.1.13
|
||||
NAME 'mailLocalAddress'
|
||||
DESC 'RFC822 email address of this recipient'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256} )
|
||||
|
||||
attributetype ( 2.16.840.1.113730.3.1.18
|
||||
NAME 'mailHost'
|
||||
DESC 'FQDN of the SMTP/MTA of this recipient'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256}
|
||||
SINGLE-VALUE )
|
||||
|
||||
attributetype ( 2.16.840.1.113730.3.1.47
|
||||
NAME 'mailRoutingAddress'
|
||||
DESC 'RFC822 routing address of this recipient'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256}
|
||||
SINGLE-VALUE )
|
||||
|
||||
# I-D leaves this OID TBD.
|
||||
# iPlanet uses 2.16.840.1.113.730.3.2.147 but that is an
|
||||
# improperly delegated OID. A typo is likely.
|
||||
objectclass ( 2.16.840.1.113730.3.2.147
|
||||
NAME 'inetLocalMailRecipient'
|
||||
DESC 'Internet local mail recipient'
|
||||
SUP top AUXILIARY
|
||||
MAY ( mailLocalAddress $ mailHost $ mailRoutingAddress ) )
|
||||
|
||||
#-----------------------------------------------------------
|
||||
# draft-srivastava-ldap-mail-00.txt !!!EXPIRED!!!
|
||||
# (a work in progress)
|
||||
#
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.2.1.15
|
||||
NAME 'rfc822MailMember'
|
||||
DESC 'rfc822 mail address of group member(s)'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
|
||||
#-----------------------------------------------------------
|
||||
# !!!no I-D!!!
|
||||
# (a work in progress)
|
||||
#
|
||||
objectclass ( 1.3.6.1.4.1.42.2.27.1.2.5
|
||||
NAME 'nisMailAlias'
|
||||
DESC 'NIS mail alias'
|
||||
SUP top STRUCTURAL
|
||||
MUST cn
|
||||
MAY rfc822MailMember )
|
||||
120
docker/ldap/data/etc/schema/nis.ldif
Normal file
120
docker/ldap/data/etc/schema/nis.ldif
Normal file
@ -0,0 +1,120 @@
|
||||
# NIS (RFC2307)
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
# Definitions from RFC2307 (Experimental)
|
||||
# An Approach for Using LDAP as a Network Information Service
|
||||
#
|
||||
# Depends upon core.ldif and cosine.ldif
|
||||
#
|
||||
# This file was automatically generated from nis.schema; see that file
|
||||
# for complete references.
|
||||
#
|
||||
dn: cn=nis,cn=schema,cn=config
|
||||
objectClass: olcSchemaConfig
|
||||
cn: nis
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.2 NAME 'gecos' DESC 'The GECOS field; th
|
||||
e common name' EQUALITY caseIgnoreIA5Match SUBSTR caseIgnoreIA5SubstringsMatc
|
||||
h SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.3 NAME 'homeDirectory' DESC 'The absolut
|
||||
e path to the home directory' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1
|
||||
466.115.121.1.26 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.4 NAME 'loginShell' DESC 'The path to th
|
||||
e login shell' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.2
|
||||
6 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.5 NAME 'shadowLastChange' EQUALITY integ
|
||||
erMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.6 NAME 'shadowMin' EQUALITY integerMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.7 NAME 'shadowMax' EQUALITY integerMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.8 NAME 'shadowWarning' EQUALITY integerM
|
||||
atch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.9 NAME 'shadowInactive' EQUALITY integer
|
||||
Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.10 NAME 'shadowExpire' EQUALITY integerM
|
||||
atch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.11 NAME 'shadowFlag' EQUALITY integerMat
|
||||
ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.12 NAME 'memberUid' EQUALITY caseExactI
|
||||
A5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.
|
||||
26 )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.13 NAME 'memberNisNetgroup' EQUALITY ca
|
||||
seExactIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.11
|
||||
5.121.1.26 )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.14 NAME 'nisNetgroupTriple' DESC 'Netgr
|
||||
oup triple' SYNTAX 1.3.6.1.1.1.0.0 )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.15 NAME 'ipServicePort' EQUALITY intege
|
||||
rMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.16 NAME 'ipServiceProtocol' SUP name )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.17 NAME 'ipProtocolNumber' EQUALITY int
|
||||
egerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.18 NAME 'oncRpcNumber' EQUALITY integer
|
||||
Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.19 NAME 'ipHostNumber' DESC 'IP address
|
||||
' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.20 NAME 'ipNetworkNumber' DESC 'IP netw
|
||||
ork' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} SI
|
||||
NGLE-VALUE )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.21 NAME 'ipNetmaskNumber' DESC 'IP netm
|
||||
ask' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} SI
|
||||
NGLE-VALUE )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.22 NAME 'macAddress' DESC 'MAC address'
|
||||
EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.23 NAME 'bootParameter' DESC 'rpc.bootp
|
||||
aramd parameter' SYNTAX 1.3.6.1.1.1.0.1 )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.24 NAME 'bootFile' DESC 'Boot image nam
|
||||
e' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.26 NAME 'nisMapName' SUP name )
|
||||
olcAttributeTypes: ( 1.3.6.1.1.1.1.27 NAME 'nisMapEntry' EQUALITY caseExac
|
||||
tIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.
|
||||
1.26{1024} SINGLE-VALUE )
|
||||
olcObjectClasses: ( 1.3.6.1.1.1.2.0 NAME 'posixAccount' DESC 'Abstraction o
|
||||
f an account with POSIX attributes' SUP top AUXILIARY MUST ( cn $ uid $ uidNu
|
||||
mber $ gidNumber $ homeDirectory ) MAY ( userPassword $ loginShell $ gecos $
|
||||
description ) )
|
||||
olcObjectClasses: ( 1.3.6.1.1.1.2.1 NAME 'shadowAccount' DESC 'Additional a
|
||||
ttributes for shadow passwords' SUP top AUXILIARY MUST uid MAY ( userPassword
|
||||
$ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive
|
||||
$ shadowExpire $ shadowFlag $ description ) )
|
||||
olcObjectClasses: ( 1.3.6.1.1.1.2.2 NAME 'posixGroup' DESC 'Abstraction of
|
||||
a group of accounts' SUP top STRUCTURAL MUST ( cn $ gidNumber ) MAY ( userPas
|
||||
sword $ memberUid $ description ) )
|
||||
olcObjectClasses: ( 1.3.6.1.1.1.2.3 NAME 'ipService' DESC 'Abstraction an I
|
||||
nternet Protocol service' SUP top STRUCTURAL MUST ( cn $ ipServicePort $ ipSe
|
||||
rviceProtocol ) MAY description )
|
||||
olcObjectClasses: ( 1.3.6.1.1.1.2.4 NAME 'ipProtocol' DESC 'Abstraction of
|
||||
an IP protocol' SUP top STRUCTURAL MUST ( cn $ ipProtocolNumber $ description
|
||||
) MAY description )
|
||||
olcObjectClasses: ( 1.3.6.1.1.1.2.5 NAME 'oncRpc' DESC 'Abstraction of an O
|
||||
NC/RPC binding' SUP top STRUCTURAL MUST ( cn $ oncRpcNumber $ description ) M
|
||||
AY description )
|
||||
olcObjectClasses: ( 1.3.6.1.1.1.2.6 NAME 'ipHost' DESC 'Abstraction of a ho
|
||||
st, an IP device' SUP top AUXILIARY MUST ( cn $ ipHostNumber ) MAY ( l $ desc
|
||||
ription $ manager ) )
|
||||
olcObjectClasses: ( 1.3.6.1.1.1.2.7 NAME 'ipNetwork' DESC 'Abstraction of a
|
||||
n IP network' SUP top STRUCTURAL MUST ( cn $ ipNetworkNumber ) MAY ( ipNetmas
|
||||
kNumber $ l $ description $ manager ) )
|
||||
olcObjectClasses: ( 1.3.6.1.1.1.2.8 NAME 'nisNetgroup' DESC 'Abstraction of
|
||||
a netgroup' SUP top STRUCTURAL MUST cn MAY ( nisNetgroupTriple $ memberNisNe
|
||||
tgroup $ description ) )
|
||||
olcObjectClasses: ( 1.3.6.1.1.1.2.9 NAME 'nisMap' DESC 'A generic abstracti
|
||||
on of a NIS map' SUP top STRUCTURAL MUST nisMapName MAY description )
|
||||
olcObjectClasses: ( 1.3.6.1.1.1.2.10 NAME 'nisObject' DESC 'An entry in a
|
||||
NIS map' SUP top STRUCTURAL MUST ( cn $ nisMapEntry $ nisMapName ) MAY descri
|
||||
ption )
|
||||
olcObjectClasses: ( 1.3.6.1.1.1.2.11 NAME 'ieee802Device' DESC 'A device w
|
||||
ith a MAC address' SUP top AUXILIARY MAY macAddress )
|
||||
olcObjectClasses: ( 1.3.6.1.1.1.2.12 NAME 'bootableDevice' DESC 'A device
|
||||
with boot parameters' SUP top AUXILIARY MAY ( bootFile $ bootParameter ) )
|
||||
237
docker/ldap/data/etc/schema/nis.schema
Normal file
237
docker/ldap/data/etc/schema/nis.schema
Normal file
@ -0,0 +1,237 @@
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
|
||||
# Definitions from RFC2307 (Experimental)
|
||||
# An Approach for Using LDAP as a Network Information Service
|
||||
|
||||
# Depends upon core.schema and cosine.schema
|
||||
|
||||
# Note: The definitions in RFC2307 are given in syntaxes closely related
|
||||
# to those in RFC2252, however, some liberties are taken that are not
|
||||
# supported by RFC2252. This file has been written following RFC2252
|
||||
# strictly.
|
||||
|
||||
# OID Base is iso(1) org(3) dod(6) internet(1) directory(1) nisSchema(1).
|
||||
# i.e. nisSchema in RFC2307 is 1.3.6.1.1.1
|
||||
#
|
||||
# Syntaxes are under 1.3.6.1.1.1.0 (two new syntaxes are defined)
|
||||
# validaters for these syntaxes are incomplete, they only
|
||||
# implement printable string validation (which is good as the
|
||||
# common use of these syntaxes violates the specification).
|
||||
# Attribute types are under 1.3.6.1.1.1.1
|
||||
# Object classes are under 1.3.6.1.1.1.2
|
||||
|
||||
# Attribute Type Definitions
|
||||
|
||||
# builtin
|
||||
#attributetype ( 1.3.6.1.1.1.1.0 NAME 'uidNumber'
|
||||
# DESC 'An integer uniquely identifying a user in an administrative domain'
|
||||
# EQUALITY integerMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
|
||||
# builtin
|
||||
#attributetype ( 1.3.6.1.1.1.1.1 NAME 'gidNumber'
|
||||
# DESC 'An integer uniquely identifying a group in an administrative domain'
|
||||
# EQUALITY integerMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.2 NAME 'gecos'
|
||||
DESC 'The GECOS field; the common name'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.3 NAME 'homeDirectory'
|
||||
DESC 'The absolute path to the home directory'
|
||||
EQUALITY caseExactIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.4 NAME 'loginShell'
|
||||
DESC 'The path to the login shell'
|
||||
EQUALITY caseExactIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.5 NAME 'shadowLastChange'
|
||||
EQUALITY integerMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.6 NAME 'shadowMin'
|
||||
EQUALITY integerMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.7 NAME 'shadowMax'
|
||||
EQUALITY integerMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.8 NAME 'shadowWarning'
|
||||
EQUALITY integerMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.9 NAME 'shadowInactive'
|
||||
EQUALITY integerMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.10 NAME 'shadowExpire'
|
||||
EQUALITY integerMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.11 NAME 'shadowFlag'
|
||||
EQUALITY integerMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.12 NAME 'memberUid'
|
||||
EQUALITY caseExactIA5Match
|
||||
SUBSTR caseExactIA5SubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.13 NAME 'memberNisNetgroup'
|
||||
EQUALITY caseExactIA5Match
|
||||
SUBSTR caseExactIA5SubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.14 NAME 'nisNetgroupTriple'
|
||||
DESC 'Netgroup triple'
|
||||
SYNTAX 1.3.6.1.1.1.0.0 )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.15 NAME 'ipServicePort'
|
||||
EQUALITY integerMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.16 NAME 'ipServiceProtocol'
|
||||
SUP name )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.17 NAME 'ipProtocolNumber'
|
||||
EQUALITY integerMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.18 NAME 'oncRpcNumber'
|
||||
EQUALITY integerMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.19 NAME 'ipHostNumber'
|
||||
DESC 'IP address'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.20 NAME 'ipNetworkNumber'
|
||||
DESC 'IP network'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.21 NAME 'ipNetmaskNumber'
|
||||
DESC 'IP netmask'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} SINGLE-VALUE )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.22 NAME 'macAddress'
|
||||
DESC 'MAC address'
|
||||
EQUALITY caseIgnoreIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.23 NAME 'bootParameter'
|
||||
DESC 'rpc.bootparamd parameter'
|
||||
SYNTAX 1.3.6.1.1.1.0.1 )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.24 NAME 'bootFile'
|
||||
DESC 'Boot image name'
|
||||
EQUALITY caseExactIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.26 NAME 'nisMapName'
|
||||
SUP name )
|
||||
|
||||
attributetype ( 1.3.6.1.1.1.1.27 NAME 'nisMapEntry'
|
||||
EQUALITY caseExactIA5Match
|
||||
SUBSTR caseExactIA5SubstringsMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{1024} SINGLE-VALUE )
|
||||
|
||||
# Object Class Definitions
|
||||
|
||||
objectclass ( 1.3.6.1.1.1.2.0 NAME 'posixAccount'
|
||||
DESC 'Abstraction of an account with POSIX attributes'
|
||||
SUP top AUXILIARY
|
||||
MUST ( cn $ uid $ uidNumber $ gidNumber $ homeDirectory )
|
||||
MAY ( userPassword $ loginShell $ gecos $ description ) )
|
||||
|
||||
objectclass ( 1.3.6.1.1.1.2.1 NAME 'shadowAccount'
|
||||
DESC 'Additional attributes for shadow passwords'
|
||||
SUP top AUXILIARY
|
||||
MUST uid
|
||||
MAY ( userPassword $ shadowLastChange $ shadowMin $
|
||||
shadowMax $ shadowWarning $ shadowInactive $
|
||||
shadowExpire $ shadowFlag $ description ) )
|
||||
|
||||
objectclass ( 1.3.6.1.1.1.2.2 NAME 'posixGroup'
|
||||
DESC 'Abstraction of a group of accounts'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( cn $ gidNumber )
|
||||
MAY ( userPassword $ memberUid $ description ) )
|
||||
|
||||
objectclass ( 1.3.6.1.1.1.2.3 NAME 'ipService'
|
||||
DESC 'Abstraction an Internet Protocol service'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( cn $ ipServicePort $ ipServiceProtocol )
|
||||
MAY ( description ) )
|
||||
|
||||
objectclass ( 1.3.6.1.1.1.2.4 NAME 'ipProtocol'
|
||||
DESC 'Abstraction of an IP protocol'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( cn $ ipProtocolNumber $ description )
|
||||
MAY description )
|
||||
|
||||
objectclass ( 1.3.6.1.1.1.2.5 NAME 'oncRpc'
|
||||
DESC 'Abstraction of an ONC/RPC binding'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( cn $ oncRpcNumber $ description )
|
||||
MAY description )
|
||||
|
||||
objectclass ( 1.3.6.1.1.1.2.6 NAME 'ipHost'
|
||||
DESC 'Abstraction of a host, an IP device'
|
||||
SUP top AUXILIARY
|
||||
MUST ( cn $ ipHostNumber )
|
||||
MAY ( l $ description $ manager ) )
|
||||
|
||||
objectclass ( 1.3.6.1.1.1.2.7 NAME 'ipNetwork'
|
||||
DESC 'Abstraction of an IP network'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( cn $ ipNetworkNumber )
|
||||
MAY ( ipNetmaskNumber $ l $ description $ manager ) )
|
||||
|
||||
objectclass ( 1.3.6.1.1.1.2.8 NAME 'nisNetgroup'
|
||||
DESC 'Abstraction of a netgroup'
|
||||
SUP top STRUCTURAL
|
||||
MUST cn
|
||||
MAY ( nisNetgroupTriple $ memberNisNetgroup $ description ) )
|
||||
|
||||
objectclass ( 1.3.6.1.1.1.2.9 NAME 'nisMap'
|
||||
DESC 'A generic abstraction of a NIS map'
|
||||
SUP top STRUCTURAL
|
||||
MUST nisMapName
|
||||
MAY description )
|
||||
|
||||
objectclass ( 1.3.6.1.1.1.2.10 NAME 'nisObject'
|
||||
DESC 'An entry in a NIS map'
|
||||
SUP top STRUCTURAL
|
||||
MUST ( cn $ nisMapEntry $ nisMapName )
|
||||
MAY description )
|
||||
|
||||
objectclass ( 1.3.6.1.1.1.2.11 NAME 'ieee802Device'
|
||||
DESC 'A device with a MAC address'
|
||||
SUP top AUXILIARY
|
||||
MAY macAddress )
|
||||
|
||||
objectclass ( 1.3.6.1.1.1.2.12 NAME 'bootableDevice'
|
||||
DESC 'A device with boot parameters'
|
||||
SUP top AUXILIARY
|
||||
MAY ( bootFile $ bootParameter ) )
|
||||
88
docker/ldap/data/etc/schema/openldap.ldif
Normal file
88
docker/ldap/data/etc/schema/openldap.ldif
Normal file
@ -0,0 +1,88 @@
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
#
|
||||
# OpenLDAP Project's directory schema items
|
||||
#
|
||||
# depends upon:
|
||||
# core.schema
|
||||
# cosine.schema
|
||||
# inetorgperson.schema
|
||||
#
|
||||
# These are provided for informational purposes only.
|
||||
#
|
||||
# This openldap.ldif file is provided as a demonstration of how to
|
||||
# convert a *.schema file into *.ldif format. The key points:
|
||||
# In LDIF, a blank line terminates an entry. Blank lines in a *.schema
|
||||
# file should be replaced with a single '#' to turn them into
|
||||
# comments, or they should just be removed.
|
||||
# In addition to the actual schema directives, the file needs a small
|
||||
# header to make it a valid LDAP entry. This header must provide the
|
||||
# dn of the entry, the objectClass, and the cn, as shown here:
|
||||
#
|
||||
dn: cn=openldap,cn=schema,cn=config
|
||||
objectClass: olcSchemaConfig
|
||||
cn: openldap
|
||||
#
|
||||
# The schema directives need to be changed to LDAP Attributes.
|
||||
# First a basic string substitution can be done on each of the keywords:
|
||||
# objectIdentifier -> olcObjectIdentifier:
|
||||
# objectClass -> olcObjectClasses:
|
||||
# attributeType -> olcAttributeTypes:
|
||||
# Then leading whitespace must be fixed. The slapd.conf format allows
|
||||
# tabs or spaces to denote line continuation, while LDIF only allows
|
||||
# the space character.
|
||||
# Also slapd.conf preserves the continuation character, while LDIF strips
|
||||
# it out. So a single TAB/SPACE in slapd.conf must be replaced with
|
||||
# two SPACEs in LDIF, otherwise the continued text may get joined as
|
||||
# a single word.
|
||||
# The directives must be listed in a proper sequence:
|
||||
# All olcObjectIdentifiers must be first, so they may be referenced by
|
||||
# any following definitions.
|
||||
# All olcAttributeTypes must be next, so they may be referenced by any
|
||||
# following objectClass definitions.
|
||||
# All olcObjectClasses must be after the olcAttributeTypes.
|
||||
# And of course, any superior must occur before anything that inherits
|
||||
# from it.
|
||||
#
|
||||
olcObjectIdentifier: OpenLDAProot 1.3.6.1.4.1.4203
|
||||
#
|
||||
olcObjectIdentifier: OpenLDAP OpenLDAProot:1
|
||||
olcObjectIdentifier: OpenLDAPattributeType OpenLDAP:3
|
||||
olcObjectIdentifier: OpenLDAPobjectClass OpenLDAP:4
|
||||
#
|
||||
olcObjectClasses: ( OpenLDAPobjectClass:3
|
||||
NAME 'OpenLDAPorg'
|
||||
DESC 'OpenLDAP Organizational Object'
|
||||
SUP organization
|
||||
MAY ( buildingName $ displayName $ labeledURI ) )
|
||||
#
|
||||
olcObjectClasses: ( OpenLDAPobjectClass:4
|
||||
NAME 'OpenLDAPou'
|
||||
DESC 'OpenLDAP Organizational Unit Object'
|
||||
SUP organizationalUnit
|
||||
MAY ( buildingName $ displayName $ labeledURI $ o ) )
|
||||
#
|
||||
olcObjectClasses: ( OpenLDAPobjectClass:5
|
||||
NAME 'OpenLDAPperson'
|
||||
DESC 'OpenLDAP Person'
|
||||
SUP ( pilotPerson $ inetOrgPerson )
|
||||
MUST ( uid $ cn )
|
||||
MAY ( givenName $ labeledURI $ o ) )
|
||||
#
|
||||
olcObjectClasses: ( OpenLDAPobjectClass:6
|
||||
NAME 'OpenLDAPdisplayableObject'
|
||||
DESC 'OpenLDAP Displayable Object'
|
||||
AUXILIARY
|
||||
MAY displayName )
|
||||
54
docker/ldap/data/etc/schema/openldap.schema
Normal file
54
docker/ldap/data/etc/schema/openldap.schema
Normal file
@ -0,0 +1,54 @@
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
|
||||
#
|
||||
# OpenLDAP Project's directory schema items
|
||||
#
|
||||
# depends upon:
|
||||
# core.schema
|
||||
# cosine.schema
|
||||
# inetorgperson.schema
|
||||
#
|
||||
# These are provided for informational purposes only.
|
||||
|
||||
objectIdentifier OpenLDAProot 1.3.6.1.4.1.4203
|
||||
|
||||
objectIdentifier OpenLDAP OpenLDAProot:1
|
||||
objectIdentifier OpenLDAPattributeType OpenLDAP:3
|
||||
objectIdentifier OpenLDAPobjectClass OpenLDAP:4
|
||||
|
||||
objectClass ( OpenLDAPobjectClass:3
|
||||
NAME 'OpenLDAPorg'
|
||||
DESC 'OpenLDAP Organizational Object'
|
||||
SUP organization
|
||||
MAY ( buildingName $ displayName $ labeledURI ) )
|
||||
|
||||
objectClass ( OpenLDAPobjectClass:4
|
||||
NAME 'OpenLDAPou'
|
||||
DESC 'OpenLDAP Organizational Unit Object'
|
||||
SUP organizationalUnit
|
||||
MAY ( buildingName $ displayName $ labeledURI $ o ) )
|
||||
|
||||
objectClass ( OpenLDAPobjectClass:5
|
||||
NAME 'OpenLDAPperson'
|
||||
DESC 'OpenLDAP Person'
|
||||
SUP ( pilotPerson $ inetOrgPerson )
|
||||
MUST ( uid $ cn )
|
||||
MAY ( givenName $ labeledURI $ o ) )
|
||||
|
||||
objectClass ( OpenLDAPobjectClass:6
|
||||
NAME 'OpenLDAPdisplayableObject'
|
||||
DESC 'OpenLDAP Displayable Object'
|
||||
AUXILIARY
|
||||
MAY displayName )
|
||||
123
docker/ldap/data/etc/schema/pmi.ldif
Normal file
123
docker/ldap/data/etc/schema/pmi.ldif
Normal file
@ -0,0 +1,123 @@
|
||||
# OpenLDAP X.509 PMI schema
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
## Portions Copyright (C) The Internet Society (1997-2006).
|
||||
## All Rights Reserved.
|
||||
#
|
||||
# Includes LDAPv3 schema items from:
|
||||
# ITU X.509 (08/2005)
|
||||
#
|
||||
# This file was automatically generated from pmi.schema; see that file
|
||||
# for complete references.
|
||||
#
|
||||
dn: cn=pmi,cn=schema,cn=config
|
||||
objectClass: olcSchemaConfig
|
||||
cn: pmi
|
||||
olcObjectIdentifier: {0}id-oc-pmiUser 2.5.6.24
|
||||
olcObjectIdentifier: {1}id-oc-pmiAA 2.5.6.25
|
||||
olcObjectIdentifier: {2}id-oc-pmiSOA 2.5.6.26
|
||||
olcObjectIdentifier: {3}id-oc-attCertCRLDistributionPts 2.5.6.27
|
||||
olcObjectIdentifier: {4}id-oc-privilegePolicy 2.5.6.32
|
||||
olcObjectIdentifier: {5}id-oc-pmiDelegationPath 2.5.6.33
|
||||
olcObjectIdentifier: {6}id-oc-protectedPrivilegePolicy 2.5.6.34
|
||||
olcObjectIdentifier: {7}id-at-attributeCertificate 2.5.4.58
|
||||
olcObjectIdentifier: {8}id-at-attributeCertificateRevocationList 2.5.4.59
|
||||
olcObjectIdentifier: {9}id-at-aACertificate 2.5.4.61
|
||||
olcObjectIdentifier: {10}id-at-attributeDescriptorCertificate 2.5.4.62
|
||||
olcObjectIdentifier: {11}id-at-attributeAuthorityRevocationList 2.5.4.63
|
||||
olcObjectIdentifier: {12}id-at-privPolicy 2.5.4.71
|
||||
olcObjectIdentifier: {13}id-at-role 2.5.4.72
|
||||
olcObjectIdentifier: {14}id-at-delegationPath 2.5.4.73
|
||||
olcObjectIdentifier: {15}id-at-protPrivPolicy 2.5.4.74
|
||||
olcObjectIdentifier: {16}id-at-xMLPrivilegeInfo 2.5.4.75
|
||||
olcObjectIdentifier: {17}id-at-xMLPprotPrivPolicy 2.5.4.76
|
||||
olcObjectIdentifier: {18}id-mr 2.5.13
|
||||
olcObjectIdentifier: {19}id-mr-attributeCertificateMatch id-mr:42
|
||||
olcObjectIdentifier: {20}id-mr-attributeCertificateExactMatch id-mr:45
|
||||
olcObjectIdentifier: {21}id-mr-holderIssuerMatch id-mr:46
|
||||
olcObjectIdentifier: {22}id-mr-authAttIdMatch id-mr:53
|
||||
olcObjectIdentifier: {23}id-mr-roleSpecCertIdMatch id-mr:54
|
||||
olcObjectIdentifier: {24}id-mr-basicAttConstraintsMatch id-mr:55
|
||||
olcObjectIdentifier: {25}id-mr-delegatedNameConstraintsMatch id-mr:56
|
||||
olcObjectIdentifier: {26}id-mr-timeSpecMatch id-mr:57
|
||||
olcObjectIdentifier: {27}id-mr-attDescriptorMatch id-mr:58
|
||||
olcObjectIdentifier: {28}id-mr-acceptableCertPoliciesMatch id-mr:59
|
||||
olcObjectIdentifier: {29}id-mr-delegationPathMatch id-mr:61
|
||||
olcObjectIdentifier: {30}id-mr-sOAIdentifierMatch id-mr:66
|
||||
olcObjectIdentifier: {31}id-mr-indirectIssuerMatch id-mr:67
|
||||
olcObjectIdentifier: {32}AttributeCertificate 1.3.6.1.4.1.4203.666.11.10.2.1
|
||||
olcObjectIdentifier: {33}CertificateList 1.3.6.1.4.1.1466.115.121.1.9
|
||||
olcObjectIdentifier: {34}AttCertPath 1.3.6.1.4.1.4203.666.11.10.2.4
|
||||
olcObjectIdentifier: {35}PolicySyntax 1.3.6.1.4.1.4203.666.11.10.2.5
|
||||
olcObjectIdentifier: {36}RoleSyntax 1.3.6.1.4.1.4203.666.11.10.2.6
|
||||
olcLdapSyntaxes: {0}( 1.3.6.1.4.1.4203.666.11.10.2.4 DESC 'X.509 PMI attribute
|
||||
cartificate path: SEQUENCE OF AttributeCertificate' X-SUBST '1.3.6.1.4.1.146
|
||||
6.115.121.1.15' )
|
||||
olcLdapSyntaxes: {1}( 1.3.6.1.4.1.4203.666.11.10.2.5 DESC 'X.509 PMI policy sy
|
||||
ntax' X-SUBST '1.3.6.1.4.1.1466.115.121.1.15' )
|
||||
olcLdapSyntaxes: {2}( 1.3.6.1.4.1.4203.666.11.10.2.6 DESC 'X.509 PMI role synt
|
||||
ax' X-SUBST '1.3.6.1.4.1.1466.115.121.1.15' )
|
||||
olcAttributeTypes: {0}( id-at-role NAME 'role' DESC 'X.509 Role attribute, use
|
||||
;binary' SYNTAX RoleSyntax )
|
||||
olcAttributeTypes: {1}( id-at-xMLPrivilegeInfo NAME 'xmlPrivilegeInfo' DESC 'X
|
||||
.509 XML privilege information attribute' SYNTAX 1.3.6.1.4.1.1466.115.121.1.1
|
||||
5 )
|
||||
olcAttributeTypes: {2}( id-at-attributeCertificate NAME 'attributeCertificateA
|
||||
ttribute' DESC 'X.509 Attribute certificate attribute, use ;binary' EQUALITY
|
||||
attributeCertificateExactMatch SYNTAX AttributeCertificate )
|
||||
olcAttributeTypes: {3}( id-at-aACertificate NAME 'aACertificate' DESC 'X.509 A
|
||||
A certificate attribute, use ;binary' EQUALITY attributeCertificateExactMatch
|
||||
SYNTAX AttributeCertificate )
|
||||
olcAttributeTypes: {4}( id-at-attributeDescriptorCertificate NAME 'attributeDe
|
||||
scriptorCertificate' DESC 'X.509 Attribute descriptor certificate attribute,
|
||||
use ;binary' EQUALITY attributeCertificateExactMatch SYNTAX AttributeCertific
|
||||
ate )
|
||||
olcAttributeTypes: {5}( id-at-attributeCertificateRevocationList NAME 'attribu
|
||||
teCertificateRevocationList' DESC 'X.509 Attribute certificate revocation lis
|
||||
t attribute, use ;binary' SYNTAX CertificateList X-EQUALITY 'certificateListE
|
||||
xactMatch, not implemented yet' )
|
||||
olcAttributeTypes: {6}( id-at-attributeAuthorityRevocationList NAME 'attribute
|
||||
AuthorityRevocationList' DESC 'X.509 AA certificate revocation list attribute
|
||||
, use ;binary' SYNTAX CertificateList X-EQUALITY 'certificateListExactMatch,
|
||||
not implemented yet' )
|
||||
olcAttributeTypes: {7}( id-at-delegationPath NAME 'delegationPath' DESC 'X.509
|
||||
Delegation path attribute, use ;binary' SYNTAX AttCertPath )
|
||||
olcAttributeTypes: {8}( id-at-privPolicy NAME 'privPolicy' DESC 'X.509 Privile
|
||||
ge policy attribute, use ;binary' SYNTAX PolicySyntax )
|
||||
olcAttributeTypes: {9}( id-at-protPrivPolicy NAME 'protPrivPolicy' DESC 'X.509
|
||||
Protected privilege policy attribute, use ;binary' EQUALITY attributeCertifi
|
||||
cateExactMatch SYNTAX AttributeCertificate )
|
||||
olcAttributeTypes: {10}( id-at-xMLPprotPrivPolicy NAME 'xmlPrivPolicy' DESC 'X
|
||||
.509 XML Protected privilege policy attribute' SYNTAX 1.3.6.1.4.1.1466.115.12
|
||||
1.1.15 )
|
||||
olcObjectClasses: {0}( id-oc-pmiUser NAME 'pmiUser' DESC 'X.509 PMI user objec
|
||||
t class' SUP top AUXILIARY MAY attributeCertificateAttribute )
|
||||
olcObjectClasses: {1}( id-oc-pmiAA NAME 'pmiAA' DESC 'X.509 PMI AA object clas
|
||||
s' SUP top AUXILIARY MAY ( aACertificate $ attributeCertificateRevocationList
|
||||
$ attributeAuthorityRevocationList ) )
|
||||
olcObjectClasses: {2}( id-oc-pmiSOA NAME 'pmiSOA' DESC 'X.509 PMI SOA object c
|
||||
lass' SUP top AUXILIARY MAY ( attributeCertificateRevocationList $ attributeA
|
||||
uthorityRevocationList $ attributeDescriptorCertificate ) )
|
||||
olcObjectClasses: {3}( id-oc-attCertCRLDistributionPts NAME 'attCertCRLDistrib
|
||||
utionPt' DESC 'X.509 Attribute certificate CRL distribution point object clas
|
||||
s' SUP top AUXILIARY MAY ( attributeCertificateRevocationList $ attributeAuth
|
||||
orityRevocationList ) )
|
||||
olcObjectClasses: {4}( id-oc-pmiDelegationPath NAME 'pmiDelegationPath' DESC '
|
||||
X.509 PMI delegation path' SUP top AUXILIARY MAY delegationPath )
|
||||
olcObjectClasses: {5}( id-oc-privilegePolicy NAME 'privilegePolicy' DESC 'X.50
|
||||
9 Privilege policy object class' SUP top AUXILIARY MAY privPolicy )
|
||||
olcObjectClasses: {6}( id-oc-protectedPrivilegePolicy NAME 'protectedPrivilege
|
||||
Policy' DESC 'X.509 Protected privilege policy object class' SUP top AUXILIAR
|
||||
Y MAY protPrivPolicy )
|
||||
464
docker/ldap/data/etc/schema/pmi.schema
Normal file
464
docker/ldap/data/etc/schema/pmi.schema
Normal file
@ -0,0 +1,464 @@
|
||||
# OpenLDAP X.509 PMI schema
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
## Portions Copyright (C) The Internet Society (1997-2006).
|
||||
## All Rights Reserved.
|
||||
##
|
||||
## This document and translations of it may be copied and furnished to
|
||||
## others, and derivative works that comment on or otherwise explain it
|
||||
## or assist in its implementation may be prepared, copied, published
|
||||
## and distributed, in whole or in part, without restriction of any
|
||||
## kind, provided that the above copyright notice and this paragraph are
|
||||
## included on all such copies and derivative works. However, this
|
||||
## document itself may not be modified in any way, such as by removing
|
||||
## the copyright notice or references to the Internet Society or other
|
||||
## Internet organizations, except as needed for the purpose of
|
||||
## developing Internet standards in which case the procedures for
|
||||
## copyrights defined in the Internet Standards process must be
|
||||
## followed, or as required to translate it into languages other than
|
||||
## English.
|
||||
##
|
||||
## The limited permissions granted above are perpetual and will not be
|
||||
## revoked by the Internet Society or its successors or assigns.
|
||||
##
|
||||
## This document and the information contained herein is provided on an
|
||||
## "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||||
## TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||||
## BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||||
## HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||||
## MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
|
||||
#
|
||||
#
|
||||
# Includes LDAPv3 schema items from:
|
||||
# ITU X.509 (08/2005)
|
||||
#
|
||||
## X.509 (08/2005) pp. 120-121
|
||||
##
|
||||
## -- object identifier assignments --
|
||||
## -- object classes --
|
||||
## id-oc-pmiUser OBJECT IDENTIFIER ::= {id-oc 24}
|
||||
## id-oc-pmiAA OBJECT IDENTIFIER ::= {id-oc 25}
|
||||
## id-oc-pmiSOA OBJECT IDENTIFIER ::= {id-oc 26}
|
||||
## id-oc-attCertCRLDistributionPts OBJECT IDENTIFIER ::= {id-oc 27}
|
||||
## id-oc-privilegePolicy OBJECT IDENTIFIER ::= {id-oc 32}
|
||||
## id-oc-pmiDelegationPath OBJECT IDENTIFIER ::= {id-oc 33}
|
||||
## id-oc-protectedPrivilegePolicy OBJECT IDENTIFIER ::= {id-oc 34}
|
||||
## -- directory attributes --
|
||||
## id-at-attributeCertificate OBJECT IDENTIFIER ::= {id-at 58}
|
||||
## id-at-attributeCertificateRevocationList OBJECT IDENTIFIER ::= {id-at 59}
|
||||
## id-at-aACertificate OBJECT IDENTIFIER ::= {id-at 61}
|
||||
## id-at-attributeDescriptorCertificate OBJECT IDENTIFIER ::= {id-at 62}
|
||||
## id-at-attributeAuthorityRevocationList OBJECT IDENTIFIER ::= {id-at 63}
|
||||
## id-at-privPolicy OBJECT IDENTIFIER ::= {id-at 71}
|
||||
## id-at-role OBJECT IDENTIFIER ::= {id-at 72}
|
||||
## id-at-delegationPath OBJECT IDENTIFIER ::= {id-at 73}
|
||||
## id-at-protPrivPolicy OBJECT IDENTIFIER ::= {id-at 74}
|
||||
## id-at-xMLPrivilegeInfo OBJECT IDENTIFIER ::= {id-at 75}
|
||||
## id-at-xMLPprotPrivPolicy OBJECT IDENTIFIER ::= {id-at 76}
|
||||
## -- attribute certificate extensions --
|
||||
## id-ce-authorityAttributeIdentifier OBJECT IDENTIFIER ::= {id-ce 38}
|
||||
## id-ce-roleSpecCertIdentifier OBJECT IDENTIFIER ::= {id-ce 39}
|
||||
## id-ce-basicAttConstraints OBJECT IDENTIFIER ::= {id-ce 41}
|
||||
## id-ce-delegatedNameConstraints OBJECT IDENTIFIER ::= {id-ce 42}
|
||||
## id-ce-timeSpecification OBJECT IDENTIFIER ::= {id-ce 43}
|
||||
## id-ce-attributeDescriptor OBJECT IDENTIFIER ::= {id-ce 48}
|
||||
## id-ce-userNotice OBJECT IDENTIFIER ::= {id-ce 49}
|
||||
## id-ce-sOAIdentifier OBJECT IDENTIFIER ::= {id-ce 50}
|
||||
## id-ce-acceptableCertPolicies OBJECT IDENTIFIER ::= {id-ce 52}
|
||||
## id-ce-targetInformation OBJECT IDENTIFIER ::= {id-ce 55}
|
||||
## id-ce-noRevAvail OBJECT IDENTIFIER ::= {id-ce 56}
|
||||
## id-ce-acceptablePrivilegePolicies OBJECT IDENTIFIER ::= {id-ce 57}
|
||||
## id-ce-indirectIssuer OBJECT IDENTIFIER ::= {id-ce 61}
|
||||
## id-ce-noAssertion OBJECT IDENTIFIER ::= {id-ce 62}
|
||||
## id-ce-issuedOnBehalfOf OBJECT IDENTIFIER ::= {id-ce 64}
|
||||
## -- PMI matching rules --
|
||||
## id-mr-attributeCertificateMatch OBJECT IDENTIFIER ::= {id-mr 42}
|
||||
## id-mr-attributeCertificateExactMatch OBJECT IDENTIFIER ::= {id-mr 45}
|
||||
## id-mr-holderIssuerMatch OBJECT IDENTIFIER ::= {id-mr 46}
|
||||
## id-mr-authAttIdMatch OBJECT IDENTIFIER ::= {id-mr 53}
|
||||
## id-mr-roleSpecCertIdMatch OBJECT IDENTIFIER ::= {id-mr 54}
|
||||
## id-mr-basicAttConstraintsMatch OBJECT IDENTIFIER ::= {id-mr 55}
|
||||
## id-mr-delegatedNameConstraintsMatch OBJECT IDENTIFIER ::= {id-mr 56}
|
||||
## id-mr-timeSpecMatch OBJECT IDENTIFIER ::= {id-mr 57}
|
||||
## id-mr-attDescriptorMatch OBJECT IDENTIFIER ::= {id-mr 58}
|
||||
## id-mr-acceptableCertPoliciesMatch OBJECT IDENTIFIER ::= {id-mr 59}
|
||||
## id-mr-delegationPathMatch OBJECT IDENTIFIER ::= {id-mr 61}
|
||||
## id-mr-sOAIdentifierMatch OBJECT IDENTIFIER ::= {id-mr 66}
|
||||
## id-mr-indirectIssuerMatch OBJECT IDENTIFIER ::= {id-mr 67}
|
||||
##
|
||||
##
|
||||
## X.509 (08/2005) pp. 71, 86-89
|
||||
##
|
||||
## 14.4.1 Role attribute
|
||||
## role ATTRIBUTE ::= {
|
||||
## WITH SYNTAX RoleSyntax
|
||||
## ID id-at-role }
|
||||
## RoleSyntax ::= SEQUENCE {
|
||||
## roleAuthority [0] GeneralNames OPTIONAL,
|
||||
## roleName [1] GeneralName }
|
||||
##
|
||||
## 14.5 XML privilege information attribute
|
||||
## xmlPrivilegeInfo ATTRIBUTE ::= {
|
||||
## WITH SYNTAX UTF8String -- contains XML-encoded privilege information
|
||||
## ID id-at-xMLPrivilegeInfo }
|
||||
##
|
||||
## 17.1 PMI directory object classes
|
||||
##
|
||||
## 17.1.1 PMI user object class
|
||||
## pmiUser OBJECT-CLASS ::= {
|
||||
## -- a PMI user (i.e., a "holder")
|
||||
## SUBCLASS OF {top}
|
||||
## KIND auxiliary
|
||||
## MAY CONTAIN {attributeCertificateAttribute}
|
||||
## ID id-oc-pmiUser }
|
||||
##
|
||||
## 17.1.2 PMI AA object class
|
||||
## pmiAA OBJECT-CLASS ::= {
|
||||
## -- a PMI AA
|
||||
## SUBCLASS OF {top}
|
||||
## KIND auxiliary
|
||||
## MAY CONTAIN {aACertificate |
|
||||
## attributeCertificateRevocationList |
|
||||
## attributeAuthorityRevocationList}
|
||||
## ID id-oc-pmiAA }
|
||||
##
|
||||
## 17.1.3 PMI SOA object class
|
||||
## pmiSOA OBJECT-CLASS ::= { -- a PMI Source of Authority
|
||||
## SUBCLASS OF {top}
|
||||
## KIND auxiliary
|
||||
## MAY CONTAIN {attributeCertificateRevocationList |
|
||||
## attributeAuthorityRevocationList |
|
||||
## attributeDescriptorCertificate}
|
||||
## ID id-oc-pmiSOA }
|
||||
##
|
||||
## 17.1.4 Attribute certificate CRL distribution point object class
|
||||
## attCertCRLDistributionPt OBJECT-CLASS ::= {
|
||||
## SUBCLASS OF {top}
|
||||
## KIND auxiliary
|
||||
## MAY CONTAIN { attributeCertificateRevocationList |
|
||||
## attributeAuthorityRevocationList }
|
||||
## ID id-oc-attCertCRLDistributionPts }
|
||||
##
|
||||
## 17.1.5 PMI delegation path
|
||||
## pmiDelegationPath OBJECT-CLASS ::= {
|
||||
## SUBCLASS OF {top}
|
||||
## KIND auxiliary
|
||||
## MAY CONTAIN { delegationPath }
|
||||
## ID id-oc-pmiDelegationPath }
|
||||
##
|
||||
## 17.1.6 Privilege policy object class
|
||||
## privilegePolicy OBJECT-CLASS ::= {
|
||||
## SUBCLASS OF {top}
|
||||
## KIND auxiliary
|
||||
## MAY CONTAIN {privPolicy }
|
||||
## ID id-oc-privilegePolicy }
|
||||
##
|
||||
## 17.1.7 Protected privilege policy object class
|
||||
## protectedPrivilegePolicy OBJECT-CLASS ::= {
|
||||
## SUBCLASS OF {top}
|
||||
## KIND auxiliary
|
||||
## MAY CONTAIN {protPrivPolicy }
|
||||
## ID id-oc-protectedPrivilegePolicy }
|
||||
##
|
||||
## 17.2 PMI Directory attributes
|
||||
##
|
||||
## 17.2.1 Attribute certificate attribute
|
||||
## attributeCertificateAttribute ATTRIBUTE ::= {
|
||||
## WITH SYNTAX AttributeCertificate
|
||||
## EQUALITY MATCHING RULE attributeCertificateExactMatch
|
||||
## ID id-at-attributeCertificate }
|
||||
##
|
||||
## 17.2.2 AA certificate attribute
|
||||
## aACertificate ATTRIBUTE ::= {
|
||||
## WITH SYNTAX AttributeCertificate
|
||||
## EQUALITY MATCHING RULE attributeCertificateExactMatch
|
||||
## ID id-at-aACertificate }
|
||||
##
|
||||
## 17.2.3 Attribute descriptor certificate attribute
|
||||
## attributeDescriptorCertificate ATTRIBUTE ::= {
|
||||
## WITH SYNTAX AttributeCertificate
|
||||
## EQUALITY MATCHING RULE attributeCertificateExactMatch
|
||||
## ID id-at-attributeDescriptorCertificate }
|
||||
##
|
||||
## 17.2.4 Attribute certificate revocation list attribute
|
||||
## attributeCertificateRevocationList ATTRIBUTE ::= {
|
||||
## WITH SYNTAX CertificateList
|
||||
## EQUALITY MATCHING RULE certificateListExactMatch
|
||||
## ID id-at-attributeCertificateRevocationList}
|
||||
##
|
||||
## 17.2.5 AA certificate revocation list attribute
|
||||
## attributeAuthorityRevocationList ATTRIBUTE ::= {
|
||||
## WITH SYNTAX CertificateList
|
||||
## EQUALITY MATCHING RULE certificateListExactMatch
|
||||
## ID id-at-attributeAuthorityRevocationList }
|
||||
##
|
||||
## 17.2.6 Delegation path attribute
|
||||
## delegationPath ATTRIBUTE ::= {
|
||||
## WITH SYNTAX AttCertPath
|
||||
## ID id-at-delegationPath }
|
||||
## AttCertPath ::= SEQUENCE OF AttributeCertificate
|
||||
##
|
||||
## 17.2.7 Privilege policy attribute
|
||||
## privPolicy ATTRIBUTE ::= {
|
||||
## WITH SYNTAX PolicySyntax
|
||||
## ID id-at-privPolicy }
|
||||
##
|
||||
## 17.2.8 Protected privilege policy attribute
|
||||
## protPrivPolicy ATTRIBUTE ::= {
|
||||
## WITH SYNTAX AttributeCertificate
|
||||
## EQUALITY MATCHING RULE attributeCertificateExactMatch
|
||||
## ID id-at-protPrivPolicy }
|
||||
##
|
||||
## 17.2.9 XML Protected privilege policy attribute
|
||||
## xmlPrivPolicy ATTRIBUTE ::= {
|
||||
## WITH SYNTAX UTF8String -- contains XML-encoded privilege policy information
|
||||
## ID id-at-xMLPprotPrivPolicy }
|
||||
##
|
||||
|
||||
## -- object identifier assignments --
|
||||
## -- object classes --
|
||||
objectidentifier id-oc-pmiUser 2.5.6.24
|
||||
objectidentifier id-oc-pmiAA 2.5.6.25
|
||||
objectidentifier id-oc-pmiSOA 2.5.6.26
|
||||
objectidentifier id-oc-attCertCRLDistributionPts 2.5.6.27
|
||||
objectidentifier id-oc-privilegePolicy 2.5.6.32
|
||||
objectidentifier id-oc-pmiDelegationPath 2.5.6.33
|
||||
objectidentifier id-oc-protectedPrivilegePolicy 2.5.6.34
|
||||
## -- directory attributes --
|
||||
objectidentifier id-at-attributeCertificate 2.5.4.58
|
||||
objectidentifier id-at-attributeCertificateRevocationList 2.5.4.59
|
||||
objectidentifier id-at-aACertificate 2.5.4.61
|
||||
objectidentifier id-at-attributeDescriptorCertificate 2.5.4.62
|
||||
objectidentifier id-at-attributeAuthorityRevocationList 2.5.4.63
|
||||
objectidentifier id-at-privPolicy 2.5.4.71
|
||||
objectidentifier id-at-role 2.5.4.72
|
||||
objectidentifier id-at-delegationPath 2.5.4.73
|
||||
objectidentifier id-at-protPrivPolicy 2.5.4.74
|
||||
objectidentifier id-at-xMLPrivilegeInfo 2.5.4.75
|
||||
objectidentifier id-at-xMLPprotPrivPolicy 2.5.4.76
|
||||
## -- attribute certificate extensions --
|
||||
## id-ce-authorityAttributeIdentifier OBJECT IDENTIFIER ::= {id-ce 38}
|
||||
## id-ce-roleSpecCertIdentifier OBJECT IDENTIFIER ::= {id-ce 39}
|
||||
## id-ce-basicAttConstraints OBJECT IDENTIFIER ::= {id-ce 41}
|
||||
## id-ce-delegatedNameConstraints OBJECT IDENTIFIER ::= {id-ce 42}
|
||||
## id-ce-timeSpecification OBJECT IDENTIFIER ::= {id-ce 43}
|
||||
## id-ce-attributeDescriptor OBJECT IDENTIFIER ::= {id-ce 48}
|
||||
## id-ce-userNotice OBJECT IDENTIFIER ::= {id-ce 49}
|
||||
## id-ce-sOAIdentifier OBJECT IDENTIFIER ::= {id-ce 50}
|
||||
## id-ce-acceptableCertPolicies OBJECT IDENTIFIER ::= {id-ce 52}
|
||||
## id-ce-targetInformation OBJECT IDENTIFIER ::= {id-ce 55}
|
||||
## id-ce-noRevAvail OBJECT IDENTIFIER ::= {id-ce 56}
|
||||
## id-ce-acceptablePrivilegePolicies OBJECT IDENTIFIER ::= {id-ce 57}
|
||||
## id-ce-indirectIssuer OBJECT IDENTIFIER ::= {id-ce 61}
|
||||
## id-ce-noAssertion OBJECT IDENTIFIER ::= {id-ce 62}
|
||||
## id-ce-issuedOnBehalfOf OBJECT IDENTIFIER ::= {id-ce 64}
|
||||
## -- PMI matching rules --
|
||||
objectidentifier id-mr 2.5.13
|
||||
objectidentifier id-mr-attributeCertificateMatch id-mr:42
|
||||
objectidentifier id-mr-attributeCertificateExactMatch id-mr:45
|
||||
objectidentifier id-mr-holderIssuerMatch id-mr:46
|
||||
objectidentifier id-mr-authAttIdMatch id-mr:53
|
||||
objectidentifier id-mr-roleSpecCertIdMatch id-mr:54
|
||||
objectidentifier id-mr-basicAttConstraintsMatch id-mr:55
|
||||
objectidentifier id-mr-delegatedNameConstraintsMatch id-mr:56
|
||||
objectidentifier id-mr-timeSpecMatch id-mr:57
|
||||
objectidentifier id-mr-attDescriptorMatch id-mr:58
|
||||
objectidentifier id-mr-acceptableCertPoliciesMatch id-mr:59
|
||||
objectidentifier id-mr-delegationPathMatch id-mr:61
|
||||
objectidentifier id-mr-sOAIdentifierMatch id-mr:66
|
||||
objectidentifier id-mr-indirectIssuerMatch id-mr:67
|
||||
## -- syntaxes --
|
||||
## NOTE: 1.3.6.1.4.1.4203.666.11.10 is the oid arc assigned by OpenLDAP
|
||||
## to this work in progress
|
||||
objectidentifier AttributeCertificate 1.3.6.1.4.1.4203.666.11.10.2.1
|
||||
objectidentifier CertificateList 1.3.6.1.4.1.1466.115.121.1.9
|
||||
objectidentifier AttCertPath 1.3.6.1.4.1.4203.666.11.10.2.4
|
||||
objectidentifier PolicySyntax 1.3.6.1.4.1.4203.666.11.10.2.5
|
||||
objectidentifier RoleSyntax 1.3.6.1.4.1.4203.666.11.10.2.6
|
||||
# NOTE: OIDs from <draft-ietf-pkix-ldap-schema-02.txt> (expired)
|
||||
#objectidentifier AttributeCertificate 1.2.826.0.1.3344810.7.5
|
||||
#objectidentifier AttCertPath 1.2.826.0.1.3344810.7.10
|
||||
#objectidentifier PolicySyntax 1.2.826.0.1.3344810.7.17
|
||||
#objectidentifier RoleSyntax 1.2.826.0.1.3344810.7.13
|
||||
##
|
||||
## Substitute syntaxes
|
||||
##
|
||||
## AttCertPath
|
||||
ldapsyntax ( 1.3.6.1.4.1.4203.666.11.10.2.4
|
||||
NAME 'AttCertPath'
|
||||
DESC 'X.509 PMI attribute cartificate path: SEQUENCE OF AttributeCertificate'
|
||||
X-SUBST '1.3.6.1.4.1.1466.115.121.1.15' )
|
||||
##
|
||||
## PolicySyntax
|
||||
ldapsyntax ( 1.3.6.1.4.1.4203.666.11.10.2.5
|
||||
NAME 'PolicySyntax'
|
||||
DESC 'X.509 PMI policy syntax'
|
||||
X-SUBST '1.3.6.1.4.1.1466.115.121.1.15' )
|
||||
##
|
||||
## RoleSyntax
|
||||
ldapsyntax ( 1.3.6.1.4.1.4203.666.11.10.2.6
|
||||
NAME 'RoleSyntax'
|
||||
DESC 'X.509 PMI role syntax'
|
||||
X-SUBST '1.3.6.1.4.1.1466.115.121.1.15' )
|
||||
##
|
||||
## X.509 (08/2005) pp. 71, 86-89
|
||||
##
|
||||
## 14.4.1 Role attribute
|
||||
attributeType ( id-at-role
|
||||
NAME 'role'
|
||||
DESC 'X.509 Role attribute, use ;binary'
|
||||
SYNTAX RoleSyntax )
|
||||
##
|
||||
## 14.5 XML privilege information attribute
|
||||
## -- contains XML-encoded privilege information
|
||||
attributeType ( id-at-xMLPrivilegeInfo
|
||||
NAME 'xmlPrivilegeInfo'
|
||||
DESC 'X.509 XML privilege information attribute'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
##
|
||||
## 17.2 PMI Directory attributes
|
||||
##
|
||||
## 17.2.1 Attribute certificate attribute
|
||||
attributeType ( id-at-attributeCertificate
|
||||
NAME 'attributeCertificateAttribute'
|
||||
DESC 'X.509 Attribute certificate attribute, use ;binary'
|
||||
SYNTAX AttributeCertificate
|
||||
EQUALITY attributeCertificateExactMatch )
|
||||
##
|
||||
## 17.2.2 AA certificate attribute
|
||||
attributeType ( id-at-aACertificate
|
||||
NAME 'aACertificate'
|
||||
DESC 'X.509 AA certificate attribute, use ;binary'
|
||||
SYNTAX AttributeCertificate
|
||||
EQUALITY attributeCertificateExactMatch )
|
||||
##
|
||||
## 17.2.3 Attribute descriptor certificate attribute
|
||||
attributeType ( id-at-attributeDescriptorCertificate
|
||||
NAME 'attributeDescriptorCertificate'
|
||||
DESC 'X.509 Attribute descriptor certificate attribute, use ;binary'
|
||||
SYNTAX AttributeCertificate
|
||||
EQUALITY attributeCertificateExactMatch )
|
||||
##
|
||||
## 17.2.4 Attribute certificate revocation list attribute
|
||||
attributeType ( id-at-attributeCertificateRevocationList
|
||||
NAME 'attributeCertificateRevocationList'
|
||||
DESC 'X.509 Attribute certificate revocation list attribute, use ;binary'
|
||||
SYNTAX CertificateList
|
||||
X-EQUALITY 'certificateListExactMatch, not implemented yet' )
|
||||
##
|
||||
## 17.2.5 AA certificate revocation list attribute
|
||||
attributeType ( id-at-attributeAuthorityRevocationList
|
||||
NAME 'attributeAuthorityRevocationList'
|
||||
DESC 'X.509 AA certificate revocation list attribute, use ;binary'
|
||||
SYNTAX CertificateList
|
||||
X-EQUALITY 'certificateListExactMatch, not implemented yet' )
|
||||
##
|
||||
## 17.2.6 Delegation path attribute
|
||||
attributeType ( id-at-delegationPath
|
||||
NAME 'delegationPath'
|
||||
DESC 'X.509 Delegation path attribute, use ;binary'
|
||||
SYNTAX AttCertPath )
|
||||
## AttCertPath ::= SEQUENCE OF AttributeCertificate
|
||||
##
|
||||
## 17.2.7 Privilege policy attribute
|
||||
attributeType ( id-at-privPolicy
|
||||
NAME 'privPolicy'
|
||||
DESC 'X.509 Privilege policy attribute, use ;binary'
|
||||
SYNTAX PolicySyntax )
|
||||
##
|
||||
## 17.2.8 Protected privilege policy attribute
|
||||
attributeType ( id-at-protPrivPolicy
|
||||
NAME 'protPrivPolicy'
|
||||
DESC 'X.509 Protected privilege policy attribute, use ;binary'
|
||||
SYNTAX AttributeCertificate
|
||||
EQUALITY attributeCertificateExactMatch )
|
||||
##
|
||||
## 17.2.9 XML Protected privilege policy attribute
|
||||
## -- contains XML-encoded privilege policy information
|
||||
attributeType ( id-at-xMLPprotPrivPolicy
|
||||
NAME 'xmlPrivPolicy'
|
||||
DESC 'X.509 XML Protected privilege policy attribute'
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||
##
|
||||
## 17.1 PMI directory object classes
|
||||
##
|
||||
## 17.1.1 PMI user object class
|
||||
## -- a PMI user (i.e., a "holder")
|
||||
objectClass ( id-oc-pmiUser
|
||||
NAME 'pmiUser'
|
||||
DESC 'X.509 PMI user object class'
|
||||
SUP top
|
||||
AUXILIARY
|
||||
MAY ( attributeCertificateAttribute ) )
|
||||
##
|
||||
## 17.1.2 PMI AA object class
|
||||
## -- a PMI AA
|
||||
objectClass ( id-oc-pmiAA
|
||||
NAME 'pmiAA'
|
||||
DESC 'X.509 PMI AA object class'
|
||||
SUP top
|
||||
AUXILIARY
|
||||
MAY ( aACertificate $
|
||||
attributeCertificateRevocationList $
|
||||
attributeAuthorityRevocationList
|
||||
) )
|
||||
##
|
||||
## 17.1.3 PMI SOA object class
|
||||
## -- a PMI Source of Authority
|
||||
objectClass ( id-oc-pmiSOA
|
||||
NAME 'pmiSOA'
|
||||
DESC 'X.509 PMI SOA object class'
|
||||
SUP top
|
||||
AUXILIARY
|
||||
MAY ( attributeCertificateRevocationList $
|
||||
attributeAuthorityRevocationList $
|
||||
attributeDescriptorCertificate
|
||||
) )
|
||||
##
|
||||
## 17.1.4 Attribute certificate CRL distribution point object class
|
||||
objectClass ( id-oc-attCertCRLDistributionPts
|
||||
NAME 'attCertCRLDistributionPt'
|
||||
DESC 'X.509 Attribute certificate CRL distribution point object class'
|
||||
SUP top
|
||||
AUXILIARY
|
||||
MAY ( attributeCertificateRevocationList $
|
||||
attributeAuthorityRevocationList
|
||||
) )
|
||||
##
|
||||
## 17.1.5 PMI delegation path
|
||||
objectClass ( id-oc-pmiDelegationPath
|
||||
NAME 'pmiDelegationPath'
|
||||
DESC 'X.509 PMI delegation path'
|
||||
SUP top
|
||||
AUXILIARY
|
||||
MAY ( delegationPath ) )
|
||||
##
|
||||
## 17.1.6 Privilege policy object class
|
||||
objectClass ( id-oc-privilegePolicy
|
||||
NAME 'privilegePolicy'
|
||||
DESC 'X.509 Privilege policy object class'
|
||||
SUP top
|
||||
AUXILIARY
|
||||
MAY ( privPolicy ) )
|
||||
##
|
||||
## 17.1.7 Protected privilege policy object class
|
||||
objectClass ( id-oc-protectedPrivilegePolicy
|
||||
NAME 'protectedPrivilegePolicy'
|
||||
DESC 'X.509 Protected privilege policy object class'
|
||||
SUP top
|
||||
AUXILIARY
|
||||
MAY ( protPrivPolicy ) )
|
||||
|
||||
87
docker/ldap/data/etc/schema/ppolicy.ldif
Normal file
87
docker/ldap/data/etc/schema/ppolicy.ldif
Normal file
@ -0,0 +1,87 @@
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 2004-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
## Portions Copyright (C) The Internet Society (2004).
|
||||
## Please see full copyright statement below.
|
||||
#
|
||||
# Definitions from Draft behera-ldap-password-policy-07 (a work in progress)
|
||||
# Password Policy for LDAP Directories
|
||||
# With extensions from Hewlett-Packard:
|
||||
# pwdCheckModule etc.
|
||||
#
|
||||
# Contents of this file are subject to change (including deletion)
|
||||
# without notice.
|
||||
#
|
||||
# Not recommended for production use!
|
||||
# Use with extreme caution!
|
||||
#
|
||||
# This file was automatically generated from ppolicy.schema; see that file
|
||||
# for complete references.
|
||||
#
|
||||
dn: cn=ppolicy,cn=schema,cn=config
|
||||
objectClass: olcSchemaConfig
|
||||
cn: ppolicy
|
||||
olcAttributeTypes: {0}( 1.3.6.1.4.1.42.2.27.8.1.1 NAME 'pwdAttribute' EQUALITY
|
||||
objectIdentifierMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
|
||||
olcAttributeTypes: {1}( 1.3.6.1.4.1.42.2.27.8.1.2 NAME 'pwdMinAge' EQUALITY in
|
||||
tegerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
olcAttributeTypes: {2}( 1.3.6.1.4.1.42.2.27.8.1.3 NAME 'pwdMaxAge' EQUALITY in
|
||||
tegerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
olcAttributeTypes: {3}( 1.3.6.1.4.1.42.2.27.8.1.4 NAME 'pwdInHistory' EQUALITY
|
||||
integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1
|
||||
.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: {4}( 1.3.6.1.4.1.42.2.27.8.1.5 NAME 'pwdCheckQuality' EQUAL
|
||||
ITY integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.12
|
||||
1.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: {5}( 1.3.6.1.4.1.42.2.27.8.1.6 NAME 'pwdMinLength' EQUALITY
|
||||
integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.
|
||||
1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: {6}( 1.3.6.1.4.1.42.2.27.8.1.7 NAME 'pwdExpireWarning' EQUA
|
||||
LITY integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.
|
||||
121.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: {7}( 1.3.6.1.4.1.42.2.27.8.1.8 NAME 'pwdGraceAuthNLimit' EQ
|
||||
UALITY integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.11
|
||||
5.121.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: {8}( 1.3.6.1.4.1.42.2.27.8.1.9 NAME 'pwdLockout' EQUALITY b
|
||||
ooleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
|
||||
olcAttributeTypes: {9}( 1.3.6.1.4.1.42.2.27.8.1.10 NAME 'pwdLockoutDuration' E
|
||||
QUALITY integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.1
|
||||
15.121.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: {10}( 1.3.6.1.4.1.42.2.27.8.1.11 NAME 'pwdMaxFailure' EQUAL
|
||||
ITY integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.1
|
||||
21.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: {11}( 1.3.6.1.4.1.42.2.27.8.1.12 NAME 'pwdFailureCountInter
|
||||
val' EQUALITY integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.
|
||||
1466.115.121.1.27 SINGLE-VALUE )
|
||||
olcAttributeTypes: {12}( 1.3.6.1.4.1.42.2.27.8.1.13 NAME 'pwdMustChange' EQUAL
|
||||
ITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
|
||||
olcAttributeTypes: {13}( 1.3.6.1.4.1.42.2.27.8.1.14 NAME 'pwdAllowUserChange'
|
||||
EQUALITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
|
||||
olcAttributeTypes: {14}( 1.3.6.1.4.1.42.2.27.8.1.15 NAME 'pwdSafeModify' EQUAL
|
||||
ITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
|
||||
olcAttributeTypes: {15}( 1.3.6.1.4.1.4754.1.99.1 NAME 'pwdCheckModule' DESC 'L
|
||||
oadable module that instantiates "check_password() function' EQUALITY caseExa
|
||||
ctIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||
olcAttributeTypes: {16}( 1.3.6.1.4.1.42.2.27.8.1.30 NAME 'pwdMaxRecordedFailur
|
||||
e' EQUALITY integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.
|
||||
1466.115.121.1.27 SINGLE-VALUE )
|
||||
olcObjectClasses: {0}( 1.3.6.1.4.1.4754.2.99.1 NAME 'pwdPolicyChecker' SUP top
|
||||
AUXILIARY MAY pwdCheckModule )
|
||||
olcObjectClasses: {1}( 1.3.6.1.4.1.42.2.27.8.2.1 NAME 'pwdPolicy' SUP top AUXI
|
||||
LIARY MUST pwdAttribute MAY ( pwdMinAge $ pwdMaxAge $ pwdInHistory $ pwdCheck
|
||||
Quality $ pwdMinLength $ pwdExpireWarning $ pwdGraceAuthNLimit $ pwdLockout $
|
||||
pwdLockoutDuration $ pwdMaxFailure $ pwdFailureCountInterval $ pwdMustChange
|
||||
$ pwdAllowUserChange $ pwdSafeModify $ pwdMaxRecordedFailure ) )
|
||||
556
docker/ldap/data/etc/schema/ppolicy.schema
Normal file
556
docker/ldap/data/etc/schema/ppolicy.schema
Normal file
@ -0,0 +1,556 @@
|
||||
# $OpenLDAP$
|
||||
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
##
|
||||
## Copyright 2004-2017 The OpenLDAP Foundation.
|
||||
## All rights reserved.
|
||||
##
|
||||
## Redistribution and use in source and binary forms, with or without
|
||||
## modification, are permitted only as authorized by the OpenLDAP
|
||||
## Public License.
|
||||
##
|
||||
## A copy of this license is available in the file LICENSE in the
|
||||
## top-level directory of the distribution or, alternatively, at
|
||||
## <http://www.OpenLDAP.org/license.html>.
|
||||
#
|
||||
## Portions Copyright (C) The Internet Society (2004).
|
||||
## Please see full copyright statement below.
|
||||
|
||||
# Definitions from Draft behera-ldap-password-policy-07 (a work in progress)
|
||||
# Password Policy for LDAP Directories
|
||||
# With extensions from Hewlett-Packard:
|
||||
# pwdCheckModule etc.
|
||||
|
||||
# Contents of this file are subject to change (including deletion)
|
||||
# without notice.
|
||||
#
|
||||
# Not recommended for production use!
|
||||
# Use with extreme caution!
|
||||
|
||||
#Network Working Group J. Sermersheim
|
||||
#Internet-Draft Novell, Inc
|
||||
#Expires: April 24, 2005 L. Poitou
|
||||
# Sun Microsystems
|
||||
# October 24, 2004
|
||||
#
|
||||
#
|
||||
# Password Policy for LDAP Directories
|
||||
# draft-behera-ldap-password-policy-08.txt
|
||||
#
|
||||
#Status of this Memo
|
||||
#
|
||||
# This document is an Internet-Draft and is subject to all provisions
|
||||
# of section 3 of RFC 3667. By submitting this Internet-Draft, each
|
||||
# author represents that any applicable patent or other IPR claims of
|
||||
# which he or she is aware have been or will be disclosed, and any of
|
||||
# which he or she become aware will be disclosed, in accordance with
|
||||
# RFC 3668.
|
||||
#
|
||||
# Internet-Drafts are working documents of the Internet Engineering
|
||||
# Task Force (IETF), its areas, and its working groups. Note that
|
||||
# other groups may also distribute working documents as
|
||||
# Internet-Drafts.
|
||||
#
|
||||
# Internet-Drafts are draft documents valid for a maximum of six months
|
||||
# and may be updated, replaced, or obsoleted by other documents at any
|
||||
# time. It is inappropriate to use Internet-Drafts as reference
|
||||
# material or to cite them other than as "work in progress."
|
||||
#
|
||||
# The list of current Internet-Drafts can be accessed at
|
||||
# http://www.ietf.org/ietf/1id-abstracts.txt.
|
||||
#
|
||||
# The list of Internet-Draft Shadow Directories can be accessed at
|
||||
# http://www.ietf.org/shadow.html.
|
||||
#
|
||||
# This Internet-Draft will expire on April 24, 2005.
|
||||
#
|
||||
#Copyright Notice
|
||||
#
|
||||
# Copyright (C) The Internet Society (2004).
|
||||
#
|
||||
#Abstract
|
||||
#
|
||||
# Password policy as described in this document is a set of rules that
|
||||
# controls how passwords are used and administered in Lightweight
|
||||
# Directory Access Protocol (LDAP) based directories. In order to
|
||||
# improve the security of LDAP directories and make it difficult for
|
||||
# password cracking programs to break into directories, it is desirable
|
||||
# to enforce a set of rules on password usage. These rules are made to
|
||||
#
|
||||
# [trimmed]
|
||||
#
|
||||
#5. Schema used for Password Policy
|
||||
#
|
||||
# The schema elements defined here fall into two general categories. A
|
||||
# password policy object class is defined which contains a set of
|
||||
# administrative password policy attributes, and a set of operational
|
||||
# attributes are defined that hold general password policy state
|
||||
# information for each user.
|
||||
#
|
||||
#5.2 Attribute Types used in the pwdPolicy ObjectClass
|
||||
#
|
||||
# Following are the attribute types used by the pwdPolicy object class.
|
||||
#
|
||||
#5.2.1 pwdAttribute
|
||||
#
|
||||
# This holds the name of the attribute to which the password policy is
|
||||
# applied. For example, the password policy may be applied to the
|
||||
# userPassword attribute.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.1
|
||||
NAME 'pwdAttribute'
|
||||
EQUALITY objectIdentifierMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
|
||||
|
||||
#5.2.2 pwdMinAge
|
||||
#
|
||||
# This attribute holds the number of seconds that must elapse between
|
||||
# modifications to the password. If this attribute is not present, 0
|
||||
# seconds is assumed.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.2
|
||||
NAME 'pwdMinAge'
|
||||
EQUALITY integerMatch
|
||||
ORDERING integerOrderingMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
|
||||
#5.2.3 pwdMaxAge
|
||||
#
|
||||
# This attribute holds the number of seconds after which a modified
|
||||
# password will expire.
|
||||
#
|
||||
# If this attribute is not present, or if the value is 0 the password
|
||||
# does not expire. If not 0, the value must be greater than or equal
|
||||
# to the value of the pwdMinAge.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.3
|
||||
NAME 'pwdMaxAge'
|
||||
EQUALITY integerMatch
|
||||
ORDERING integerOrderingMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
|
||||
#5.2.4 pwdInHistory
|
||||
#
|
||||
# This attribute specifies the maximum number of used passwords stored
|
||||
# in the pwdHistory attribute.
|
||||
#
|
||||
# If this attribute is not present, or if the value is 0, used
|
||||
# passwords are not stored in the pwdHistory attribute and thus may be
|
||||
# reused.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.4
|
||||
NAME 'pwdInHistory'
|
||||
EQUALITY integerMatch
|
||||
ORDERING integerOrderingMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
|
||||
#5.2.5 pwdCheckQuality
|
||||
#
|
||||
# {TODO: Consider changing the syntax to OID. Each OID will list a
|
||||
# quality rule (like min len, # of special characters, etc). These
|
||||
# rules can be specified outsid ethis document.}
|
||||
#
|
||||
# {TODO: Note that even though this is meant to be a check that happens
|
||||
# during password modification, it may also be allowed to happen during
|
||||
# authN. This is useful for situations where the password is encrypted
|
||||
# when modified, but decrypted when used to authN.}
|
||||
#
|
||||
# This attribute indicates how the password quality will be verified
|
||||
# while being modified or added. If this attribute is not present, or
|
||||
# if the value is '0', quality checking will not be enforced. A value
|
||||
# of '1' indicates that the server will check the quality, and if the
|
||||
# server is unable to check it (due to a hashed password or other
|
||||
# reasons) it will be accepted. A value of '2' indicates that the
|
||||
# server will check the quality, and if the server is unable to verify
|
||||
# it, it will return an error refusing the password.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.5
|
||||
NAME 'pwdCheckQuality'
|
||||
EQUALITY integerMatch
|
||||
ORDERING integerOrderingMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
|
||||
#5.2.6 pwdMinLength
|
||||
#
|
||||
# When quality checking is enabled, this attribute holds the minimum
|
||||
# number of characters that must be used in a password. If this
|
||||
# attribute is not present, no minimum password length will be
|
||||
# enforced. If the server is unable to check the length (due to a
|
||||
# hashed password or otherwise), the server will, depending on the
|
||||
# value of the pwdCheckQuality attribute, either accept the password
|
||||
# without checking it ('0' or '1') or refuse it ('2').
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.6
|
||||
NAME 'pwdMinLength'
|
||||
EQUALITY integerMatch
|
||||
ORDERING integerOrderingMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
|
||||
#5.2.7 pwdExpireWarning
|
||||
#
|
||||
# This attribute specifies the maximum number of seconds before a
|
||||
# password is due to expire that expiration warning messages will be
|
||||
# returned to an authenticating user.
|
||||
#
|
||||
# If this attribute is not present, or if the value is 0 no warnings
|
||||
# will be returned. If not 0, the value must be smaller than the value
|
||||
# of the pwdMaxAge attribute.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.7
|
||||
NAME 'pwdExpireWarning'
|
||||
EQUALITY integerMatch
|
||||
ORDERING integerOrderingMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
|
||||
#5.2.8 pwdGraceAuthNLimit
|
||||
#
|
||||
# This attribute specifies the number of times an expired password can
|
||||
# be used to authenticate. If this attribute is not present or if the
|
||||
# value is 0, authentication will fail.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.8
|
||||
NAME 'pwdGraceAuthNLimit'
|
||||
EQUALITY integerMatch
|
||||
ORDERING integerOrderingMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
|
||||
#5.2.9 pwdLockout
|
||||
#
|
||||
# This attribute indicates, when its value is "TRUE", that the password
|
||||
# may not be used to authenticate after a specified number of
|
||||
# consecutive failed bind attempts. The maximum number of consecutive
|
||||
# failed bind attempts is specified in pwdMaxFailure.
|
||||
#
|
||||
# If this attribute is not present, or if the value is "FALSE", the
|
||||
# password may be used to authenticate when the number of failed bind
|
||||
# attempts has been reached.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.9
|
||||
NAME 'pwdLockout'
|
||||
EQUALITY booleanMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
||||
SINGLE-VALUE )
|
||||
|
||||
#5.2.10 pwdLockoutDuration
|
||||
#
|
||||
# This attribute holds the number of seconds that the password cannot
|
||||
# be used to authenticate due to too many failed bind attempts. If
|
||||
# this attribute is not present, or if the value is 0 the password
|
||||
# cannot be used to authenticate until reset by a password
|
||||
# administrator.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.10
|
||||
NAME 'pwdLockoutDuration'
|
||||
EQUALITY integerMatch
|
||||
ORDERING integerOrderingMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
|
||||
#5.2.11 pwdMaxFailure
|
||||
#
|
||||
# This attribute specifies the number of consecutive failed bind
|
||||
# attempts after which the password may not be used to authenticate.
|
||||
# If this attribute is not present, or if the value is 0, this policy
|
||||
# is not checked, and the value of pwdLockout will be ignored.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.11
|
||||
NAME 'pwdMaxFailure'
|
||||
EQUALITY integerMatch
|
||||
ORDERING integerOrderingMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
|
||||
#5.2.12 pwdFailureCountInterval
|
||||
#
|
||||
# This attribute holds the number of seconds after which the password
|
||||
# failures are purged from the failure counter, even though no
|
||||
# successful authentication occurred.
|
||||
#
|
||||
# If this attribute is not present, or if its value is 0, the failure
|
||||
# counter is only reset by a successful authentication.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.12
|
||||
NAME 'pwdFailureCountInterval'
|
||||
EQUALITY integerMatch
|
||||
ORDERING integerOrderingMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
|
||||
#5.2.13 pwdMustChange
|
||||
#
|
||||
# This attribute specifies with a value of "TRUE" that users must
|
||||
# change their passwords when they first bind to the directory after a
|
||||
# password is set or reset by a password administrator. If this
|
||||
# attribute is not present, or if the value is "FALSE", users are not
|
||||
# required to change their password upon binding after the password
|
||||
# administrator sets or resets the password. This attribute is not set
|
||||
# due to any actions specified by this document, it is typically set by
|
||||
# a password administrator after resetting a user's password.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.13
|
||||
NAME 'pwdMustChange'
|
||||
EQUALITY booleanMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
||||
SINGLE-VALUE )
|
||||
|
||||
#5.2.14 pwdAllowUserChange
|
||||
#
|
||||
# This attribute indicates whether users can change their own
|
||||
# passwords, although the change operation is still subject to access
|
||||
# control. If this attribute is not present, a value of "TRUE" is
|
||||
# assumed. This attribute is intended to be used in the absense of an
|
||||
# access control mechanism.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.14
|
||||
NAME 'pwdAllowUserChange'
|
||||
EQUALITY booleanMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
||||
SINGLE-VALUE )
|
||||
|
||||
#5.2.15 pwdSafeModify
|
||||
#
|
||||
# This attribute specifies whether or not the existing password must be
|
||||
# sent along with the new password when being changed. If this
|
||||
# attribute is not present, a "FALSE" value is assumed.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.15
|
||||
NAME 'pwdSafeModify'
|
||||
EQUALITY booleanMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
||||
SINGLE-VALUE )
|
||||
|
||||
#ITS#8185 pwdMaxRecordedFailure
|
||||
#
|
||||
# This attribute specifies the maximum number of consecutive failed bind
|
||||
# attempts to record. If this attribute is not present, or if the value
|
||||
# is 0, it defaults to the value of pwdMaxFailure. If that value is also
|
||||
# 0, this value defaults to 5.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.30
|
||||
NAME 'pwdMaxRecordedFailure'
|
||||
EQUALITY integerMatch
|
||||
ORDERING integerOrderingMatch
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||
SINGLE-VALUE )
|
||||
|
||||
# HP extensions
|
||||
#
|
||||
# pwdCheckModule
|
||||
#
|
||||
# This attribute names a user-defined loadable module that provides
|
||||
# a check_password() function. If pwdCheckQuality is set to '1' or '2'
|
||||
# this function will be called after all of the internal password
|
||||
# quality checks have been passed. The function has this prototype:
|
||||
#
|
||||
# int check_password( char *password, char **errormessage, void *arg )
|
||||
#
|
||||
# The function should return LDAP_SUCCESS for a valid password.
|
||||
|
||||
attributetype ( 1.3.6.1.4.1.4754.1.99.1
|
||||
NAME 'pwdCheckModule'
|
||||
EQUALITY caseExactIA5Match
|
||||
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||
DESC 'Loadable module that instantiates check_password() function'
|
||||
SINGLE-VALUE )
|
||||
|
||||
objectclass ( 1.3.6.1.4.1.4754.2.99.1
|
||||
NAME 'pwdPolicyChecker'
|
||||
SUP top
|
||||
AUXILIARY
|
||||
MAY ( pwdCheckModule ) )
|
||||
|
||||
#5.1 The pwdPolicy Object Class
|
||||
#
|
||||
# This object class contains the attributes defining a password policy
|
||||
# in effect for a set of users. Section 10 describes the
|
||||
# administration of this object, and the relationship between it and
|
||||
# particular objects.
|
||||
#
|
||||
objectclass ( 1.3.6.1.4.1.42.2.27.8.2.1
|
||||
NAME 'pwdPolicy'
|
||||
SUP top
|
||||
AUXILIARY
|
||||
MUST ( pwdAttribute )
|
||||
MAY ( pwdMinAge $ pwdMaxAge $ pwdInHistory $ pwdCheckQuality $
|
||||
pwdMinLength $ pwdExpireWarning $ pwdGraceAuthNLimit $ pwdLockout
|
||||
$ pwdLockoutDuration $ pwdMaxFailure $ pwdFailureCountInterval $
|
||||
pwdMustChange $ pwdAllowUserChange $ pwdSafeModify $
|
||||
pwdMaxRecordedFailure ) )
|
||||
|
||||
#5.3 Attribute Types for Password Policy State Information
|
||||
#
|
||||
# Password policy state information must be maintained for each user.
|
||||
# The information is located in each user entry as a set of operational
|
||||
# attributes. These operational attributes are: pwdChangedTime,
|
||||
# pwdAccountLockedTime, pwdFailureTime, pwdHistory, pwdGraceUseTime,
|
||||
# pwdReset, pwdPolicySubEntry.
|
||||
#
|
||||
#5.3.1 Password Policy State Attribute Option
|
||||
#
|
||||
# Since the password policy could apply to several attributes used to
|
||||
# store passwords, each of the above operational attributes must have
|
||||
# an option to specify which pwdAttribute it applies to. The password
|
||||
# policy option is defined as the following:
|
||||
#
|
||||
# pwd-<passwordAttribute>
|
||||
#
|
||||
# where passwordAttribute a string following the OID syntax
|
||||
# (1.3.6.1.4.1.1466.115.121.1.38). The attribute type descriptor
|
||||
# (short name) MUST be used.
|
||||
#
|
||||
# For example, if the pwdPolicy object has for pwdAttribute
|
||||
# "userPassword" then the pwdChangedTime operational attribute, in a
|
||||
# user entry, will be:
|
||||
#
|
||||
# pwdChangedTime;pwd-userPassword: 20000103121520Z
|
||||
#
|
||||
# This attribute option follows sub-typing semantics. If a client
|
||||
# requests a password policy state attribute to be returned in a search
|
||||
# operation, and does not specify an option, all subtypes of that
|
||||
# policy state attribute are returned.
|
||||
#
|
||||
#5.3.2 pwdChangedTime
|
||||
#
|
||||
# This attribute specifies the last time the entry's password was
|
||||
# changed. This is used by the password expiration policy. If this
|
||||
# attribute does not exist, the password will never expire.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.8.1.16
|
||||
# NAME 'pwdChangedTime'
|
||||
# DESC 'The time the password was last changed'
|
||||
# EQUALITY generalizedTimeMatch
|
||||
# ORDERING generalizedTimeOrderingMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
|
||||
# SINGLE-VALUE
|
||||
# USAGE directoryOperation )
|
||||
#
|
||||
#5.3.3 pwdAccountLockedTime
|
||||
#
|
||||
# This attribute holds the time that the user's account was locked. A
|
||||
# locked account means that the password may no longer be used to
|
||||
# authenticate. A 000001010000Z value means that the account has been
|
||||
# locked permanently, and that only a password administrator can unlock
|
||||
# the account.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.8.1.17
|
||||
# NAME 'pwdAccountLockedTime'
|
||||
# DESC 'The time an user account was locked'
|
||||
# EQUALITY generalizedTimeMatch
|
||||
# ORDERING generalizedTimeOrderingMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
|
||||
# SINGLE-VALUE
|
||||
# USAGE directoryOperation )
|
||||
#
|
||||
#5.3.4 pwdFailureTime
|
||||
#
|
||||
# This attribute holds the timestamps of the consecutive authentication
|
||||
# failures.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.8.1.19
|
||||
# NAME 'pwdFailureTime'
|
||||
# DESC 'The timestamps of the last consecutive authentication
|
||||
# failures'
|
||||
# EQUALITY generalizedTimeMatch
|
||||
# ORDERING generalizedTimeOrderingMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
|
||||
# USAGE directoryOperation )
|
||||
#
|
||||
#5.3.5 pwdHistory
|
||||
#
|
||||
# This attribute holds a history of previously used passwords. Values
|
||||
# of this attribute are transmitted in string format as given by the
|
||||
# following ABNF:
|
||||
#
|
||||
# pwdHistory = time "#" syntaxOID "#" length "#" data
|
||||
#
|
||||
# time = <generalizedTimeString as specified in 6.14
|
||||
# of [RFC2252]>
|
||||
#
|
||||
# syntaxOID = numericoid ; the string representation of the
|
||||
# ; dotted-decimal OID that defines the
|
||||
# ; syntax used to store the password.
|
||||
# ; numericoid is described in 4.1
|
||||
# ; of [RFC2252].
|
||||
#
|
||||
# length = numericstring ; the number of octets in data.
|
||||
# ; numericstring is described in 4.1
|
||||
# ; of [RFC2252].
|
||||
#
|
||||
# data = <octets representing the password in the format
|
||||
# specified by syntaxOID>.
|
||||
#
|
||||
# This format allows the server to store, and transmit a history of
|
||||
# passwords that have been used. In order for equality matching to
|
||||
# function properly, the time field needs to adhere to a consistent
|
||||
# format. For this purpose, the time field MUST be in GMT format.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.8.1.20
|
||||
# NAME 'pwdHistory'
|
||||
# DESC 'The history of user s passwords'
|
||||
# EQUALITY octetStringMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.40
|
||||
# USAGE directoryOperation )
|
||||
#
|
||||
#5.3.6 pwdGraceUseTime
|
||||
#
|
||||
# This attribute holds the timestamps of grace authentications after a
|
||||
# password has expired.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.8.1.21
|
||||
# NAME 'pwdGraceUseTime'
|
||||
# DESC 'The timestamps of the grace authentication after the
|
||||
# password has expired'
|
||||
# EQUALITY generalizedTimeMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
|
||||
#
|
||||
#5.3.7 pwdReset
|
||||
#
|
||||
# This attribute holds a flag to indicate (when TRUE) that the password
|
||||
# has been updated by the password administrator and must be changed by
|
||||
# the user on first authentication.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.8.1.22
|
||||
# NAME 'pwdReset'
|
||||
# DESC 'The indication that the password has been reset'
|
||||
# EQUALITY booleanMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
||||
# SINGLE-VALUE
|
||||
# USAGE directoryOperation )
|
||||
#
|
||||
#5.3.8 pwdPolicySubentry
|
||||
#
|
||||
# This attribute points to the pwdPolicy subentry in effect for this
|
||||
# object.
|
||||
#
|
||||
# ( 1.3.6.1.4.1.42.2.27.8.1.23
|
||||
# NAME 'pwdPolicySubentry'
|
||||
# DESC 'The pwdPolicy subentry in effect for this object'
|
||||
# EQUALITY distinguishedNameMatch
|
||||
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
|
||||
# SINGLE-VALUE
|
||||
# USAGE directoryOperation )
|
||||
#
|
||||
#
|
||||
#Disclaimer of Validity
|
||||
#
|
||||
# This document and the information contained herein are provided on an
|
||||
# "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||||
# OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
|
||||
# ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
|
||||
# INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
|
||||
# INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
||||
# WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||
#
|
||||
#
|
||||
#Copyright Statement
|
||||
#
|
||||
# Copyright (C) The Internet Society (2004). This document is subject
|
||||
# to the rights, licenses and restrictions contained in BCP 78, and
|
||||
# except as set forth therein, the authors retain all their rights.
|
||||
|
||||
71
docker/ldap/data/etc/slapd.conf
Normal file
71
docker/ldap/data/etc/slapd.conf
Normal file
@ -0,0 +1,71 @@
|
||||
#
|
||||
# See slapd.conf(5) for details on configuration options.
|
||||
# This file should NOT be world readable.
|
||||
#
|
||||
include /etc/openldap/schema/core.schema
|
||||
|
||||
# Define global ACLs to disable default read access.
|
||||
|
||||
# Do not enable referrals until AFTER you have a working directory
|
||||
# service AND an understanding of referrals.
|
||||
#referral ldap://root.openldap.org
|
||||
|
||||
# If you change this, adjust pidfile path also in runscript!
|
||||
pidfile /tmp/slapd.pid
|
||||
argsfile /tmp/slapd.args
|
||||
|
||||
# Load dynamic backend modules:
|
||||
modulepath /usr/lib/openldap
|
||||
moduleload back_mdb.so
|
||||
# moduleload back_hdb.so
|
||||
# moduleload back_bbd.so
|
||||
# moduleload back_ldap.so
|
||||
|
||||
# Sample security restrictions
|
||||
# Require integrity protection (prevent hijacking)
|
||||
# Require 112-bit (3DES or better) encryption for updates
|
||||
# Require 63-bit encryption for simple bind
|
||||
# security ssf=1 update_ssf=112 simple_bind=64
|
||||
|
||||
# Sample access control policy:
|
||||
# Root DSE: allow anyone to read it
|
||||
# Subschema (sub)entry DSE: allow anyone to read it
|
||||
# Other DSEs:
|
||||
# Allow self write access
|
||||
# Allow authenticated users read access
|
||||
# Allow anonymous users to authenticate
|
||||
# Directives needed to implement policy:
|
||||
# access to dn.base="" by * read
|
||||
# access to dn.base="cn=Subschema" by * read
|
||||
# access to *
|
||||
# by self write
|
||||
# by users read
|
||||
# by anonymous auth
|
||||
#
|
||||
# if no access controls are present, the default policy
|
||||
# allows anyone and everyone to read anything but restricts
|
||||
# updates to rootdn. (e.g., "access to * by * read")
|
||||
#
|
||||
# rootdn can always read and write EVERYTHING!
|
||||
|
||||
#######################################################################
|
||||
# MDB database definitions
|
||||
#######################################################################
|
||||
|
||||
database mdb
|
||||
maxsize 1073741824
|
||||
suffix "dc=my-domain,dc=com"
|
||||
rootdn "cn=Manager,dc=my-domain,dc=com"
|
||||
|
||||
# Cleartext passwords, especially for the rootdn, should
|
||||
# be avoid. See slappasswd(8) and slapd.conf(5) for details.
|
||||
# Use of strong authentication encouraged.
|
||||
rootpw secret
|
||||
|
||||
# The database directory MUST exist prior to running slapd AND
|
||||
# should only be accessible by the slapd and slap tools.
|
||||
# Mode 700 recommended.
|
||||
directory /var/lib/openldap/openldap-data
|
||||
|
||||
# Indices to maintain
|
||||
index objectClass eq
|
||||
100
docker/ldap/data/etc/slapd.ldif
Normal file
100
docker/ldap/data/etc/slapd.ldif
Normal file
@ -0,0 +1,100 @@
|
||||
#
|
||||
# See slapd-config(5) for details on configuration options.
|
||||
# This file should NOT be world readable.
|
||||
#
|
||||
dn: cn=config
|
||||
objectClass: olcGlobal
|
||||
cn: config
|
||||
#
|
||||
#
|
||||
# Define global ACLs to disable default read access.
|
||||
#
|
||||
# If you change this, set pidfile variable in /etc/conf.d/slapd!
|
||||
olcPidFile: /run/openldap/slapd.pid
|
||||
olcArgsFile: /run/openldap/slapd.args
|
||||
#
|
||||
# Do not enable referrals until AFTER you have a working directory
|
||||
# service AND an understanding of referrals.
|
||||
#olcReferral: ldap://root.openldap.org
|
||||
#
|
||||
# Sample security restrictions
|
||||
# Require integrity protection (prevent hijacking)
|
||||
# Require 112-bit (3DES or better) encryption for updates
|
||||
# Require 64-bit encryption for simple bind
|
||||
#olcSecurity: ssf=1 update_ssf=112 simple_bind=64
|
||||
|
||||
|
||||
#
|
||||
# Load dynamic backend modules:
|
||||
#
|
||||
dn: cn=module,cn=config
|
||||
objectClass: olcModuleList
|
||||
cn: module
|
||||
olcModulepath: /usr/lib/openldap
|
||||
#olcModuleload: back_bdb.so
|
||||
#olcModuleload: back_hdb.so
|
||||
#olcModuleload: back_ldap.so
|
||||
olcModuleload: back_mdb.so
|
||||
#olcModuleload: back_passwd.so
|
||||
#olcModuleload: back_shell.so
|
||||
|
||||
|
||||
dn: cn=schema,cn=config
|
||||
objectClass: olcSchemaConfig
|
||||
cn: schema
|
||||
|
||||
include: file:///etc/openldap/schema/core.ldif
|
||||
|
||||
# Frontend settings
|
||||
#
|
||||
dn: olcDatabase=frontend,cn=config
|
||||
objectClass: olcDatabaseConfig
|
||||
objectClass: olcFrontendConfig
|
||||
olcDatabase: frontend
|
||||
#
|
||||
# Sample global access control policy:
|
||||
# Root DSE: allow anyone to read it
|
||||
# Subschema (sub)entry DSE: allow anyone to read it
|
||||
# Other DSEs:
|
||||
# Allow self write access
|
||||
# Allow authenticated users read access
|
||||
# Allow anonymous users to authenticate
|
||||
#
|
||||
#olcAccess: to dn.base="" by * read
|
||||
#olcAccess: to dn.base="cn=Subschema" by * read
|
||||
#olcAccess: to *
|
||||
# by self write
|
||||
# by users read
|
||||
# by anonymous auth
|
||||
#
|
||||
# if no access controls are present, the default policy
|
||||
# allows anyone and everyone to read anything but restricts
|
||||
# updates to rootdn. (e.g., "access to * by * read")
|
||||
#
|
||||
# rootdn can always read and write EVERYTHING!
|
||||
#
|
||||
|
||||
|
||||
#######################################################################
|
||||
# LMDB database definitions
|
||||
#######################################################################
|
||||
#
|
||||
dn: olcDatabase=mdb,cn=config
|
||||
objectClass: olcDatabaseConfig
|
||||
objectClass: olcMdbConfig
|
||||
olcDatabase: mdb
|
||||
olcSuffix: dc=my-domain,dc=com
|
||||
olcRootDN: cn=Manager,dc=my-domain,dc=com
|
||||
|
||||
# Cleartext passwords, especially for the rootdn, should
|
||||
# be avoided. See slappasswd(8) and slapd-config(5) for details.
|
||||
# Use of strong authentication encouraged.
|
||||
olcRootPW: secret
|
||||
|
||||
# The database directory MUST exist prior to running slapd AND
|
||||
# should only be accessible by the slapd and slap tools.
|
||||
# Mode 700 recommended.
|
||||
olcDbDirectory: /var/lib/openldap/openldap-data
|
||||
|
||||
# Indices to maintain
|
||||
olcDbIndex: objectClass eq
|
||||
37
docker/ldap/docker-compose.yml
Normal file
37
docker/ldap/docker-compose.yml
Normal file
@ -0,0 +1,37 @@
|
||||
version: "3"
|
||||
|
||||
networks:
|
||||
frontend_net:
|
||||
external: false
|
||||
ldap_net:
|
||||
external: false
|
||||
|
||||
services:
|
||||
ldap:
|
||||
image: docker.clkl.de/ldap/ldap:0.1
|
||||
build:
|
||||
context: .
|
||||
dockerfile: Dockerfile.ldap
|
||||
env_file: ldap.env
|
||||
volumes:
|
||||
# - ./data/etc/:/etc/openldap/
|
||||
- ./data/var/:/var/lib/openldap/
|
||||
ports:
|
||||
- 1389:389
|
||||
networks:
|
||||
- ldap_net
|
||||
|
||||
admin:
|
||||
image: docker.clkl.de/ldap/admin:0.1
|
||||
build:
|
||||
context: .
|
||||
dockerfile: Dockerfile.admin
|
||||
ports:
|
||||
- 8080:80
|
||||
networks:
|
||||
# - frontend_net
|
||||
- ldap_net
|
||||
# labels:
|
||||
# - "traefik.enable=true"
|
||||
# - "traefik.frontend.rule=Host:ldap.stuve-bamberg.de,ldap.stuve.cafe.wie-ei.de"
|
||||
# - "traefik.docker.network=frontend_net"
|
||||
5
docker/ldap/entrypoint.sh
Executable file
5
docker/ldap/entrypoint.sh
Executable file
@ -0,0 +1,5 @@
|
||||
#!/bin/sh
|
||||
chown ldap:ldap -R /var/lib/openldap
|
||||
slapadd -l /etc/openldap/start.ldif
|
||||
slapd -u ldap -g ldap -d 32768
|
||||
|
||||
7
docker/ldap/ldap.env
Normal file
7
docker/ldap/ldap.env
Normal file
@ -0,0 +1,7 @@
|
||||
#SLAPD_PASSWORD=very_secure_pw
|
||||
SLAPD_PASSWORD=lkdälflvjkäpwidsäpjoöka-ladsÖaslkjxd
|
||||
SLAPD_DOMAIN=example.websites
|
||||
SLAPD_ORGANIZATION= LDAP
|
||||
SLAPD_CONFIG_PASSWORD=config_pw
|
||||
SLAPD_ADDITIONAL_SCHEMAS=
|
||||
SLAPD_ADDITIONAL_MODULES=
|
||||
83
docker/ldap/slapd.conf
Normal file
83
docker/ldap/slapd.conf
Normal file
@ -0,0 +1,83 @@
|
||||
#
|
||||
# See slapd.conf(5) for details on configuration options.
|
||||
# This file should NOT be world readable.
|
||||
#
|
||||
include /etc/openldap/schema/core.schema
|
||||
include /etc/openldap/schema/cosine.schema
|
||||
include /etc/openldap/schema/inetorgperson.schema
|
||||
include /etc/openldap/schema/ppolicy.schema
|
||||
|
||||
# Define global ACLs to disable default read access.
|
||||
|
||||
# Do not enable referrals until AFTER you have a working directory
|
||||
# service AND an understanding of referrals.
|
||||
#referral ldap://root.openldap.org
|
||||
moduleload ppolicy.so
|
||||
|
||||
# If you change this, adjust pidfile path also in runscript!
|
||||
pidfile /tmp/slapd.pid
|
||||
argsfile /tmp/slapd.args
|
||||
|
||||
# Load dynamic backend modules:
|
||||
modulepath /usr/lib/openldap
|
||||
moduleload back_mdb.so
|
||||
# moduleload back_hdb.so
|
||||
# moduleload back_bbd.so
|
||||
# moduleload back_ldap.so
|
||||
|
||||
# Sample security restrictions
|
||||
# Require integrity protection (prevent hijacking)
|
||||
# Require 112-bit (3DES or better) encryption for updates
|
||||
# Require 63-bit encryption for simple bind
|
||||
# security ssf=1 update_ssf=112 simple_bind=64
|
||||
|
||||
# Sample access control policy:
|
||||
# Root DSE: allow anyone to read it
|
||||
# Subschema (sub)entry DSE: allow anyone to read it
|
||||
# Other DSEs:
|
||||
# Allow self write access
|
||||
# Allow authenticated users read access
|
||||
# Allow anonymous users to authenticate
|
||||
# Directives needed to implement policy:
|
||||
# access to dn.base="" by * read
|
||||
# access to dn.base="cn=Subschema" by * read
|
||||
# access to *
|
||||
# by self write
|
||||
# by users read
|
||||
# by anonymous auth
|
||||
#
|
||||
# if no access controls are present, the default policy
|
||||
# allows anyone and everyone to read anything but restricts
|
||||
# updates to rootdn. (e.g., "access to * by * read")
|
||||
#
|
||||
# rootdn can always read and write EVERYTHING!
|
||||
|
||||
#######################################################################
|
||||
# MDB database definitions
|
||||
#######################################################################
|
||||
|
||||
database mdb
|
||||
maxsize 1073741824
|
||||
suffix "dc=test,dc=de"
|
||||
rootdn "cn=admin,dc=test,dc=de"
|
||||
|
||||
# Cleartext passwords, especially for the rootdn, should
|
||||
# be avoid. See slappasswd(8) and slapd.conf(5) for details.
|
||||
# Use of strong authentication encouraged.
|
||||
rootpw secret
|
||||
|
||||
# The database directory MUST exist prior to running slapd AND
|
||||
# should only be accessible by the slapd and slap tools.
|
||||
# Mode 700 recommended.
|
||||
directory /var/lib/openldap/openldap-data
|
||||
|
||||
# Indices to maintain
|
||||
index objectClass eq
|
||||
|
||||
overlay ppolicy
|
||||
#ppolicy_default "cn=default,ou=policies,dc=stuve,dc=de"
|
||||
#ppolicy_use_lockout
|
||||
ppolicy_hash_cleartext
|
||||
|
||||
password-hash {CRYPT}
|
||||
password-crypt-salt-format "$6$%.12s"
|
||||
768
docker/ldap/start.ldif
Normal file
768
docker/ldap/start.ldif
Normal file
@ -0,0 +1,768 @@
|
||||
dn: dc=stuve,dc=de
|
||||
o: StuVe
|
||||
objectClass: dcobject
|
||||
objectClass: organization
|
||||
structuralObjectClass: organization
|
||||
dc: stuve
|
||||
entryUUID: 14194a21-e532-4caa-8b53-97ce5be9bd3c
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308150713Z
|
||||
entryCSN: 20190308150713.245843Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308150713Z
|
||||
|
||||
dn: ou=fachschaften,dc=stuve,dc=de
|
||||
ou: fachschaften
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: d4c71b54-7ddd-4b93-bcd3-4c8c9a7f9db8
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308150747Z
|
||||
entryCSN: 20190308150747.512079Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308150747Z
|
||||
|
||||
dn: ou=wiai,ou=fachschaften,dc=stuve,dc=de
|
||||
ou: wiai
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 3ab9cb8b-8291-4613-a2d3-173e06b4ea61
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308150804Z
|
||||
entryCSN: 20190308150804.534766Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308150804Z
|
||||
|
||||
dn: ou=people,ou=wiai,ou=fachschaften,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: dcbc3ff1-5f6d-4d49-ae4a-92686ac9b6a4
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308150816Z
|
||||
entryCSN: 20190308150816.277395Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308150816Z
|
||||
|
||||
dn: ou=referate,dc=stuve,dc=de
|
||||
ou: referate
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: f940f71c-1c01-4656-8c9e-bff6b3dd3cdc
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308150935Z
|
||||
entryCSN: 20190308150935.818082Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308150935Z
|
||||
|
||||
dn: ou=groups,ou=wiai,ou=fachschaften,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: c255b242-546d-4ee6-99a8-147546b5b5bb
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308150948Z
|
||||
entryCSN: 20190308150948.835880Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308150948Z
|
||||
|
||||
dn: ou=guk,ou=fachschaften,dc=stuve,dc=de
|
||||
ou: guk
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: c403c0f8-0c29-44f2-8bae-027684b7ff4e
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151017Z
|
||||
entryCSN: 20190308151017.676050Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151017Z
|
||||
|
||||
dn: ou=sowi,ou=fachschaften,dc=stuve,dc=de
|
||||
ou: sowi
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: bfd7d45a-d775-4bf7-8e60-53bc6dc4c71c
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151027Z
|
||||
entryCSN: 20190308151027.773442Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151027Z
|
||||
|
||||
dn: ou=huwi,ou=fachschaften,dc=stuve,dc=de
|
||||
ou: huwi
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: d52bf673-afdf-4907-8f26-97e1d9d47dc2
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151036Z
|
||||
entryCSN: 20190308151036.562150Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151036Z
|
||||
|
||||
dn: ou=groups,ou=guk,ou=fachschaften,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: b07f0967-7ff3-4908-bbf5-c5b50c83b381
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151043Z
|
||||
entryCSN: 20190308151043.785787Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151043Z
|
||||
|
||||
dn: ou=people,ou=guk,ou=fachschaften,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 3e25517e-c96a-432b-8d9e-41e982489527
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151053Z
|
||||
entryCSN: 20190308151053.951913Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151053Z
|
||||
|
||||
dn: ou=people,ou=huwi,ou=fachschaften,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 9ab93c6e-dba9-4fee-ab0b-cee0d71d22eb
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151103Z
|
||||
entryCSN: 20190308151103.393832Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151103Z
|
||||
|
||||
dn: ou=groups,ou=huwi,ou=fachschaften,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 0ba8cd04-a16e-4b71-8a06-012acca6e616
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151111Z
|
||||
entryCSN: 20190308151111.466968Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151111Z
|
||||
|
||||
dn: ou=groups,ou=sowi,ou=fachschaften,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 01ba0ffa-c27e-4d34-b095-e11fea2c0ec3
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151120Z
|
||||
entryCSN: 20190308151120.191746Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151120Z
|
||||
|
||||
dn: ou=people,ou=sowi,ou=fachschaften,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: d7acd87f-233a-4f62-9167-58f5521f088d
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151202Z
|
||||
entryCSN: 20190308151202.926995Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151202Z
|
||||
|
||||
dn: ou=konvent,dc=stuve,dc=de
|
||||
ou: konvent
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 18a48b86-9eae-47c9-b011-25e80ecd158f
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151216Z
|
||||
entryCSN: 20190308151216.820348Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151216Z
|
||||
|
||||
dn: ou=buero,dc=stuve,dc=de
|
||||
ou: buero
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 087cbe57-4bba-4e55-a284-d1f484615a4a
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151225Z
|
||||
entryCSN: 20190308151225.311827Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151225Z
|
||||
|
||||
dn: ou=antifa,ou=referate,dc=stuve,dc=de
|
||||
ou: antifa
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 08ecc41d-9e51-4657-8851-6c8a5f8f23e3
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151248Z
|
||||
entryCSN: 20190308151248.255968Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151248Z
|
||||
|
||||
dn: ou=eltern,ou=referate,dc=stuve,dc=de
|
||||
ou: eltern
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: e003255b-5454-4cf7-8053-962c2601769d
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151317Z
|
||||
entryCSN: 20190308151317.211262Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151317Z
|
||||
|
||||
dn: ou=finanzen,ou=referate,dc=stuve,dc=de
|
||||
ou: finanzen
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 2b74f5de-ab8a-4608-a99e-5a149ea36570
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151329Z
|
||||
entryCSN: 20190308151329.584592Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151329Z
|
||||
|
||||
dn: ou=fub,ou=referate,dc=stuve,dc=de
|
||||
ou: fub
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 11971fc5-b3e4-49c8-bae9-b604e858f305
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151343Z
|
||||
entryCSN: 20190308151343.025690Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151343Z
|
||||
|
||||
dn: ou=gleichst,ou=referate,dc=stuve,dc=de
|
||||
ou: gleichst
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 3f6d727d-4bdc-4c62-96c7-7c2d3dedd051
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151408Z
|
||||
entryCSN: 20190308151408.707255Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151408Z
|
||||
|
||||
dn: ou=hiwi,ou=referate,dc=stuve,dc=de
|
||||
ou: hiwi
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 258e1d59-8c5e-45fa-96a5-fc40f1906023
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151523Z
|
||||
entryCSN: 20190308151523.534591Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151523Z
|
||||
|
||||
dn: ou=hopo,ou=referate,dc=stuve,dc=de
|
||||
ou: hopo
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 14149b67-9dc7-4027-85d7-8e326d41bc10
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151545Z
|
||||
entryCSN: 20190308151545.619621Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151545Z
|
||||
|
||||
dn: ou=internat,ou=referate,dc=stuve,dc=de
|
||||
ou: internat
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 80ee661c-936d-4f21-a6ca-82e8682cf2f7
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151553Z
|
||||
entryCSN: 20190308151553.966086Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151553Z
|
||||
|
||||
dn: ou=kontakt,ou=referate,dc=stuve,dc=de
|
||||
ou: kontakt
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: dae7e75f-884d-47c3-9903-0c7f7431b996
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151603Z
|
||||
entryCSN: 20190308151603.674307Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151603Z
|
||||
|
||||
dn: ou=leb,ou=referate,dc=stuve,dc=de
|
||||
ou: leb
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 79bd4174-9c03-40ff-a715-6c479e82848d
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151612Z
|
||||
entryCSN: 20190308151612.619451Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151612Z
|
||||
|
||||
dn: ou=oefik,ou=referate,dc=stuve,dc=de
|
||||
ou: oefik
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 51d3d7fb-0add-4376-8e3f-0ac9a82c43d2
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151620Z
|
||||
entryCSN: 20190308151620.873396Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151620Z
|
||||
|
||||
dn: ou=oeko,ou=referate,dc=stuve,dc=de
|
||||
ou: oeko
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: c17aa2eb-7d2c-454c-9daa-7513d65ecb7f
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151629Z
|
||||
entryCSN: 20190308151629.454122Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151629Z
|
||||
|
||||
dn: ou=qsl,ou=referate,dc=stuve,dc=de
|
||||
ou: qsl
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 2901402e-8900-4eb6-af90-99bc014c2f6c
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151639Z
|
||||
entryCSN: 20190308151639.476959Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151639Z
|
||||
|
||||
dn: ou=sport,ou=referate,dc=stuve,dc=de
|
||||
ou: sport
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: e4ea07c7-fa41-47a0-8c90-3e199b87730b
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151655Z
|
||||
entryCSN: 20190308151655.017391Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151655Z
|
||||
|
||||
dn: ou=studl,ou=referate,dc=stuve,dc=de
|
||||
ou: studl
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 28208579-d686-4920-8564-3c4242581fb0
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308151702Z
|
||||
entryCSN: 20190308151702.837221Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308151702Z
|
||||
|
||||
dn: ou=groups,ou=antifa,ou=referate,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 4436030d-cd29-4452-8d0e-fd527a653d0e
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165509Z
|
||||
entryCSN: 20190308165509.918365Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165509Z
|
||||
|
||||
dn: ou=people,ou=antifa,ou=referate,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: e7f177ce-68de-4d8e-b333-4fc78d5df9cf
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165540Z
|
||||
entryCSN: 20190308165540.404573Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165540Z
|
||||
|
||||
dn: ou=groups,ou=eltern,ou=referate,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 65951277-d266-471b-ac6b-1c94169d5173
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165548Z
|
||||
entryCSN: 20190308165548.902620Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165548Z
|
||||
|
||||
dn: ou=persons,ou=eltern,ou=referate,dc=stuve,dc=de
|
||||
ou: persons
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: bd5e244f-b32c-4b89-951a-3c7cbd02141b
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165557Z
|
||||
entryCSN: 20190308165557.792690Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165557Z
|
||||
|
||||
dn: ou=groups,ou=finanzen,ou=referate,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 7825f154-25d4-4a1b-92ea-428e975a0d39
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165605Z
|
||||
entryCSN: 20190308165605.974851Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165605Z
|
||||
|
||||
dn: ou=people,ou=finanzen,ou=referate,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 8c9f6c42-3c6b-44bd-b651-79ef268e7e70
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165615Z
|
||||
entryCSN: 20190308165615.289893Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165615Z
|
||||
|
||||
dn: ou=groups,ou=fub,ou=referate,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 576b724d-31f7-4c01-857c-f3f7538052d2
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165645Z
|
||||
entryCSN: 20190308165645.905381Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165645Z
|
||||
|
||||
dn: ou=people,ou=fub,ou=referate,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: b33444bb-2781-4a67-8775-5b1fe6653701
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165655Z
|
||||
entryCSN: 20190308165655.596151Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165655Z
|
||||
|
||||
dn: ou=groups,ou=gleichst,ou=referate,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: d3083a8d-fa6c-48da-baee-278bbaaf09ed
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165704Z
|
||||
entryCSN: 20190308165704.933643Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165704Z
|
||||
|
||||
dn: ou=people,ou=gleichst,ou=referate,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 03a1e7a1-8734-4cc1-a044-5a63319911e0
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165715Z
|
||||
entryCSN: 20190308165715.226073Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165715Z
|
||||
|
||||
dn: ou=groups,ou=hiwi,ou=referate,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 1fc3149f-1699-4cb8-99c9-2bd216e968c3
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165723Z
|
||||
entryCSN: 20190308165723.722063Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165723Z
|
||||
|
||||
dn: ou=people,ou=hiwi,ou=referate,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 1183abd5-7673-4e98-9dee-dc6d5f9e53de
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165736Z
|
||||
entryCSN: 20190308165736.451955Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165736Z
|
||||
|
||||
dn: ou=groups,ou=hopo,ou=referate,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 331f9a4e-fdd1-4803-b0af-2c931cc02079
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165745Z
|
||||
entryCSN: 20190308165745.603364Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165745Z
|
||||
|
||||
dn: ou=people,ou=hopo,ou=referate,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 73818bc6-e8f8-4068-875e-bf6737eeef7d
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165753Z
|
||||
entryCSN: 20190308165753.578618Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165753Z
|
||||
|
||||
dn: ou=groups,ou=internat,ou=referate,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 0d7f5fff-a7f2-477a-abf8-95c4177062a9
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165801Z
|
||||
entryCSN: 20190308165801.363911Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165801Z
|
||||
|
||||
dn: ou=people,ou=internat,ou=referate,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: ddcb256a-a5a7-41b1-9df1-c340558cfec0
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165809Z
|
||||
entryCSN: 20190308165809.274806Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165809Z
|
||||
|
||||
dn: ou=groups,ou=kontakt,ou=referate,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: b31a1dce-7dee-44bd-969a-29e89e0f35e7
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308165932Z
|
||||
entryCSN: 20190308165932.661973Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308165932Z
|
||||
|
||||
dn: ou=people,ou=kontakt,ou=referate,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: ec6c1e78-300e-4e9f-b20b-b256b35e6a3d
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308170030Z
|
||||
entryCSN: 20190308170030.076485Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308170030Z
|
||||
|
||||
dn: ou=groups,ou=leb,ou=referate,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: d87b886d-e1d4-4954-802f-dba22e1ef2bd
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308170051Z
|
||||
entryCSN: 20190308170051.084923Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308170051Z
|
||||
|
||||
dn: ou=people,ou=leb,ou=referate,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: d60f44d2-e9c4-4a61-8d25-f3afa3bfec5e
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308170100Z
|
||||
entryCSN: 20190308170100.839596Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308170100Z
|
||||
|
||||
dn: ou=groups,ou=oefik,ou=referate,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 53991485-9729-4e06-99b4-12492ebb8090
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308170203Z
|
||||
entryCSN: 20190308170203.472134Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308170203Z
|
||||
|
||||
dn: ou=people,ou=oefik,ou=referate,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 7e2f4bf6-bbac-4970-9bfc-79e5f79f0a76
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308170214Z
|
||||
entryCSN: 20190308170214.062681Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308170214Z
|
||||
|
||||
dn: ou=groups,ou=oeko,ou=referate,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: b3ec51b6-a508-47cf-b9f0-8f5efa14fa7a
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308170231Z
|
||||
entryCSN: 20190308170231.475822Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308170231Z
|
||||
|
||||
dn: ou=people,ou=oeko,ou=referate,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 3ac56231-39fd-4cfe-a8ea-4f51f3c072dd
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308170240Z
|
||||
entryCSN: 20190308170240.119534Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308170240Z
|
||||
|
||||
dn: ou=groups,ou=qsl,ou=referate,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: b636dfc4-b34f-424b-8df5-678a020fbc20
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308170249Z
|
||||
entryCSN: 20190308170249.734177Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308170249Z
|
||||
|
||||
dn: ou=people,ou=qsl,ou=referate,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: e62037ec-1f26-4eea-bdaf-e9a13a78ffed
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308170314Z
|
||||
entryCSN: 20190308170314.404681Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308170314Z
|
||||
|
||||
dn: ou=groups,ou=sport,ou=referate,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 96d9a626-b7ef-4945-87d5-913a96c7b414
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308170323Z
|
||||
entryCSN: 20190308170323.112989Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308170323Z
|
||||
|
||||
dn: ou=people,ou=sport,ou=referate,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: c6f11a84-7dd1-4cdc-8aca-55fc7f2e8f92
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308170330Z
|
||||
entryCSN: 20190308170330.492133Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308170330Z
|
||||
|
||||
dn: ou=groups,ou=studl,ou=referate,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 0673abdb-9a3c-4922-80a9-b8db496670c9
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308170338Z
|
||||
entryCSN: 20190308170338.748664Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308170338Z
|
||||
|
||||
dn: ou=people,ou=studl,ou=referate,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 5c65f108-b8fc-4689-ab5a-e69c165f85ff
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308170346Z
|
||||
entryCSN: 20190308170346.590474Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308170346Z
|
||||
|
||||
dn: ou=people,ou=buero,dc=stuve,dc=de
|
||||
ou: people
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 01412223-ac07-425d-97a1-de61333e07d4
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308194537Z
|
||||
entryCSN: 20190308194537.277783Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308194537Z
|
||||
|
||||
dn: ou=groups,ou=buero,dc=stuve,dc=de
|
||||
ou: groups
|
||||
objectClass: organizationalUnit
|
||||
objectClass: top
|
||||
structuralObjectClass: organizationalUnit
|
||||
entryUUID: 1f54e8b9-c636-4543-a4b1-1d93f4bb5e44
|
||||
creatorsName: cn=admin,dc=stuve,dc=de
|
||||
createTimestamp: 20190308194604Z
|
||||
entryCSN: 20190308194604.769724Z#000000#000#000000
|
||||
modifiersName: cn=admin,dc=stuve,dc=de
|
||||
modifyTimestamp: 20190308194604Z
|
||||
Reference in New Issue
Block a user