Add docker dev setup
This commit is contained in:
parent
e5537fefc8
commit
3c41d322b8
79
docker-compose.yml
Normal file
79
docker-compose.yml
Normal file
@ -0,0 +1,79 @@
|
|||||||
|
version: "3"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
pg_db:
|
||||||
|
internal: true
|
||||||
|
ldap_net:
|
||||||
|
internal: true
|
||||||
|
frontend_net:
|
||||||
|
external: false
|
||||||
|
|
||||||
|
|
||||||
|
services:
|
||||||
|
lama:
|
||||||
|
image: lama:0.1
|
||||||
|
build:
|
||||||
|
context: docker/lama
|
||||||
|
dockerfile: Dockerfile.dev
|
||||||
|
networks:
|
||||||
|
- frontend_net
|
||||||
|
- ldap_net
|
||||||
|
- pg_db
|
||||||
|
env_file:
|
||||||
|
- docker/lama/dev.env
|
||||||
|
volumes:
|
||||||
|
- ./src:/lama
|
||||||
|
labels:
|
||||||
|
- "traefik.port=80"
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.frontend.rule=Host:lama.localhost"
|
||||||
|
- "traefik.docker.network=frontend_net"
|
||||||
|
|
||||||
|
dblama:
|
||||||
|
image: postgres:11.2-alpine
|
||||||
|
networks:
|
||||||
|
- pg_db
|
||||||
|
volumes:
|
||||||
|
- ./db/pgdata/:/var/lib/postgresql/data/
|
||||||
|
env_file:
|
||||||
|
- docker/lama/dev.env
|
||||||
|
|
||||||
|
ldap:
|
||||||
|
image: docker.clkl.de/ldap/ladap:0.1
|
||||||
|
build:
|
||||||
|
context: docker/ldap
|
||||||
|
dockerfile: Dockerfile.ldap
|
||||||
|
env_file: docker/ldap/ldap.env
|
||||||
|
volumes:
|
||||||
|
- ./docker/ldap/data/var/:/var/lib/openldap/
|
||||||
|
networks:
|
||||||
|
- ldap_net
|
||||||
|
|
||||||
|
ldap_admin:
|
||||||
|
image: docker.clkl.de/ldap/admin:0.1
|
||||||
|
build:
|
||||||
|
context: docker/ldap
|
||||||
|
dockerfile: Dockerfile.admin
|
||||||
|
networks:
|
||||||
|
- ldap_net
|
||||||
|
- frontend_net
|
||||||
|
labels:
|
||||||
|
- "traefik.port=80"
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.frontend.rule=Host:ldap.localhost"
|
||||||
|
- "traefik.docker.network=frontend_net"
|
||||||
|
|
||||||
|
traefik:
|
||||||
|
image: traefik:v1.7.9-alpine
|
||||||
|
command: --api --docker --docker.watch --docker.exposedByDefault=false
|
||||||
|
ports:
|
||||||
|
- 80:80
|
||||||
|
volumes:
|
||||||
|
- /var/run/docker.sock:/var/run/docker.sock
|
||||||
|
networks:
|
||||||
|
- frontend_net
|
||||||
|
labels:
|
||||||
|
- "traefik.port=8080"
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.frontend.rule=Host:traefik.localhost"
|
||||||
|
- "traefik.docker.network=frontend_net"
|
||||||
12
docker/lama/Dockerfile.dev
Normal file
12
docker/lama/Dockerfile.dev
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
FROM alpine:3.9
|
||||||
|
ADD ["requirements.txt", "/requirements.txt"]
|
||||||
|
RUN apk upgrade --update && \
|
||||||
|
apk add --update python3 build-base openldap-dev python3-dev py3-psycopg2 && \
|
||||||
|
pip3 install -r /requirements.txt && rm /requirements.txt
|
||||||
|
WORKDIR /lama
|
||||||
|
EXPOSE 80
|
||||||
|
|
||||||
|
COPY entrypoint.sh /
|
||||||
|
#ENTRYPOINT ["python3", "manage.py"]
|
||||||
|
#CMD ["runserver", "0.0.0.0:80"]
|
||||||
|
CMD ["/entrypoint.sh"]
|
||||||
33
docker/lama/dev.env
Normal file
33
docker/lama/dev.env
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
DJANGO_SETTINGS_MODULE=core.docker_settings
|
||||||
|
DOMAIN=localhost
|
||||||
|
|
||||||
|
SITE_NAME=LAMa
|
||||||
|
|
||||||
|
SECRET_KEY=supersecret
|
||||||
|
ALLOWED_HOSTS=lama lama.localhost
|
||||||
|
|
||||||
|
DATABASE_HOST=dblama
|
||||||
|
DATABASE_PORT=5432
|
||||||
|
|
||||||
|
POSTGRES_USER=lama
|
||||||
|
POSTGRES_PASSWORD=secret
|
||||||
|
|
||||||
|
DEBUG=True
|
||||||
|
|
||||||
|
LDAP_SERVER_URI=ldap://ldap:389
|
||||||
|
LDAP_BIND_DN=cn=admin,dc=test,dc=de
|
||||||
|
LDAP_BIND_PASSWORD=secret
|
||||||
|
|
||||||
|
LDAP_USER_ENTRY=ou=dc=test,dc=de
|
||||||
|
LDAP_USER_SELECTOR=(cn=%(user)s)
|
||||||
|
|
||||||
|
LDAP_GROUP_ENTRY=dc=test,dc=de
|
||||||
|
LDAP_GROUP_SELECTOR=(objectClass=groupOfNames)
|
||||||
|
LDAP_GROUP_NAME_ATTR=cn
|
||||||
|
|
||||||
|
EMAIL_HOST=smtp.uni-bamberg.de
|
||||||
|
EMAIL_PORT=587
|
||||||
|
EMAIL_USE_TLS=False
|
||||||
|
EMAIL_USE_SSL=False
|
||||||
|
DEFAULT_FROM_EMAIL=
|
||||||
|
SERVER_EMAIL=
|
||||||
4
docker/lama/entrypoint.sh
Executable file
4
docker/lama/entrypoint.sh
Executable file
@ -0,0 +1,4 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
python3 /lama/manage.py makemigrations account_helper && \
|
||||||
|
python3 /lama/manage.py migrate && \
|
||||||
|
python3 /lama/manage.py runserver 0.0.0.0:80
|
||||||
5
docker/lama/requirements.txt
Normal file
5
docker/lama/requirements.txt
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
Django==2.1.7
|
||||||
|
python-ldap==3.2.0
|
||||||
|
django-auth-ldap==1.7.0
|
||||||
|
django-ldapdb==1.3.0
|
||||||
|
Jinja2==2.10
|
||||||
10
docker/ldap/Dockerfile.admin
Normal file
10
docker/ldap/Dockerfile.admin
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
FROM alpine:3.7
|
||||||
|
|
||||||
|
RUN apk add --update --no-cache phpldapadmin apache2 php5-apache2
|
||||||
|
COPY ./admin/httpd.conf /etc/apache2/httpd.conf
|
||||||
|
COPY ./admin/phpldapadmin_conf.php /etc/phpldapadmin/config.php
|
||||||
|
RUN sed -i 's!/run/apache2/httpd.pid!/tmp/apache2.pid!' /etc/apache2/conf.d/mpm.conf
|
||||||
|
|
||||||
|
EXPOSE 80
|
||||||
|
|
||||||
|
ENTRYPOINT ["/usr/sbin/httpd", "-D", "FOREGROUND"]
|
||||||
22
docker/ldap/Dockerfile.ldap
Normal file
22
docker/ldap/Dockerfile.ldap
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
FROM alpine:3.7
|
||||||
|
|
||||||
|
WORKDIR /
|
||||||
|
|
||||||
|
ENV dc=stuve
|
||||||
|
ENV dcr=test
|
||||||
|
COPY entrypoint.sh /
|
||||||
|
|
||||||
|
RUN apk add --update --no-cache openldap openldap-back-mdb openldap-overlay-ppolicy
|
||||||
|
RUN sed -i 's!/run/openldap/slapd.pid!/tmp/openladp.pid!' /etc/openldap/slapd.conf
|
||||||
|
RUN sed -i 's!/run/openldap/slapd.args!/tmp/openladp.args!' /etc/openldap/slapd.conf
|
||||||
|
|
||||||
|
ADD start.ldif /etc/openldap/start.ldif
|
||||||
|
RUN sed -i s/dc=$dc/dc=$dcr/g /etc/openldap/start.ldif
|
||||||
|
RUN sed -i s/dc:\ $dc/dc:\ $dcr/g /etc/openldap/start.ldif
|
||||||
|
ADD slapd.conf /etc/openldap/slapd.conf
|
||||||
|
RUN chown ldap:ldap -R /etc/openldap
|
||||||
|
RUN chown ldap:ldap -R /var/lib/openldap
|
||||||
|
|
||||||
|
EXPOSE 389
|
||||||
|
|
||||||
|
CMD ["/entrypoint.sh"]
|
||||||
10
docker/ldap/admin/Dockerfile
Normal file
10
docker/ldap/admin/Dockerfile
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
FROM alpine:3.7
|
||||||
|
|
||||||
|
RUN apk add --update --no-cache phpldapadmin apache2 php5-apache2
|
||||||
|
COPY ./httpd.conf /etc/apache2/httpd.conf
|
||||||
|
COPY ./phpldapadmin_conf.php /etc/phpldapadmin/config.php
|
||||||
|
RUN sed -i 's!/run/apache2/httpd.pid!/tmp/apache2.pid!' /etc/apache2/conf.d/mpm.conf
|
||||||
|
|
||||||
|
EXPOSE 80
|
||||||
|
|
||||||
|
ENTRYPOINT ["/usr/sbin/httpd", "-D", "FOREGROUND"]
|
||||||
107
docker/ldap/admin/httpd.conf
Normal file
107
docker/ldap/admin/httpd.conf
Normal file
@ -0,0 +1,107 @@
|
|||||||
|
#
|
||||||
|
# ServerTokens
|
||||||
|
# This directive configures what you return as the Server HTTP response
|
||||||
|
# Header. The default is 'Full' which sends information about the OS-Type
|
||||||
|
# and compiled in modules.
|
||||||
|
# Set to one of: Full | OS | Minor | Minimal | Major | Prod
|
||||||
|
# where Full conveys the most information, and Prod the least.
|
||||||
|
#
|
||||||
|
ServerTokens OS
|
||||||
|
|
||||||
|
ServerRoot /var/www
|
||||||
|
Listen 80
|
||||||
|
|
||||||
|
LoadModule mpm_prefork_module modules/mod_mpm_prefork.so
|
||||||
|
LoadModule authn_file_module modules/mod_authn_file.so
|
||||||
|
LoadModule authn_core_module modules/mod_authn_core.so
|
||||||
|
LoadModule authz_host_module modules/mod_authz_host.so
|
||||||
|
LoadModule authz_groupfile_module modules/mod_authz_groupfile.so
|
||||||
|
LoadModule authz_user_module modules/mod_authz_user.so
|
||||||
|
LoadModule authz_core_module modules/mod_authz_core.so
|
||||||
|
LoadModule access_compat_module modules/mod_access_compat.so
|
||||||
|
LoadModule auth_basic_module modules/mod_auth_basic.so
|
||||||
|
LoadModule reqtimeout_module modules/mod_reqtimeout.so
|
||||||
|
LoadModule filter_module modules/mod_filter.so
|
||||||
|
LoadModule mime_module modules/mod_mime.so
|
||||||
|
LoadModule log_config_module modules/mod_log_config.so
|
||||||
|
LoadModule env_module modules/mod_env.so
|
||||||
|
LoadModule headers_module modules/mod_headers.so
|
||||||
|
LoadModule setenvif_module modules/mod_setenvif.so
|
||||||
|
LoadModule version_module modules/mod_version.so
|
||||||
|
LoadModule unixd_module modules/mod_unixd.so
|
||||||
|
LoadModule status_module modules/mod_status.so
|
||||||
|
LoadModule autoindex_module modules/mod_autoindex.so
|
||||||
|
LoadModule dir_module modules/mod_dir.so
|
||||||
|
LoadModule alias_module modules/mod_alias.so
|
||||||
|
LoadModule negotiation_module modules/mod_negotiation.so
|
||||||
|
|
||||||
|
<IfModule unixd_module>
|
||||||
|
User apache
|
||||||
|
Group apache
|
||||||
|
</IfModule>
|
||||||
|
ServerAdmin you@example.com
|
||||||
|
ServerSignature On
|
||||||
|
|
||||||
|
<Directory />
|
||||||
|
AllowOverride none
|
||||||
|
Require all denied
|
||||||
|
</Directory>
|
||||||
|
|
||||||
|
DocumentRoot "/usr/share/webapps/phpldapadmin/"
|
||||||
|
<Directory "/usr/share/webapps/phpldapadmin/">
|
||||||
|
Options Indexes FollowSymLinks
|
||||||
|
AllowOverride All
|
||||||
|
Require all granted
|
||||||
|
</Directory>
|
||||||
|
|
||||||
|
<IfModule dir_module>
|
||||||
|
DirectoryIndex index.html
|
||||||
|
</IfModule>
|
||||||
|
|
||||||
|
#
|
||||||
|
# The following lines prevent .htaccess and .htpasswd files from being
|
||||||
|
# viewed by Web clients.
|
||||||
|
#
|
||||||
|
<Files ".ht*">
|
||||||
|
Require all denied
|
||||||
|
</Files>
|
||||||
|
|
||||||
|
ErrorLog logs/error.log
|
||||||
|
LogLevel warn
|
||||||
|
|
||||||
|
<IfModule log_config_module>
|
||||||
|
LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined
|
||||||
|
LogFormat "%h %l %u %t \"%r\" %>s %b" common
|
||||||
|
|
||||||
|
<IfModule logio_module>
|
||||||
|
# You need to enable mod_logio.c to use %I and %O
|
||||||
|
LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio
|
||||||
|
</IfModule>
|
||||||
|
CustomLog logs/access.log combined
|
||||||
|
</IfModule>
|
||||||
|
|
||||||
|
<IfModule alias_module>
|
||||||
|
ScriptAlias /cgi-bin/ "/var/www/localhost/cgi-bin/"
|
||||||
|
</IfModule>
|
||||||
|
|
||||||
|
<Directory "/var/www/localhost/cgi-bin">
|
||||||
|
AllowOverride None
|
||||||
|
Options None
|
||||||
|
Require all granted
|
||||||
|
</Directory>
|
||||||
|
|
||||||
|
<IfModule headers_module>
|
||||||
|
RequestHeader unset Proxy early
|
||||||
|
</IfModule>
|
||||||
|
|
||||||
|
<IfModule mime_module>
|
||||||
|
TypesConfig /etc/apache2/mime.types
|
||||||
|
AddType application/x-compress .Z
|
||||||
|
AddType application/x-gzip .gz .tgz
|
||||||
|
</IfModule>
|
||||||
|
|
||||||
|
<IfModule mime_magic_module>
|
||||||
|
MIMEMagicFile /etc/apache2/magic
|
||||||
|
</IfModule>
|
||||||
|
IncludeOptional /etc/apache2/conf.d/*.conf
|
||||||
|
|
||||||
577
docker/ldap/admin/phpldapadmin_conf.php
Normal file
577
docker/ldap/admin/phpldapadmin_conf.php
Normal file
@ -0,0 +1,577 @@
|
|||||||
|
<?php
|
||||||
|
/** NOTE **
|
||||||
|
** Make sure that <?php is the FIRST line of this file!
|
||||||
|
** IE: There should NOT be any blank lines or spaces BEFORE <?php
|
||||||
|
**/
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The phpLDAPadmin config file
|
||||||
|
* See: http://phpldapadmin.sourceforge.net/wiki/index.php/Config.php
|
||||||
|
*
|
||||||
|
* This is where you can customise some of the phpLDAPadmin defaults
|
||||||
|
* that are defined in config_default.php.
|
||||||
|
*
|
||||||
|
* To override a default, use the $config->custom variable to do so.
|
||||||
|
* For example, the default for defining the language in config_default.php
|
||||||
|
*
|
||||||
|
* $this->default->appearance['language'] = array(
|
||||||
|
* 'desc'=>'Language',
|
||||||
|
* 'default'=>'auto');
|
||||||
|
*
|
||||||
|
* to override this, use $config->custom->appearance['language'] = 'en_EN';
|
||||||
|
*
|
||||||
|
* This file is also used to configure your LDAP server connections.
|
||||||
|
*
|
||||||
|
* You must specify at least one LDAP server there. You may add
|
||||||
|
* as many as you like. You can also specify your language, and
|
||||||
|
* many other options.
|
||||||
|
*
|
||||||
|
* NOTE: Commented out values in this file prefixed by //, represent the
|
||||||
|
* defaults that have been defined in config_default.php.
|
||||||
|
* Commented out values prefixed by #, dont reflect their default value, you can
|
||||||
|
* check config_default.php if you want to see what the default is.
|
||||||
|
*
|
||||||
|
* DONT change config_default.php, you changes will be lost by the next release
|
||||||
|
* of PLA. Instead change this file - as it will NOT be replaced by a new
|
||||||
|
* version of phpLDAPadmin.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/*********************************************
|
||||||
|
* Useful important configuration overrides *
|
||||||
|
*********************************************/
|
||||||
|
|
||||||
|
/* If you are asked to put PLA in debug mode, this is how you do it: */
|
||||||
|
# $config->custom->debug['level'] = 255;
|
||||||
|
# $config->custom->debug['syslog'] = true;
|
||||||
|
# $config->custom->debug['file'] = '/tmp/pla_debug.log';
|
||||||
|
|
||||||
|
/* phpLDAPadmin can encrypt the content of sensitive cookies if you set this
|
||||||
|
to a big random string. */
|
||||||
|
// $config->custom->session['blowfish'] = null;
|
||||||
|
|
||||||
|
/* If your auth_type is http, you can override your HTTP Authentication Realm. */
|
||||||
|
// $config->custom->session['http_realm'] = sprintf('%s %s',app_name(),'login');
|
||||||
|
|
||||||
|
/* The language setting. If you set this to 'auto', phpLDAPadmin will attempt
|
||||||
|
to determine your language automatically.
|
||||||
|
If PLA doesnt show (all) strings in your language, then you can do some
|
||||||
|
translation at http://translations.launchpad.net/phpldapadmin and download
|
||||||
|
the translation files, replacing those provided with PLA.
|
||||||
|
(We'll pick up the translations before making the next release too!) */
|
||||||
|
// $config->custom->appearance['language'] = 'auto';
|
||||||
|
|
||||||
|
/* The temporary storage directory where we will put jpegPhoto data
|
||||||
|
This directory must be readable and writable by your web server. */
|
||||||
|
// $config->custom->jpeg['tmpdir'] = '/tmp'; // Example for Unix systems
|
||||||
|
# $config->custom->jpeg['tmpdir'] = 'c:\\temp'; // Example for Windows systems
|
||||||
|
|
||||||
|
/* Set this to (bool)true if you do NOT want a random salt used when
|
||||||
|
calling crypt(). Instead, use the first two letters of the user's
|
||||||
|
password. This is insecure but unfortunately needed for some older
|
||||||
|
environments. */
|
||||||
|
# $config->custom->password['no_random_crypt_salt'] = true;
|
||||||
|
|
||||||
|
/* PHP script timeout control. If php runs longer than this many seconds then
|
||||||
|
PHP will stop with an Maximum Execution time error. Increase this value from
|
||||||
|
the default if queries to your LDAP server are slow. The default is either
|
||||||
|
30 seconds or the setting of max_exection_time if this is null. */
|
||||||
|
// $config->custom->session['timelimit'] = 30;
|
||||||
|
|
||||||
|
/* Our local timezone
|
||||||
|
This is to make sure that when we ask the system for the current time, we
|
||||||
|
get the right local time. If this is not set, all time() calculations will
|
||||||
|
assume UTC if you have not set PHP date.timezone. */
|
||||||
|
// $config->custom->appearance['timezone'] = null;
|
||||||
|
# $config->custom->appearance['timezone'] = 'Australia/Melbourne';
|
||||||
|
|
||||||
|
/*********************************************
|
||||||
|
* Commands *
|
||||||
|
*********************************************/
|
||||||
|
|
||||||
|
/* Command availability ; if you don't authorize a command the command
|
||||||
|
links will not be shown and the command action will not be permitted.
|
||||||
|
For better security, set also ACL in your ldap directory. */
|
||||||
|
/*
|
||||||
|
$config->custom->commands['cmd'] = array(
|
||||||
|
'entry_internal_attributes_show' => true,
|
||||||
|
'entry_refresh' => true,
|
||||||
|
'oslinks' => true,
|
||||||
|
'switch_template' => true
|
||||||
|
);
|
||||||
|
|
||||||
|
$config->custom->commands['script'] = array(
|
||||||
|
'add_attr_form' => true,
|
||||||
|
'add_oclass_form' => true,
|
||||||
|
'add_value_form' => true,
|
||||||
|
'collapse' => true,
|
||||||
|
'compare' => true,
|
||||||
|
'compare_form' => true,
|
||||||
|
'copy' => true,
|
||||||
|
'copy_form' => true,
|
||||||
|
'create' => true,
|
||||||
|
'create_confirm' => true,
|
||||||
|
'delete' => true,
|
||||||
|
'delete_attr' => true,
|
||||||
|
'delete_form' => true,
|
||||||
|
'draw_tree_node' => true,
|
||||||
|
'expand' => true,
|
||||||
|
'export' => true,
|
||||||
|
'export_form' => true,
|
||||||
|
'import' => true,
|
||||||
|
'import_form' => true,
|
||||||
|
'login' => true,
|
||||||
|
'logout' => true,
|
||||||
|
'login_form' => true,
|
||||||
|
'mass_delete' => true,
|
||||||
|
'mass_edit' => true,
|
||||||
|
'mass_update' => true,
|
||||||
|
'modify_member_form' => true,
|
||||||
|
'monitor' => true,
|
||||||
|
'purge_cache' => true,
|
||||||
|
'query_engine' => true,
|
||||||
|
'rename' => true,
|
||||||
|
'rename_form' => true,
|
||||||
|
'rdelete' => true,
|
||||||
|
'refresh' => true,
|
||||||
|
'schema' => true,
|
||||||
|
'server_info' => true,
|
||||||
|
'show_cache' => true,
|
||||||
|
'template_engine' => true,
|
||||||
|
'update_confirm' => true,
|
||||||
|
'update' => true
|
||||||
|
);
|
||||||
|
*/
|
||||||
|
|
||||||
|
/*********************************************
|
||||||
|
* Appearance *
|
||||||
|
*********************************************/
|
||||||
|
|
||||||
|
/* If you want to choose the appearance of the tree, specify a class name which
|
||||||
|
inherits from the Tree class. */
|
||||||
|
// $config->custom->appearance['tree'] = 'AJAXTree';
|
||||||
|
# $config->custom->appearance['tree'] = 'HTMLTree';
|
||||||
|
|
||||||
|
/* Just show your custom templates. */
|
||||||
|
// $config->custom->appearance['custom_templates_only'] = false;
|
||||||
|
|
||||||
|
/* Disable the default template. */
|
||||||
|
// $config->custom->appearance['disable_default_template'] = false;
|
||||||
|
|
||||||
|
/* Hide the warnings for invalid objectClasses/attributes in templates. */
|
||||||
|
// $config->custom->appearance['hide_template_warning'] = false;
|
||||||
|
|
||||||
|
/* Set to true if you would like to hide header and footer parts. */
|
||||||
|
// $config->custom->appearance['minimalMode'] = false;
|
||||||
|
|
||||||
|
/* Configure what objects are shown in left hand tree */
|
||||||
|
// $config->custom->appearance['tree_filter'] = '(objectclass=*)';
|
||||||
|
|
||||||
|
/* The height and width of the tree. If these values are not set, then
|
||||||
|
no tree scroll bars are provided. */
|
||||||
|
// $config->custom->appearance['tree_height'] = null;
|
||||||
|
# $config->custom->appearance['tree_height'] = 600;
|
||||||
|
// $config->custom->appearance['tree_width'] = null;
|
||||||
|
# $config->custom->appearance['tree_width'] = 250;
|
||||||
|
|
||||||
|
/* Confirm create and update operations, allowing you to review the changes
|
||||||
|
and optionally skip attributes during the create/update operation. */
|
||||||
|
// $config->custom->confirm['create'] = true;
|
||||||
|
// $config->custom->confirm['update'] = true;
|
||||||
|
|
||||||
|
/* Confirm copy operations, and treat them like create operations. This allows
|
||||||
|
you to edit the attributes (thus changing any that might conflict with
|
||||||
|
uniqueness) before creating the new entry. */
|
||||||
|
// $config->custom->confirm['copy'] = true;
|
||||||
|
|
||||||
|
/*********************************************
|
||||||
|
* User-friendly attribute translation *
|
||||||
|
*********************************************/
|
||||||
|
|
||||||
|
/* Use this array to map attribute names to user friendly names. For example, if
|
||||||
|
you don't want to see "facsimileTelephoneNumber" but rather "Fax". */
|
||||||
|
// $config->custom->appearance['friendly_attrs'] = array();
|
||||||
|
$config->custom->appearance['friendly_attrs'] = array(
|
||||||
|
'facsimileTelephoneNumber' => 'Fax',
|
||||||
|
'gid' => 'Group',
|
||||||
|
'mail' => 'Email',
|
||||||
|
'telephoneNumber' => 'Telephone',
|
||||||
|
'uid' => 'User Name',
|
||||||
|
'userPassword' => 'Password'
|
||||||
|
);
|
||||||
|
|
||||||
|
/*********************************************
|
||||||
|
* Hidden attributes *
|
||||||
|
*********************************************/
|
||||||
|
|
||||||
|
/* You may want to hide certain attributes from being edited. If you want to
|
||||||
|
hide attributes from the user, you should use your LDAP servers ACLs.
|
||||||
|
NOTE: The user must be able to read the hide_attrs_exempt entry to be
|
||||||
|
excluded. */
|
||||||
|
// $config->custom->appearance['hide_attrs'] = array();
|
||||||
|
# $config->custom->appearance['hide_attrs'] = array('objectClass');
|
||||||
|
|
||||||
|
/* Members of this list will be exempt from the hidden attributes. */
|
||||||
|
// $config->custom->appearance['hide_attrs_exempt'] = null;
|
||||||
|
# $config->custom->appearance['hide_attrs_exempt'] = 'cn=PLA UnHide,ou=Groups,c=AU';
|
||||||
|
|
||||||
|
/*********************************************
|
||||||
|
* Read-only attributes *
|
||||||
|
*********************************************/
|
||||||
|
|
||||||
|
/* You may want to phpLDAPadmin to display certain attributes as read only,
|
||||||
|
meaning that users will not be presented a form for modifying those
|
||||||
|
attributes, and they will not be allowed to be modified on the "back-end"
|
||||||
|
either. You may configure this list here:
|
||||||
|
NOTE: The user must be able to read the readonly_attrs_exempt entry to be
|
||||||
|
excluded. */
|
||||||
|
// $config->custom->appearance['readonly_attrs'] = array();
|
||||||
|
|
||||||
|
/* Members of this list will be exempt from the readonly attributes. */
|
||||||
|
// $config->custom->appearance['readonly_attrs_exempt'] = null;
|
||||||
|
# $config->custom->appearance['readonly_attrs_exempt'] = 'cn=PLA ReadWrite,ou=Groups,c=AU';
|
||||||
|
|
||||||
|
/*********************************************
|
||||||
|
* Group attributes *
|
||||||
|
*********************************************/
|
||||||
|
|
||||||
|
/* Add "modify group members" link to the attribute. */
|
||||||
|
// $config->custom->modify_member['groupattr'] = array('member','uniqueMember','memberUid');
|
||||||
|
|
||||||
|
/* Configure filter for member search. This only applies to "modify group members" feature */
|
||||||
|
// $config->custom->modify_member['filter'] = '(objectclass=Person)';
|
||||||
|
|
||||||
|
/* Attribute that is added to the group member attribute. */
|
||||||
|
// $config->custom->modify_member['attr'] = 'dn';
|
||||||
|
|
||||||
|
/* For Posix attributes */
|
||||||
|
// $config->custom->modify_member['posixattr'] = 'uid';
|
||||||
|
// $config->custom->modify_member['posixfilter'] = '(uid=*)';
|
||||||
|
// $config->custom->modify_member['posixgroupattr'] = 'memberUid';
|
||||||
|
|
||||||
|
/*********************************************
|
||||||
|
* Support for attrs display order *
|
||||||
|
*********************************************/
|
||||||
|
|
||||||
|
/* Use this array if you want to have your attributes displayed in a specific
|
||||||
|
order. You can use default attribute names or their fridenly names.
|
||||||
|
For example, "sn" will be displayed right after "givenName". All the other
|
||||||
|
attributes that are not specified in this array will be displayed after in
|
||||||
|
alphabetical order. */
|
||||||
|
// $config->custom->appearance['attr_display_order'] = array();
|
||||||
|
# $config->custom->appearance['attr_display_order'] = array(
|
||||||
|
# 'givenName',
|
||||||
|
# 'sn',
|
||||||
|
# 'cn',
|
||||||
|
# 'displayName',
|
||||||
|
# 'uid',
|
||||||
|
# 'uidNumber',
|
||||||
|
# 'gidNumber',
|
||||||
|
# 'homeDirectory',
|
||||||
|
# 'mail',
|
||||||
|
# 'userPassword'
|
||||||
|
# );
|
||||||
|
|
||||||
|
/*********************************************
|
||||||
|
* Define your LDAP servers in this section *
|
||||||
|
*********************************************/
|
||||||
|
|
||||||
|
$servers = new Datastore();
|
||||||
|
|
||||||
|
/* $servers->NewServer('ldap_pla') must be called before each new LDAP server
|
||||||
|
declaration. */
|
||||||
|
$servers->newServer('ldap_pla');
|
||||||
|
|
||||||
|
/* A convenient name that will appear in the tree viewer and throughout
|
||||||
|
phpLDAPadmin to identify this LDAP server to users. */
|
||||||
|
$servers->setValue('server','name','Test LDAP Server');
|
||||||
|
|
||||||
|
/* Examples:
|
||||||
|
'ldap.example.com',
|
||||||
|
'ldaps://ldap.example.com/',
|
||||||
|
'ldapi://%2fusr%local%2fvar%2frun%2fldapi'
|
||||||
|
(Unix socket at /usr/local/var/run/ldap) */
|
||||||
|
$servers->setValue('server','host','ldap');
|
||||||
|
|
||||||
|
/* The port your LDAP server listens on (no quotes). 389 is standard. */
|
||||||
|
$servers->setValue('server','port',389);
|
||||||
|
|
||||||
|
/* Array of base DNs of your LDAP server. Leave this blank to have phpLDAPadmin
|
||||||
|
auto-detect it for you. */
|
||||||
|
$servers->setValue('server','base',array('dc=test,dc=de'));
|
||||||
|
|
||||||
|
/* Five options for auth_type:
|
||||||
|
1. 'cookie': you will login via a web form, and a client-side cookie will
|
||||||
|
store your login dn and password.
|
||||||
|
2. 'session': same as cookie but your login dn and password are stored on the
|
||||||
|
web server in a persistent session variable.
|
||||||
|
3. 'http': same as session but your login dn and password are retrieved via
|
||||||
|
HTTP authentication.
|
||||||
|
4. 'config': specify your login dn and password here in this config file. No
|
||||||
|
login will be required to use phpLDAPadmin for this server.
|
||||||
|
5. 'sasl': login will be taken from the webserver's kerberos authentication.
|
||||||
|
Currently only GSSAPI has been tested (using mod_auth_kerb).
|
||||||
|
|
||||||
|
Choose wisely to protect your authentication information appropriately for
|
||||||
|
your situation. If you choose 'cookie', your cookie contents will be
|
||||||
|
encrypted using blowfish and the secret your specify above as
|
||||||
|
session['blowfish']. */
|
||||||
|
// $servers->setValue('login','auth_type','session');
|
||||||
|
|
||||||
|
/* The DN of the user for phpLDAPadmin to bind with. For anonymous binds or
|
||||||
|
'cookie','session' or 'sasl' auth_types, LEAVE THE LOGIN_DN AND LOGIN_PASS
|
||||||
|
BLANK. If you specify a login_attr in conjunction with a cookie or session
|
||||||
|
auth_type, then you can also specify the bind_id/bind_pass here for searching
|
||||||
|
the directory for users (ie, if your LDAP server does not allow anonymous
|
||||||
|
binds. */
|
||||||
|
// $servers->setValue('login','bind_id','');
|
||||||
|
$servers->setValue('login','bind_id','cn=admin,dc=test,dc=de');
|
||||||
|
|
||||||
|
/* Your LDAP password. If you specified an empty bind_id above, this MUST also
|
||||||
|
be blank. */
|
||||||
|
// $servers->setValue('login','bind_pass','');
|
||||||
|
# $servers->setValue('login','bind_pass','secret');
|
||||||
|
|
||||||
|
/* Use TLS (Transport Layer Security) to connect to the LDAP server. */
|
||||||
|
// $servers->setValue('server','tls',false);
|
||||||
|
|
||||||
|
/************************************
|
||||||
|
* SASL Authentication *
|
||||||
|
************************************/
|
||||||
|
|
||||||
|
/* Enable SASL authentication LDAP SASL authentication requires PHP 5.x
|
||||||
|
configured with --with-ldap-sasl=DIR. If this option is disabled (ie, set to
|
||||||
|
false), then all other sasl options are ignored. */
|
||||||
|
// $servers->setValue('login','auth_type','sasl');
|
||||||
|
|
||||||
|
/* SASL auth mechanism */
|
||||||
|
// $servers->setValue('sasl','mech','GSSAPI');
|
||||||
|
|
||||||
|
/* SASL authentication realm name */
|
||||||
|
// $servers->setValue('sasl','realm','');
|
||||||
|
# $servers->setValue('sasl','realm','EXAMPLE.COM');
|
||||||
|
|
||||||
|
/* SASL authorization ID name
|
||||||
|
If this option is undefined, authorization id will be computed from bind DN,
|
||||||
|
using authz_id_regex and authz_id_replacement. */
|
||||||
|
// $servers->setValue('sasl','authz_id', null);
|
||||||
|
|
||||||
|
/* SASL authorization id regex and replacement
|
||||||
|
When authz_id property is not set (default), phpLDAPAdmin will try to
|
||||||
|
figure out authorization id by itself from bind distinguished name (DN).
|
||||||
|
|
||||||
|
This procedure is done by calling preg_replace() php function in the
|
||||||
|
following way:
|
||||||
|
|
||||||
|
$authz_id = preg_replace($sasl_authz_id_regex,$sasl_authz_id_replacement,
|
||||||
|
$bind_dn);
|
||||||
|
|
||||||
|
For info about pcre regexes, see:
|
||||||
|
- pcre(3), perlre(3)
|
||||||
|
- http://www.php.net/preg_replace */
|
||||||
|
// $servers->setValue('sasl','authz_id_regex',null);
|
||||||
|
// $servers->setValue('sasl','authz_id_replacement',null);
|
||||||
|
# $servers->setValue('sasl','authz_id_regex','/^uid=([^,]+)(.+)/i');
|
||||||
|
# $servers->setValue('sasl','authz_id_replacement','$1');
|
||||||
|
|
||||||
|
/* SASL auth security props.
|
||||||
|
See http://beepcore-tcl.sourceforge.net/tclsasl.html#anchor5 for explanation. */
|
||||||
|
// $servers->setValue('sasl','props',null);
|
||||||
|
|
||||||
|
/* Default password hashing algorithm. One of md5, ssha, sha, md5crpyt, smd5,
|
||||||
|
blowfish, crypt or leave blank for now default algorithm. */
|
||||||
|
// $servers->setValue('appearance','password_hash','md5');
|
||||||
|
|
||||||
|
/* If you specified 'cookie' or 'session' as the auth_type above, you can
|
||||||
|
optionally specify here an attribute to use when logging in. If you enter
|
||||||
|
'uid' and login as 'dsmith', phpLDAPadmin will search for (uid=dsmith)
|
||||||
|
and log in as that user.
|
||||||
|
Leave blank or specify 'dn' to use full DN for logging in. Note also that if
|
||||||
|
your LDAP server requires you to login to perform searches, you can enter the
|
||||||
|
DN to use when searching in 'bind_id' and 'bind_pass' above. */
|
||||||
|
// $servers->setValue('login','attr','dn');
|
||||||
|
|
||||||
|
/* Base DNs to used for logins. If this value is not set, then the LDAP server
|
||||||
|
Base DNs are used. */
|
||||||
|
// $servers->setValue('login','base',array());
|
||||||
|
|
||||||
|
/* If 'login,attr' is used above such that phpLDAPadmin will search for your DN
|
||||||
|
at login, you may restrict the search to a specific objectClasses. EG, set this
|
||||||
|
to array('posixAccount') or array('inetOrgPerson',..), depending upon your
|
||||||
|
setup. */
|
||||||
|
// $servers->setValue('login','class',array());
|
||||||
|
|
||||||
|
/* If you specified something different from 'dn', for example 'uid', as the
|
||||||
|
login_attr above, you can optionally specify here to fall back to
|
||||||
|
authentication with dn.
|
||||||
|
This is useful, when users should be able to log in with their uid, but
|
||||||
|
the ldap administrator wants to log in with his root-dn, that does not
|
||||||
|
necessarily have the uid attribute.
|
||||||
|
When using this feature, login_class is ignored. */
|
||||||
|
// $servers->setValue('login','fallback_dn',false);
|
||||||
|
|
||||||
|
/* Specify true If you want phpLDAPadmin to not display or permit any
|
||||||
|
modification to the LDAP server. */
|
||||||
|
// $servers->setValue('server','read_only',false);
|
||||||
|
|
||||||
|
/* Specify false if you do not want phpLDAPadmin to draw the 'Create new' links
|
||||||
|
in the tree viewer. */
|
||||||
|
// $servers->setValue('appearance','show_create',true);
|
||||||
|
|
||||||
|
/* Set to true if you would like to initially open the first level of each tree. */
|
||||||
|
// $servers->setValue('appearance','open_tree',false);
|
||||||
|
|
||||||
|
/* This feature allows phpLDAPadmin to automatically determine the next
|
||||||
|
available uidNumber for a new entry. */
|
||||||
|
// $servers->setValue('auto_number','enable',true);
|
||||||
|
|
||||||
|
/* The mechanism to use when finding the next available uidNumber. Two possible
|
||||||
|
values: 'uidpool' or 'search'.
|
||||||
|
The 'uidpool' mechanism uses an existing uidPool entry in your LDAP server to
|
||||||
|
blindly lookup the next available uidNumber. The 'search' mechanism searches
|
||||||
|
for entries with a uidNumber value and finds the first available uidNumber
|
||||||
|
(slower). */
|
||||||
|
// $servers->setValue('auto_number','mechanism','search');
|
||||||
|
|
||||||
|
/* The DN of the search base when the 'search' mechanism is used above. */
|
||||||
|
# $servers->setValue('auto_number','search_base','ou=People,dc=example,dc=com');
|
||||||
|
|
||||||
|
/* The minimum number to use when searching for the next available number
|
||||||
|
(only when 'search' is used for auto_number. */
|
||||||
|
// $servers->setValue('auto_number','min',array('uidNumber'=>1000,'gidNumber'=>500));
|
||||||
|
|
||||||
|
/* If you set this, then phpldapadmin will bind to LDAP with this user ID when
|
||||||
|
searching for the uidnumber. The idea is, this user id would have full
|
||||||
|
(readonly) access to uidnumber in your ldap directory (the logged in user
|
||||||
|
may not), so that you can be guaranteed to get a unique uidnumber for your
|
||||||
|
directory. */
|
||||||
|
// $servers->setValue('auto_number','dn',null);
|
||||||
|
|
||||||
|
/* The password for the dn above. */
|
||||||
|
// $servers->setValue('auto_number','pass',null);
|
||||||
|
|
||||||
|
/* Enable anonymous bind login. */
|
||||||
|
// $servers->setValue('login','anon_bind',true);
|
||||||
|
|
||||||
|
/* Use customized page with prefix when available. */
|
||||||
|
# $servers->setValue('custom','pages_prefix','custom_');
|
||||||
|
|
||||||
|
/* If you set this, then only these DNs are allowed to log in. This array can
|
||||||
|
contain individual users, groups or ldap search filter(s). Keep in mind that
|
||||||
|
the user has not authenticated yet, so this will be an anonymous search to
|
||||||
|
the LDAP server, so make your ACLs allow these searches to return results! */
|
||||||
|
# $servers->setValue('login','allowed_dns',array(
|
||||||
|
# 'uid=stran,ou=People,dc=example,dc=com',
|
||||||
|
# '(&(gidNumber=811)(objectClass=groupOfNames))',
|
||||||
|
# '(|(uidNumber=200)(uidNumber=201))',
|
||||||
|
# 'cn=callcenter,ou=Group,dc=example,dc=com'));
|
||||||
|
|
||||||
|
/* Set this if you dont want this LDAP server to show in the tree */
|
||||||
|
// $servers->setValue('server','visible',true);
|
||||||
|
|
||||||
|
/* Set this if you want to hide the base DNs that dont exist instead of
|
||||||
|
displaying the message "The base entry doesnt exist, create it?"
|
||||||
|
// $servers->setValue('server','hide_noaccess_base',false);
|
||||||
|
# $servers->setValue('server','hide_noaccess_base',true);
|
||||||
|
|
||||||
|
/* This is the time out value in minutes for the server. After as many minutes
|
||||||
|
of inactivity you will be automatically logged out. If not set, the default
|
||||||
|
value will be ( session_cache_expire()-1 ) */
|
||||||
|
# $servers->setValue('login','timeout',30);
|
||||||
|
|
||||||
|
/* Set this if you want phpldapadmin to perform rename operation on entry which
|
||||||
|
has children. Certain servers are known to allow it, certain are not. */
|
||||||
|
// $servers->setValue('server','branch_rename',false);
|
||||||
|
|
||||||
|
/* If you set this, then phpldapadmin will show these attributes as
|
||||||
|
internal attributes, even if they are not defined in your schema. */
|
||||||
|
// $servers->setValue('server','custom_sys_attrs',array(''));
|
||||||
|
# $servers->setValue('server','custom_sys_attrs',array('passwordExpirationTime','passwordAllowChangeTime'));
|
||||||
|
|
||||||
|
/* If you set this, then phpldapadmin will show these attributes on
|
||||||
|
objects, even if they are not defined in your schema. */
|
||||||
|
// $servers->setValue('server','custom_attrs',array(''));
|
||||||
|
# $servers->setValue('server','custom_attrs',array('nsRoleDN','nsRole','nsAccountLock'));
|
||||||
|
|
||||||
|
/* These attributes will be forced to MAY attributes and become option in the
|
||||||
|
templates. If they are not defined in the templates, then they wont appear
|
||||||
|
as per normal template processing. You may want to do this because your LDAP
|
||||||
|
server may automatically calculate a default value.
|
||||||
|
In Fedora Directory Server using the DNA Plugin one could ignore uidNumber,
|
||||||
|
gidNumber and sambaSID. */
|
||||||
|
// $servers->setValue('server','force_may',array(''));
|
||||||
|
# $servers->setValue('server','force_may',array('uidNumber','gidNumber','sambaSID'));
|
||||||
|
|
||||||
|
/*********************************************
|
||||||
|
* Unique attributes *
|
||||||
|
*********************************************/
|
||||||
|
|
||||||
|
/* You may want phpLDAPadmin to enforce some attributes to have unique values
|
||||||
|
(ie: not belong to other entries in your tree. This (together with
|
||||||
|
'unique','dn' and 'unique','pass' option will not let updates to
|
||||||
|
occur with other attributes have the same value. */
|
||||||
|
# $servers->setValue('unique','attrs',array('mail','uid','uidNumber'));
|
||||||
|
|
||||||
|
/* If you set this, then phpldapadmin will bind to LDAP with this user ID when
|
||||||
|
searching for attribute uniqueness. The idea is, this user id would have full
|
||||||
|
(readonly) access to your ldap directory (the logged in user may not), so
|
||||||
|
that you can be guaranteed to get a unique uidnumber for your directory. */
|
||||||
|
// $servers->setValue('unique','dn',null);
|
||||||
|
|
||||||
|
/* The password for the dn above. */
|
||||||
|
// $servers->setValue('unique','pass',null);
|
||||||
|
|
||||||
|
/**************************************************************************
|
||||||
|
* If you want to configure additional LDAP servers, do so below. *
|
||||||
|
* Remove the commented lines and use this section as a template for all *
|
||||||
|
* your other LDAP servers. *
|
||||||
|
**************************************************************************/
|
||||||
|
|
||||||
|
/*
|
||||||
|
$servers->newServer('ldap_pla');
|
||||||
|
$servers->setValue('server','name','LDAP Server');
|
||||||
|
$servers->setValue('server','host','127.0.0.1');
|
||||||
|
$servers->setValue('server','port',389);
|
||||||
|
$servers->setValue('server','base',array(''));
|
||||||
|
$servers->setValue('login','auth_type','cookie');
|
||||||
|
$servers->setValue('login','bind_id','');
|
||||||
|
$servers->setValue('login','bind_pass','');
|
||||||
|
$servers->setValue('server','tls',false);
|
||||||
|
|
||||||
|
# SASL auth
|
||||||
|
$servers->setValue('login','auth_type','sasl');
|
||||||
|
$servers->setValue('sasl','mech','GSSAPI');
|
||||||
|
$servers->setValue('sasl','realm','EXAMPLE.COM');
|
||||||
|
$servers->setValue('sasl','authz_id',null);
|
||||||
|
$servers->setValue('sasl','authz_id_regex','/^uid=([^,]+)(.+)/i');
|
||||||
|
$servers->setValue('sasl','authz_id_replacement','$1');
|
||||||
|
$servers->setValue('sasl','props',null);
|
||||||
|
|
||||||
|
$servers->setValue('appearance','password_hash','md5');
|
||||||
|
$servers->setValue('login','attr','dn');
|
||||||
|
$servers->setValue('login','fallback_dn',false);
|
||||||
|
$servers->setValue('login','class',null);
|
||||||
|
$servers->setValue('server','read_only',false);
|
||||||
|
$servers->setValue('appearance','show_create',true);
|
||||||
|
|
||||||
|
$servers->setValue('auto_number','enable',true);
|
||||||
|
$servers->setValue('auto_number','mechanism','search');
|
||||||
|
$servers->setValue('auto_number','search_base',null);
|
||||||
|
$servers->setValue('auto_number','min',array('uidNumber'=>1000,'gidNumber'=>500));
|
||||||
|
$servers->setValue('auto_number','dn',null);
|
||||||
|
$servers->setValue('auto_number','pass',null);
|
||||||
|
|
||||||
|
$servers->setValue('login','anon_bind',true);
|
||||||
|
$servers->setValue('custom','pages_prefix','custom_');
|
||||||
|
$servers->setValue('unique','attrs',array('mail','uid','uidNumber'));
|
||||||
|
$servers->setValue('unique','dn',null);
|
||||||
|
$servers->setValue('unique','pass',null);
|
||||||
|
|
||||||
|
$servers->setValue('server','visible',true);
|
||||||
|
$servers->setValue('login','timeout',30);
|
||||||
|
$servers->setValue('server','branch_rename',false);
|
||||||
|
$servers->setValue('server','custom_sys_attrs',array('passwordExpirationTime','passwordAllowChangeTime'));
|
||||||
|
$servers->setValue('server','custom_attrs',array('nsRoleDN','nsRole','nsAccountLock'));
|
||||||
|
$servers->setValue('server','force_may',array('uidNumber','gidNumber','sambaSID'));
|
||||||
|
*/
|
||||||
|
?>
|
||||||
|
|
||||||
28
docker/ldap/data/etc/DB_CONFIG.example
Normal file
28
docker/ldap/data/etc/DB_CONFIG.example
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
# $OpenLDAP$
|
||||||
|
# Example DB_CONFIG file for use with slapd(8) BDB/HDB databases.
|
||||||
|
#
|
||||||
|
# See the Oracle Berkeley DB documentation
|
||||||
|
# <http://www.oracle.com/technology/documentation/berkeley-db/db/ref/env/db_config.html>
|
||||||
|
# for detail description of DB_CONFIG syntax and semantics.
|
||||||
|
#
|
||||||
|
# Hints can also be found in the OpenLDAP Software FAQ
|
||||||
|
# <http://www.openldap.org/faq/index.cgi?file=2>
|
||||||
|
# in particular:
|
||||||
|
# <http://www.openldap.org/faq/index.cgi?file=1075>
|
||||||
|
|
||||||
|
# Note: most DB_CONFIG settings will take effect only upon rebuilding
|
||||||
|
# the DB environment.
|
||||||
|
|
||||||
|
# one 0.25 GB cache
|
||||||
|
set_cachesize 0 268435456 1
|
||||||
|
|
||||||
|
# Data Directory
|
||||||
|
#set_data_dir db
|
||||||
|
|
||||||
|
# Transaction Log settings
|
||||||
|
set_lg_regionmax 262144
|
||||||
|
set_lg_bsize 2097152
|
||||||
|
#set_lg_dir logs
|
||||||
|
|
||||||
|
# Note: special DB_CONFIG flags are no longer needed for "quick"
|
||||||
|
# slapadd(8) or slapindex(8) access (see their -q option).
|
||||||
13
docker/ldap/data/etc/ldap.conf
Normal file
13
docker/ldap/data/etc/ldap.conf
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
#
|
||||||
|
# LDAP Defaults
|
||||||
|
#
|
||||||
|
|
||||||
|
# See ldap.conf(5) for details
|
||||||
|
# This file should be world readable but not world writable.
|
||||||
|
|
||||||
|
#BASE dc=example,dc=com
|
||||||
|
#URI ldap://ldap.example.com ldap://ldap-master.example.com:666
|
||||||
|
|
||||||
|
#SIZELIMIT 12
|
||||||
|
#TIMELIMIT 15
|
||||||
|
#DEREF never
|
||||||
80
docker/ldap/data/etc/schema/README
Normal file
80
docker/ldap/data/etc/schema/README
Normal file
@ -0,0 +1,80 @@
|
|||||||
|
This directory contains user application schema definitions for use
|
||||||
|
with slapd(8).
|
||||||
|
|
||||||
|
File Description
|
||||||
|
---- -----------
|
||||||
|
collective.schema Collective attributes (experimental)
|
||||||
|
corba.schema Corba Object
|
||||||
|
core.schema OpenLDAP "core"
|
||||||
|
cosine.schema COSINE Pilot
|
||||||
|
duaconf.schema Client Configuration (work in progress)
|
||||||
|
dyngroup.schema Dynamic Group (experimental)
|
||||||
|
inetorgperson.schema InetOrgPerson
|
||||||
|
java.schema Java Object
|
||||||
|
misc.schema Miscellaneous Schema (experimental)
|
||||||
|
nadf.schema North American Directory Forum (obsolete)
|
||||||
|
nis.schema Network Information Service (experimental)
|
||||||
|
openldap.schema OpenLDAP Project (FYI)
|
||||||
|
ppolicy.schema Password Policy Schema (work in progress)
|
||||||
|
|
||||||
|
Additional "generally useful" schema definitions can be submitted
|
||||||
|
using the OpenLDAP Issue Tracking System <http://www.openldap.org/its/>.
|
||||||
|
Submissions should include a stable reference to a mature, open
|
||||||
|
technical specification (e.g., an RFC) for the schema.
|
||||||
|
|
||||||
|
The core.ldif and openldap.ldif files are equivalent to their
|
||||||
|
corresponding .schema files. They have been provided as examples
|
||||||
|
for use with the dynamic configuration backend. These example files
|
||||||
|
are not actually necessary since slapd will automatically convert any
|
||||||
|
included *.schema files into LDIF when converting a slapd.conf file
|
||||||
|
to a configuration database, but they serve as a model of how to
|
||||||
|
convert schema files in general.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
This notice applies to all files in this directory.
|
||||||
|
|
||||||
|
Copyright 1998-2017 The OpenLDAP Foundation, Redwood City, California, USA
|
||||||
|
All rights reserved.
|
||||||
|
|
||||||
|
Redistribution and use in source and binary forms, with or without
|
||||||
|
modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
Public License. A copy of this license is available at
|
||||||
|
http://www.OpenLDAP.org/license.html or in file LICENSE in the
|
||||||
|
top-level directory of the distribution.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
This notice applies to all schema in this directory which are derived
|
||||||
|
from RFCs and other IETF documents.
|
||||||
|
|
||||||
|
Portions Copyright 1991-2004, The Internet Society. All Rights Reserved.
|
||||||
|
|
||||||
|
This document and translations of it may be copied and furnished
|
||||||
|
to others, and derivative works that comment on or otherwise explain
|
||||||
|
it or assist in its implementation may be prepared, copied, published
|
||||||
|
and distributed, in whole or in part, without restriction of any
|
||||||
|
kind, provided that the above copyright notice and this paragraph
|
||||||
|
are included on all such copies and derivative works. However,
|
||||||
|
this document itself may not be modified in any way, such as by
|
||||||
|
removing the copyright notice or references to the Internet Society
|
||||||
|
or other Internet organizations, except as needed for the purpose
|
||||||
|
of developing Internet standards in which case the procedures for
|
||||||
|
copyrights defined in the Internet Standards process must be
|
||||||
|
followed, or as required to translate it into languages other than
|
||||||
|
English.
|
||||||
|
|
||||||
|
The limited permissions granted above are perpetual and will not
|
||||||
|
be revoked by the Internet Society or its successors or assigns.
|
||||||
|
|
||||||
|
This document and the information contained herein is provided on
|
||||||
|
an "AS IS" basis and THE AUTHORS, THE INTERNET SOCIETY, AND THE
|
||||||
|
INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS
|
||||||
|
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE
|
||||||
|
OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY
|
||||||
|
IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
|
||||||
|
PURPOSE.
|
||||||
|
|
||||||
|
|
||||||
|
---
|
||||||
|
$OpenLDAP$
|
||||||
48
docker/ldap/data/etc/schema/collective.ldif
Normal file
48
docker/ldap/data/etc/schema/collective.ldif
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
# collective.ldif -- Collective attribute schema
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
## Portions Copyright (C) The Internet Society (2003).
|
||||||
|
## Please see full copyright statement below.
|
||||||
|
#
|
||||||
|
# From RFC 3671 [portions trimmed]:
|
||||||
|
# Collective Attributes in LDAP
|
||||||
|
#
|
||||||
|
# This file was automatically generated from collective.schema; see that file
|
||||||
|
# for complete references.
|
||||||
|
#
|
||||||
|
dn: cn=collective,cn=schema,cn=config
|
||||||
|
objectClass: olcSchemaConfig
|
||||||
|
cn: collective
|
||||||
|
olcAttributeTypes: {0}( 2.5.4.7.1 NAME 'c-l' SUP l COLLECTIVE )
|
||||||
|
olcAttributeTypes: {1}( 2.5.4.8.1 NAME 'c-st' SUP st COLLECTIVE )
|
||||||
|
olcAttributeTypes: {2}( 2.5.4.9.1 NAME 'c-street' SUP street COLLECTIVE )
|
||||||
|
olcAttributeTypes: {3}( 2.5.4.10.1 NAME 'c-o' SUP o COLLECTIVE )
|
||||||
|
olcAttributeTypes: {4}( 2.5.4.11.1 NAME 'c-ou' SUP ou COLLECTIVE )
|
||||||
|
olcAttributeTypes: {5}( 2.5.4.16.1 NAME 'c-PostalAddress' SUP postalAddress CO
|
||||||
|
LLECTIVE )
|
||||||
|
olcAttributeTypes: {6}( 2.5.4.17.1 NAME 'c-PostalCode' SUP postalCode COLLECTI
|
||||||
|
VE )
|
||||||
|
olcAttributeTypes: {7}( 2.5.4.18.1 NAME 'c-PostOfficeBox' SUP postOfficeBox CO
|
||||||
|
LLECTIVE )
|
||||||
|
olcAttributeTypes: {8}( 2.5.4.19.1 NAME 'c-PhysicalDeliveryOfficeName' SUP phy
|
||||||
|
sicalDeliveryOfficeName COLLECTIVE )
|
||||||
|
olcAttributeTypes: {9}( 2.5.4.20.1 NAME 'c-TelephoneNumber' SUP telephoneNumbe
|
||||||
|
r COLLECTIVE )
|
||||||
|
olcAttributeTypes: {10}( 2.5.4.21.1 NAME 'c-TelexNumber' SUP telexNumber COLLE
|
||||||
|
CTIVE )
|
||||||
|
olcAttributeTypes: {11}( 2.5.4.23.1 NAME 'c-FacsimileTelephoneNumber' SUP facs
|
||||||
|
imileTelephoneNumber COLLECTIVE )
|
||||||
|
olcAttributeTypes: {12}( 2.5.4.25.1 NAME 'c-InternationalISDNNumber' SUP inter
|
||||||
|
nationalISDNNumber COLLECTIVE )
|
||||||
190
docker/ldap/data/etc/schema/collective.schema
Normal file
190
docker/ldap/data/etc/schema/collective.schema
Normal file
@ -0,0 +1,190 @@
|
|||||||
|
# collective.schema -- Collective attribute schema
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
## Portions Copyright (C) The Internet Society (2003).
|
||||||
|
## Please see full copyright statement below.
|
||||||
|
|
||||||
|
# From RFC 3671 [portions trimmed]:
|
||||||
|
# Collective Attributes in LDAP
|
||||||
|
|
||||||
|
#Abstract
|
||||||
|
#
|
||||||
|
# X.500 collective attributes allow common characteristics to be shared
|
||||||
|
# between collections of entries. This document summarizes the X.500
|
||||||
|
# information model for collective attributes and describes use of
|
||||||
|
# collective attributes in LDAP (Lightweight Directory Access Protocol).
|
||||||
|
# This document provides schema definitions for collective attributes
|
||||||
|
# for use in LDAP.
|
||||||
|
|
||||||
|
#3. Collective Attribute Types
|
||||||
|
#
|
||||||
|
# A userApplications attribute type can be defined to be COLLECTIVE
|
||||||
|
# [RFC2252]. This indicates that the same attribute values will appear
|
||||||
|
# in the entries of an entry collection subject to the use of the
|
||||||
|
# collectiveExclusions attribute and other administrative controls.
|
||||||
|
#
|
||||||
|
# Collective attribute types are commonly defined as subtypes of non-
|
||||||
|
# collective attribute types. By convention, collective attributes are
|
||||||
|
# named by prefixing the name of their non-collective supertype with
|
||||||
|
# "c-". For example, the collective telephone attribute is named
|
||||||
|
# c-TelephoneNumber after its non-collective supertype telephoneNumber.
|
||||||
|
#
|
||||||
|
# Non-collective attributes types SHALL NOT subtype collective
|
||||||
|
# attributes.
|
||||||
|
#
|
||||||
|
# Collective attributes SHALL NOT be SINGLE-VALUED. Collective
|
||||||
|
# attribute types SHALL NOT appear in the attribute types of an object
|
||||||
|
# class definition.
|
||||||
|
#
|
||||||
|
# Operational attributes SHALL NOT be defined to be collective.
|
||||||
|
#
|
||||||
|
# The remainder of section provides a summary of collective attributes
|
||||||
|
# derived from those defined in [X.520]. Implementations of this
|
||||||
|
# specification SHOULD support the following collective attributes and
|
||||||
|
# MAY support additional collective attributes.
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#3.1. Collective Locality Name
|
||||||
|
#
|
||||||
|
# The c-l attribute type specifies a locality name for a collection of
|
||||||
|
# entries.
|
||||||
|
#
|
||||||
|
attributeType ( 2.5.4.7.1 NAME 'c-l'
|
||||||
|
SUP l COLLECTIVE )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#3.2. Collective State or Province Name
|
||||||
|
#
|
||||||
|
# The c-st attribute type specifies a state or province name for a
|
||||||
|
# collection of entries.
|
||||||
|
#
|
||||||
|
attributeType ( 2.5.4.8.1 NAME 'c-st'
|
||||||
|
SUP st COLLECTIVE )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#3.3. Collective Street Address
|
||||||
|
#
|
||||||
|
# The c-street attribute type specifies a street address for a
|
||||||
|
# collection of entries.
|
||||||
|
#
|
||||||
|
attributeType ( 2.5.4.9.1 NAME 'c-street'
|
||||||
|
SUP street COLLECTIVE )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#3.4. Collective Organization Name
|
||||||
|
#
|
||||||
|
# The c-o attribute type specifies an organization name for a collection
|
||||||
|
# of entries.
|
||||||
|
#
|
||||||
|
attributeType ( 2.5.4.10.1 NAME 'c-o'
|
||||||
|
SUP o COLLECTIVE )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#3.5. Collective Organizational Unit Name
|
||||||
|
#
|
||||||
|
# The c-ou attribute type specifies an organizational unit name for a
|
||||||
|
# collection of entries.
|
||||||
|
#
|
||||||
|
attributeType ( 2.5.4.11.1 NAME 'c-ou'
|
||||||
|
SUP ou COLLECTIVE )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#3.6. Collective Postal Address
|
||||||
|
#
|
||||||
|
# The c-PostalAddress attribute type specifies a postal address for a
|
||||||
|
# collection of entries.
|
||||||
|
#
|
||||||
|
attributeType ( 2.5.4.16.1 NAME 'c-PostalAddress'
|
||||||
|
SUP postalAddress COLLECTIVE )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#3.7. Collective Postal Code
|
||||||
|
#
|
||||||
|
# The c-PostalCode attribute type specifies a postal code for a
|
||||||
|
# collection of entries.
|
||||||
|
#
|
||||||
|
attributeType ( 2.5.4.17.1 NAME 'c-PostalCode'
|
||||||
|
SUP postalCode COLLECTIVE )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#3.8. Collective Post Office Box
|
||||||
|
#
|
||||||
|
# The c-PostOfficeBox attribute type specifies a post office box for a
|
||||||
|
# collection of entries.
|
||||||
|
#
|
||||||
|
attributeType ( 2.5.4.18.1 NAME 'c-PostOfficeBox'
|
||||||
|
SUP postOfficeBox COLLECTIVE )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#3.9. Collective Physical Delivery Office Name
|
||||||
|
#
|
||||||
|
# The c-PhysicalDeliveryOfficeName attribute type specifies a physical
|
||||||
|
# delivery office name for a collection of entries.
|
||||||
|
#
|
||||||
|
attributeType ( 2.5.4.19.1 NAME 'c-PhysicalDeliveryOfficeName'
|
||||||
|
SUP physicalDeliveryOfficeName COLLECTIVE )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#3.10. Collective Telephone Number
|
||||||
|
#
|
||||||
|
# The c-TelephoneNumber attribute type specifies a telephone number for
|
||||||
|
# a collection of entries.
|
||||||
|
#
|
||||||
|
attributeType ( 2.5.4.20.1 NAME 'c-TelephoneNumber'
|
||||||
|
SUP telephoneNumber COLLECTIVE )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#3.11. Collective Telex Number
|
||||||
|
#
|
||||||
|
# The c-TelexNumber attribute type specifies a telex number for a
|
||||||
|
# collection of entries.
|
||||||
|
#
|
||||||
|
attributeType ( 2.5.4.21.1 NAME 'c-TelexNumber'
|
||||||
|
SUP telexNumber COLLECTIVE )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#3.13. Collective Facsimile Telephone Number
|
||||||
|
#
|
||||||
|
# The c-FacsimileTelephoneNumber attribute type specifies a facsimile
|
||||||
|
# telephone number for a collection of entries.
|
||||||
|
#
|
||||||
|
attributeType ( 2.5.4.23.1 NAME 'c-FacsimileTelephoneNumber'
|
||||||
|
SUP facsimileTelephoneNumber COLLECTIVE )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#3.14. Collective International ISDN Number
|
||||||
|
#
|
||||||
|
# The c-InternationalISDNNumber attribute type specifies an
|
||||||
|
# international ISDN number for a collection of entries.
|
||||||
|
#
|
||||||
|
attributeType ( 2.5.4.25.1 NAME 'c-InternationalISDNNumber'
|
||||||
|
SUP internationalISDNNumber COLLECTIVE )
|
||||||
|
|
||||||
|
# Full Copyright
|
||||||
|
#
|
||||||
|
# Copyright (C) The Internet Society (2003). All Rights Reserved.
|
||||||
|
#
|
||||||
|
# This document and translations of it may be copied and furnished
|
||||||
|
# to others, and derivative works that comment on or otherwise explain
|
||||||
|
# it or assist in its implmentation may be prepared, copied, published
|
||||||
|
# and distributed, in whole or in part, without restriction of any
|
||||||
|
# kind, provided that the above copyright notice and this paragraph
|
||||||
|
# are included on all such copies and derivative works. However,
|
||||||
|
# this document itself may not be modified in any way, such as by
|
||||||
|
# removing the copyright notice or references to the Internet Society
|
||||||
|
# or other Internet organizations, except as needed for the purpose
|
||||||
|
# of developing Internet standards in which case the procedures for
|
||||||
|
# copyrights defined in the Internet Standards process must be followed,
|
||||||
|
# or as required to translate it into languages other than English.
|
||||||
42
docker/ldap/data/etc/schema/corba.ldif
Normal file
42
docker/ldap/data/etc/schema/corba.ldif
Normal file
@ -0,0 +1,42 @@
|
|||||||
|
# corba.ldif -- Corba Object Schema
|
||||||
|
# depends upon core.ldif
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
## Portions Copyright (C) The Internet Society (1999).
|
||||||
|
## Please see full copyright statement below.
|
||||||
|
#
|
||||||
|
# From RFC 2714 [portions trimmed]:
|
||||||
|
# Schema for Representing CORBA Object References in an LDAP Directory
|
||||||
|
#
|
||||||
|
# This file was automatically generated from corba.schema; see that file
|
||||||
|
# for complete references.
|
||||||
|
#
|
||||||
|
dn: cn=corba,cn=schema,cn=config
|
||||||
|
objectClass: olcSchemaConfig
|
||||||
|
cn: corba
|
||||||
|
olcAttributeTypes: {0}( 1.3.6.1.4.1.42.2.27.4.1.14 NAME 'corbaIor' DESC 'Strin
|
||||||
|
gified interoperable object reference of a CORBA object' EQUALITY caseIgnoreI
|
||||||
|
A5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {1}( 1.3.6.1.4.1.42.2.27.4.1.15 NAME 'corbaRepositoryId' DE
|
||||||
|
SC 'Repository ids of interfaces implemented by a CORBA object' EQUALITY case
|
||||||
|
ExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
olcObjectClasses: {0}( 1.3.6.1.4.1.42.2.27.4.2.10 NAME 'corbaContainer' DESC '
|
||||||
|
Container for a CORBA object' SUP top STRUCTURAL MUST cn )
|
||||||
|
olcObjectClasses: {1}( 1.3.6.1.4.1.42.2.27.4.2.9 NAME 'corbaObject' DESC 'CORB
|
||||||
|
A object representation' SUP top ABSTRACT MAY ( corbaRepositoryId $ descripti
|
||||||
|
on ) )
|
||||||
|
olcObjectClasses: {2}( 1.3.6.1.4.1.42.2.27.4.2.11 NAME 'corbaObjectReference'
|
||||||
|
DESC 'CORBA interoperable object reference' SUP corbaObject AUXILIARY MUST co
|
||||||
|
rbaIor )
|
||||||
239
docker/ldap/data/etc/schema/corba.schema
Normal file
239
docker/ldap/data/etc/schema/corba.schema
Normal file
@ -0,0 +1,239 @@
|
|||||||
|
# corba.schema -- Corba Object Schema
|
||||||
|
# depends upon core.schema
|
||||||
|
# $OpenLDAP$
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
## Portions Copyright (C) The Internet Society (1999).
|
||||||
|
## Please see full copyright statement below.
|
||||||
|
|
||||||
|
|
||||||
|
# Network Working Group V. Ryan
|
||||||
|
# Request for Comments: 2714 R. Lee
|
||||||
|
# Category: Informational S. Seligman
|
||||||
|
# Sun Microsystems, Inc.
|
||||||
|
# October 1999
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Schema for Representing CORBA Object References in an LDAP Directory
|
||||||
|
#
|
||||||
|
# Status of this Memo
|
||||||
|
#
|
||||||
|
# This memo provides information for the Internet community. It does
|
||||||
|
# not specify an Internet standard of any kind. Distribution of this
|
||||||
|
# memo is unlimited.
|
||||||
|
#
|
||||||
|
# Copyright Notice
|
||||||
|
#
|
||||||
|
# Copyright (C) The Internet Society (1999). All Rights Reserved.
|
||||||
|
#
|
||||||
|
# Abstract
|
||||||
|
#
|
||||||
|
# CORBA [CORBA] is the Common Object Request Broker Architecture
|
||||||
|
# defined by the Object Management Group. This document defines the
|
||||||
|
# schema for representing CORBA object references in an LDAP directory
|
||||||
|
# [LDAPv3].
|
||||||
|
#
|
||||||
|
# [trimmed]
|
||||||
|
|
||||||
|
# 3. Attribute Type Definitions
|
||||||
|
#
|
||||||
|
# The following attribute types are defined in this document:
|
||||||
|
#
|
||||||
|
# corbaIor
|
||||||
|
# corbaRepositoryId
|
||||||
|
#
|
||||||
|
# 3.1 corbaIor
|
||||||
|
#
|
||||||
|
# This attribute stores the string representation of the interoperable
|
||||||
|
# object reference (IOR) for a CORBA object. An IOR is an opaque handle
|
||||||
|
# for the object which contains the information necessary to locate the
|
||||||
|
# object, even if the object is in another ORB.
|
||||||
|
#
|
||||||
|
# This attribute's syntax is 'IA5 String' and its case is
|
||||||
|
# insignificant.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.1.14
|
||||||
|
# NAME 'corbaIor'
|
||||||
|
# DESC 'Stringified interoperable object reference of a CORBA object'
|
||||||
|
# EQUALITY caseIgnoreIA5Match
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||||
|
# SINGLE-VALUE
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.14
|
||||||
|
NAME 'corbaIor'
|
||||||
|
DESC 'Stringified interoperable object reference of a CORBA object'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
# 3.2 corbaRepositoryId
|
||||||
|
#
|
||||||
|
# Each CORBA interface has a unique "repository id" (also called "type
|
||||||
|
# id") that identifies the interface. A CORBA object has one or more
|
||||||
|
# repository ids, one for each interface that it implements.
|
||||||
|
#
|
||||||
|
# The format of a repository id can be any string, but the OMG
|
||||||
|
# specifies four standard formats:
|
||||||
|
#
|
||||||
|
# a. IDL-style
|
||||||
|
#
|
||||||
|
# IDL:Prefix/ModuleName/InterfaceName:VersionNumber
|
||||||
|
#
|
||||||
|
# For example, the repository id for the "NamingContext" in OMG's COS
|
||||||
|
# Naming module is: "IDL:omg.org/CosNaming/NamingContext:1.0".
|
||||||
|
#
|
||||||
|
# b. RMI-style
|
||||||
|
#
|
||||||
|
# RMI:ClassName:HashCode[:SUID]
|
||||||
|
#
|
||||||
|
# This format is used by RMI-IIOP remote objects [RMI-IIOP].
|
||||||
|
# "ClassName" is the fully qualified name of the class (for example,
|
||||||
|
# "java.lang.String"). "HashCode" is the object's hash code (that is,
|
||||||
|
# that obtained by invoking the "hashCode()" method). "SUID" is the
|
||||||
|
# "stream unique identifier", which is a 64-bit number that uniquely
|
||||||
|
# identifies the serialization version of the class; SUID is optional
|
||||||
|
# in the repository id.
|
||||||
|
#
|
||||||
|
# c. DCE-style
|
||||||
|
#
|
||||||
|
# DCE:UUID
|
||||||
|
#
|
||||||
|
# This format is used for DCE/CORBA interoperability [CORBA-DCE].
|
||||||
|
# "UUID" represents a DCE UUID.
|
||||||
|
#
|
||||||
|
# d. "local"
|
||||||
|
#
|
||||||
|
# This format is defined by the local Object Request Broker (ORB).
|
||||||
|
#
|
||||||
|
# The corbaRepositoryId attribute is a multivalued attribute; each
|
||||||
|
# value records a single repository id of an interface implemented by
|
||||||
|
# the CORBA object. This attribute need not contain a complete list of
|
||||||
|
# the interfaces implemented by the CORBA object.
|
||||||
|
#
|
||||||
|
# This attribute's syntax is 'Directory String' and its case is
|
||||||
|
# significant. The values of this attribute are encoded using UTF-8.
|
||||||
|
# Some values may require translation from their native representation
|
||||||
|
# in order to be correctly encoded using UTF-8.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.1.15
|
||||||
|
# NAME 'corbaRepositoryId'
|
||||||
|
# DESC 'Repository ids of interfaces implemented by a CORBA object'
|
||||||
|
# EQUALITY caseExactMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.15
|
||||||
|
NAME 'corbaRepositoryId'
|
||||||
|
DESC 'Repository ids of interfaces implemented by a CORBA object'
|
||||||
|
EQUALITY caseExactMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
|
||||||
|
# 4. Object Class Definitions
|
||||||
|
#
|
||||||
|
# The following object classes are defined in this document:
|
||||||
|
#
|
||||||
|
# corbaContainer
|
||||||
|
# corbaObject
|
||||||
|
# corbaObjectReference
|
||||||
|
#
|
||||||
|
# 4.1 corbaContainer
|
||||||
|
#
|
||||||
|
# This structural object class represents a container for a CORBA
|
||||||
|
# object.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.2.10
|
||||||
|
# NAME 'corbaContainer'
|
||||||
|
# DESC 'Container for a CORBA object'
|
||||||
|
# SUP top
|
||||||
|
# STRUCTURAL
|
||||||
|
# MUST ( cn )
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.10
|
||||||
|
NAME 'corbaContainer'
|
||||||
|
DESC 'Container for a CORBA object'
|
||||||
|
SUP top
|
||||||
|
STRUCTURAL
|
||||||
|
MUST cn )
|
||||||
|
|
||||||
|
# 4.2 corbaObject
|
||||||
|
#
|
||||||
|
# This abstract object class is the root class for representing a CORBA
|
||||||
|
# object.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.2.9
|
||||||
|
# NAME 'corbaObject'
|
||||||
|
# DESC 'CORBA object representation'
|
||||||
|
# SUP top
|
||||||
|
# ABSTRACT
|
||||||
|
# MAY ( corbaRepositoryId $ description )
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.9
|
||||||
|
NAME 'corbaObject'
|
||||||
|
DESC 'CORBA object representation'
|
||||||
|
SUP top
|
||||||
|
ABSTRACT
|
||||||
|
MAY ( corbaRepositoryId $ description ) )
|
||||||
|
|
||||||
|
# 4.3 corbaObjectReference
|
||||||
|
#
|
||||||
|
# This auxiliary object class represents a CORBA object reference. It
|
||||||
|
# must be mixed in with a structural object class.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.2.11
|
||||||
|
# NAME 'corbaObjectReference'
|
||||||
|
# DESC 'CORBA interoperable object reference'
|
||||||
|
# SUP corbaObject
|
||||||
|
# AUXILIARY
|
||||||
|
# MUST ( corbaIor )
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.11
|
||||||
|
NAME 'corbaObjectReference'
|
||||||
|
DESC 'CORBA interoperable object reference'
|
||||||
|
SUP corbaObject
|
||||||
|
AUXILIARY
|
||||||
|
MUST corbaIor )
|
||||||
|
|
||||||
|
# 10. Full Copyright Statement
|
||||||
|
#
|
||||||
|
# Copyright (C) The Internet Society (1999). All Rights Reserved.
|
||||||
|
#
|
||||||
|
# This document and translations of it may be copied and furnished to
|
||||||
|
# others, and derivative works that comment on or otherwise explain it
|
||||||
|
# or assist in its implementation may be prepared, copied, published
|
||||||
|
# and distributed, in whole or in part, without restriction of any
|
||||||
|
# kind, provided that the above copyright notice and this paragraph are
|
||||||
|
# included on all such copies and derivative works. However, this
|
||||||
|
# document itself may not be modified in any way, such as by removing
|
||||||
|
# the copyright notice or references to the Internet Society or other
|
||||||
|
# Internet organizations, except as needed for the purpose of
|
||||||
|
# developing Internet standards in which case the procedures for
|
||||||
|
# copyrights defined in the Internet Standards process must be
|
||||||
|
# followed, or as required to translate it into languages other than
|
||||||
|
# English.
|
||||||
|
#
|
||||||
|
# The limited permissions granted above are perpetual and will not be
|
||||||
|
# revoked by the Internet Society or its successors or assigns.
|
||||||
|
#
|
||||||
|
# This document and the information contained herein is provided on an
|
||||||
|
# "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||||||
|
# TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||||||
|
# BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||||||
|
# HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||||||
|
# MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||||
591
docker/ldap/data/etc/schema/core.ldif
Normal file
591
docker/ldap/data/etc/schema/core.ldif
Normal file
@ -0,0 +1,591 @@
|
|||||||
|
# OpenLDAP Core schema
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
## Portions Copyright (C) The Internet Society (1997-2003).
|
||||||
|
## All Rights Reserved.
|
||||||
|
##
|
||||||
|
## This document and translations of it may be copied and furnished to
|
||||||
|
## others, and derivative works that comment on or otherwise explain it
|
||||||
|
## or assist in its implementation may be prepared, copied, published
|
||||||
|
## and distributed, in whole or in part, without restriction of any
|
||||||
|
## kind, provided that the above copyright notice and this paragraph are
|
||||||
|
## included on all such copies and derivative works. However, this
|
||||||
|
## document itself may not be modified in any way, such as by removing
|
||||||
|
## the copyright notice or references to the Internet Society or other
|
||||||
|
## Internet organizations, except as needed for the purpose of
|
||||||
|
## developing Internet standards in which case the procedures for
|
||||||
|
## copyrights defined in the Internet Standards process must be
|
||||||
|
## followed, or as required to translate it into languages other than
|
||||||
|
## English.
|
||||||
|
##
|
||||||
|
## The limited permissions granted above are perpetual and will not be
|
||||||
|
## revoked by the Internet Society or its successors or assigns.
|
||||||
|
##
|
||||||
|
## This document and the information contained herein is provided on an
|
||||||
|
## "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||||||
|
## TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||||||
|
## BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||||||
|
## HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||||||
|
## MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Includes LDAPv3 schema items from:
|
||||||
|
# RFC 2252/2256 (LDAPv3)
|
||||||
|
#
|
||||||
|
# Select standard track schema items:
|
||||||
|
# RFC 1274 (uid/dc)
|
||||||
|
# RFC 2079 (URI)
|
||||||
|
# RFC 2247 (dc/dcObject)
|
||||||
|
# RFC 2587 (PKI)
|
||||||
|
# RFC 2589 (Dynamic Directory Services)
|
||||||
|
#
|
||||||
|
# Select informational schema items:
|
||||||
|
# RFC 2377 (uidObject)
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Standard attribute types from RFC 2256
|
||||||
|
#
|
||||||
|
dn: cn=core,cn=schema,cn=config
|
||||||
|
objectClass: olcSchemaConfig
|
||||||
|
cn: core
|
||||||
|
#
|
||||||
|
# system schema
|
||||||
|
#olcAttributeTypes: ( 2.5.4.0 NAME 'objectClass'
|
||||||
|
# DESC 'RFC2256: object classes of the entity'
|
||||||
|
# EQUALITY objectIdentifierMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
|
||||||
|
#
|
||||||
|
# system schema
|
||||||
|
#olcAttributeTypes: ( 2.5.4.1 NAME ( 'aliasedObjectName' 'aliasedEntryName' )
|
||||||
|
# DESC 'RFC2256: name of aliased object'
|
||||||
|
# EQUALITY distinguishedNameMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 SINGLE-VALUE )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.2 NAME 'knowledgeInformation'
|
||||||
|
DESC 'RFC2256: knowledge information'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} )
|
||||||
|
#
|
||||||
|
# system schema
|
||||||
|
#olcAttributeTypes: ( 2.5.4.3 NAME ( 'cn' 'commonName' )
|
||||||
|
# DESC 'RFC2256: common name(s) for which the entity is known by'
|
||||||
|
# SUP name )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.4 NAME ( 'sn' 'surname' )
|
||||||
|
DESC 'RFC2256: last (family) name(s) for which the entity is known by'
|
||||||
|
SUP name )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.5 NAME 'serialNumber'
|
||||||
|
DESC 'RFC2256: serial number of the entity'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.44{64} )
|
||||||
|
#
|
||||||
|
# RFC 4519 definition ('countryName' in X.500 and RFC2256)
|
||||||
|
olcAttributeTypes: ( 2.5.4.6 NAME ( 'c' 'countryName' )
|
||||||
|
DESC 'RFC4519: two-letter ISO-3166 country code'
|
||||||
|
SUP name
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.11
|
||||||
|
SINGLE-VALUE )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.7 NAME ( 'l' 'localityName' )
|
||||||
|
DESC 'RFC2256: locality which this object resides in'
|
||||||
|
SUP name )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.8 NAME ( 'st' 'stateOrProvinceName' )
|
||||||
|
DESC 'RFC2256: state or province which this object resides in'
|
||||||
|
SUP name )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.9 NAME ( 'street' 'streetAddress' )
|
||||||
|
DESC 'RFC2256: street address of this object'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.10 NAME ( 'o' 'organizationName' )
|
||||||
|
DESC 'RFC2256: organization this object belongs to'
|
||||||
|
SUP name )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.11 NAME ( 'ou' 'organizationalUnitName' )
|
||||||
|
DESC 'RFC2256: organizational unit this object belongs to'
|
||||||
|
SUP name )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.12 NAME 'title'
|
||||||
|
DESC 'RFC2256: title associated with the entity'
|
||||||
|
SUP name )
|
||||||
|
#
|
||||||
|
# system schema
|
||||||
|
#olcAttributeTypes: ( 2.5.4.13 NAME 'description'
|
||||||
|
# DESC 'RFC2256: descriptive information'
|
||||||
|
# EQUALITY caseIgnoreMatch
|
||||||
|
# SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1024} )
|
||||||
|
#
|
||||||
|
# Deprecated by enhancedSearchGuide
|
||||||
|
olcAttributeTypes: ( 2.5.4.14 NAME 'searchGuide'
|
||||||
|
DESC 'RFC2256: search guide, deprecated by enhancedSearchGuide'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.25 )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.15 NAME 'businessCategory'
|
||||||
|
DESC 'RFC2256: business category'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.16 NAME 'postalAddress'
|
||||||
|
DESC 'RFC2256: postal address'
|
||||||
|
EQUALITY caseIgnoreListMatch
|
||||||
|
SUBSTR caseIgnoreListSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.17 NAME 'postalCode'
|
||||||
|
DESC 'RFC2256: postal code'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{40} )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.18 NAME 'postOfficeBox'
|
||||||
|
DESC 'RFC2256: Post Office Box'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{40} )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.19 NAME 'physicalDeliveryOfficeName'
|
||||||
|
DESC 'RFC2256: Physical Delivery Office Name'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.20 NAME 'telephoneNumber'
|
||||||
|
DESC 'RFC2256: Telephone Number'
|
||||||
|
EQUALITY telephoneNumberMatch
|
||||||
|
SUBSTR telephoneNumberSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.50{32} )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.21 NAME 'telexNumber'
|
||||||
|
DESC 'RFC2256: Telex Number'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.52 )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.22 NAME 'teletexTerminalIdentifier'
|
||||||
|
DESC 'RFC2256: Teletex Terminal Identifier'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.51 )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.23 NAME ( 'facsimileTelephoneNumber' 'fax' )
|
||||||
|
DESC 'RFC2256: Facsimile (Fax) Telephone Number'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.22 )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.24 NAME 'x121Address'
|
||||||
|
DESC 'RFC2256: X.121 Address'
|
||||||
|
EQUALITY numericStringMatch
|
||||||
|
SUBSTR numericStringSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.36{15} )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.25 NAME 'internationaliSDNNumber'
|
||||||
|
DESC 'RFC2256: international ISDN number'
|
||||||
|
EQUALITY numericStringMatch
|
||||||
|
SUBSTR numericStringSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.36{16} )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.26 NAME 'registeredAddress'
|
||||||
|
DESC 'RFC2256: registered postal address'
|
||||||
|
SUP postalAddress
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.27 NAME 'destinationIndicator'
|
||||||
|
DESC 'RFC2256: destination indicator'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.44{128} )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.28 NAME 'preferredDeliveryMethod'
|
||||||
|
DESC 'RFC2256: preferred delivery method'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.14
|
||||||
|
SINGLE-VALUE )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.29 NAME 'presentationAddress'
|
||||||
|
DESC 'RFC2256: presentation address'
|
||||||
|
EQUALITY presentationAddressMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.43
|
||||||
|
SINGLE-VALUE )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.30 NAME 'supportedApplicationContext'
|
||||||
|
DESC 'RFC2256: supported application context'
|
||||||
|
EQUALITY objectIdentifierMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.31 NAME 'member'
|
||||||
|
DESC 'RFC2256: member of a group'
|
||||||
|
SUP distinguishedName )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.32 NAME 'owner'
|
||||||
|
DESC 'RFC2256: owner (of the object)'
|
||||||
|
SUP distinguishedName )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.33 NAME 'roleOccupant'
|
||||||
|
DESC 'RFC2256: occupant of role'
|
||||||
|
SUP distinguishedName )
|
||||||
|
#
|
||||||
|
# system schema
|
||||||
|
#olcAttributeTypes: ( 2.5.4.34 NAME 'seeAlso'
|
||||||
|
# DESC 'RFC2256: DN of related object'
|
||||||
|
# SUP distinguishedName )
|
||||||
|
#
|
||||||
|
# system schema
|
||||||
|
#olcAttributeTypes: ( 2.5.4.35 NAME 'userPassword'
|
||||||
|
# DESC 'RFC2256/2307: password of user'
|
||||||
|
# EQUALITY octetStringMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.40{128} )
|
||||||
|
#
|
||||||
|
# Must be transferred using ;binary
|
||||||
|
# with certificateExactMatch rule (per X.509)
|
||||||
|
olcAttributeTypes: ( 2.5.4.36 NAME 'userCertificate'
|
||||||
|
DESC 'RFC2256: X.509 user certificate, use ;binary'
|
||||||
|
EQUALITY certificateExactMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.8 )
|
||||||
|
#
|
||||||
|
# Must be transferred using ;binary
|
||||||
|
# with certificateExactMatch rule (per X.509)
|
||||||
|
olcAttributeTypes: ( 2.5.4.37 NAME 'cACertificate'
|
||||||
|
DESC 'RFC2256: X.509 CA certificate, use ;binary'
|
||||||
|
EQUALITY certificateExactMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.8 )
|
||||||
|
#
|
||||||
|
# Must be transferred using ;binary
|
||||||
|
olcAttributeTypes: ( 2.5.4.38 NAME 'authorityRevocationList'
|
||||||
|
DESC 'RFC2256: X.509 authority revocation list, use ;binary'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
|
||||||
|
#
|
||||||
|
# Must be transferred using ;binary
|
||||||
|
olcAttributeTypes: ( 2.5.4.39 NAME 'certificateRevocationList'
|
||||||
|
DESC 'RFC2256: X.509 certificate revocation list, use ;binary'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
|
||||||
|
#
|
||||||
|
# Must be stored and requested in the binary form
|
||||||
|
olcAttributeTypes: ( 2.5.4.40 NAME 'crossCertificatePair'
|
||||||
|
DESC 'RFC2256: X.509 cross certificate pair, use ;binary'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.10 )
|
||||||
|
#
|
||||||
|
# 2.5.4.41 is defined above as it's used for subtyping
|
||||||
|
#olcAttributeTypes: ( 2.5.4.41 NAME 'name'
|
||||||
|
# EQUALITY caseIgnoreMatch
|
||||||
|
# SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.42 NAME ( 'givenName' 'gn' )
|
||||||
|
DESC 'RFC2256: first name(s) for which the entity is known by'
|
||||||
|
SUP name )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.43 NAME 'initials'
|
||||||
|
DESC 'RFC2256: initials of some or all of names, but not the surname(s).'
|
||||||
|
SUP name )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.44 NAME 'generationQualifier'
|
||||||
|
DESC 'RFC2256: name qualifier indicating a generation'
|
||||||
|
SUP name )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.45 NAME 'x500UniqueIdentifier'
|
||||||
|
DESC 'RFC2256: X.500 unique identifier'
|
||||||
|
EQUALITY bitStringMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.6 )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.46 NAME 'dnQualifier'
|
||||||
|
DESC 'RFC2256: DN qualifier'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
ORDERING caseIgnoreOrderingMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.44 )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.47 NAME 'enhancedSearchGuide'
|
||||||
|
DESC 'RFC2256: enhanced search guide'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.21 )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.48 NAME 'protocolInformation'
|
||||||
|
DESC 'RFC2256: protocol information'
|
||||||
|
EQUALITY protocolInformationMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.42 )
|
||||||
|
#
|
||||||
|
# 2.5.4.49 is defined above as it's used for subtyping
|
||||||
|
#olcAttributeTypes: ( 2.5.4.49 NAME 'distinguishedName'
|
||||||
|
# EQUALITY distinguishedNameMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.50 NAME 'uniqueMember'
|
||||||
|
DESC 'RFC2256: unique member of a group'
|
||||||
|
EQUALITY uniqueMemberMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.34 )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.51 NAME 'houseIdentifier'
|
||||||
|
DESC 'RFC2256: house identifier'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} )
|
||||||
|
#
|
||||||
|
# Must be transferred using ;binary
|
||||||
|
olcAttributeTypes: ( 2.5.4.52 NAME 'supportedAlgorithms'
|
||||||
|
DESC 'RFC2256: supported algorithms'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.49 )
|
||||||
|
#
|
||||||
|
# Must be transferred using ;binary
|
||||||
|
olcAttributeTypes: ( 2.5.4.53 NAME 'deltaRevocationList'
|
||||||
|
DESC 'RFC2256: delta revocation list; use ;binary'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.54 NAME 'dmdName'
|
||||||
|
DESC 'RFC2256: name of DMD'
|
||||||
|
SUP name )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 2.5.4.65 NAME 'pseudonym'
|
||||||
|
DESC 'X.520(4th): pseudonym for the object'
|
||||||
|
SUP name )
|
||||||
|
#
|
||||||
|
# Standard object classes from RFC2256
|
||||||
|
#
|
||||||
|
# system schema
|
||||||
|
#olcObjectClasses: ( 2.5.6.1 NAME 'alias'
|
||||||
|
# DESC 'RFC2256: an alias'
|
||||||
|
# SUP top STRUCTURAL
|
||||||
|
# MUST aliasedObjectName )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.2 NAME 'country'
|
||||||
|
DESC 'RFC2256: a country'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST c
|
||||||
|
MAY ( searchGuide $ description ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.3 NAME 'locality'
|
||||||
|
DESC 'RFC2256: a locality'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MAY ( street $ seeAlso $ searchGuide $ st $ l $ description ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.4 NAME 'organization'
|
||||||
|
DESC 'RFC2256: an organization'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST o
|
||||||
|
MAY ( userPassword $ searchGuide $ seeAlso $ businessCategory $
|
||||||
|
x121Address $ registeredAddress $ destinationIndicator $
|
||||||
|
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||||
|
telephoneNumber $ internationaliSDNNumber $
|
||||||
|
facsimileTelephoneNumber $ street $ postOfficeBox $ postalCode $
|
||||||
|
postalAddress $ physicalDeliveryOfficeName $ st $ l $ description ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.5 NAME 'organizationalUnit'
|
||||||
|
DESC 'RFC2256: an organizational unit'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ou
|
||||||
|
MAY ( userPassword $ searchGuide $ seeAlso $ businessCategory $
|
||||||
|
x121Address $ registeredAddress $ destinationIndicator $
|
||||||
|
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||||
|
telephoneNumber $ internationaliSDNNumber $
|
||||||
|
facsimileTelephoneNumber $ street $ postOfficeBox $ postalCode $
|
||||||
|
postalAddress $ physicalDeliveryOfficeName $ st $ l $ description ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.6 NAME 'person'
|
||||||
|
DESC 'RFC2256: a person'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( sn $ cn )
|
||||||
|
MAY ( userPassword $ telephoneNumber $ seeAlso $ description ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.7 NAME 'organizationalPerson'
|
||||||
|
DESC 'RFC2256: an organizational person'
|
||||||
|
SUP person STRUCTURAL
|
||||||
|
MAY ( title $ x121Address $ registeredAddress $ destinationIndicator $
|
||||||
|
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||||
|
telephoneNumber $ internationaliSDNNumber $
|
||||||
|
facsimileTelephoneNumber $ street $ postOfficeBox $ postalCode $
|
||||||
|
postalAddress $ physicalDeliveryOfficeName $ ou $ st $ l ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.8 NAME 'organizationalRole'
|
||||||
|
DESC 'RFC2256: an organizational role'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST cn
|
||||||
|
MAY ( x121Address $ registeredAddress $ destinationIndicator $
|
||||||
|
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||||
|
telephoneNumber $ internationaliSDNNumber $ facsimileTelephoneNumber $
|
||||||
|
seeAlso $ roleOccupant $ preferredDeliveryMethod $ street $
|
||||||
|
postOfficeBox $ postalCode $ postalAddress $
|
||||||
|
physicalDeliveryOfficeName $ ou $ st $ l $ description ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.9 NAME 'groupOfNames'
|
||||||
|
DESC 'RFC2256: a group of names (DNs)'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( member $ cn )
|
||||||
|
MAY ( businessCategory $ seeAlso $ owner $ ou $ o $ description ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.10 NAME 'residentialPerson'
|
||||||
|
DESC 'RFC2256: an residential person'
|
||||||
|
SUP person STRUCTURAL
|
||||||
|
MUST l
|
||||||
|
MAY ( businessCategory $ x121Address $ registeredAddress $
|
||||||
|
destinationIndicator $ preferredDeliveryMethod $ telexNumber $
|
||||||
|
teletexTerminalIdentifier $ telephoneNumber $ internationaliSDNNumber $
|
||||||
|
facsimileTelephoneNumber $ preferredDeliveryMethod $ street $
|
||||||
|
postOfficeBox $ postalCode $ postalAddress $
|
||||||
|
physicalDeliveryOfficeName $ st $ l ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.11 NAME 'applicationProcess'
|
||||||
|
DESC 'RFC2256: an application process'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST cn
|
||||||
|
MAY ( seeAlso $ ou $ l $ description ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.12 NAME 'applicationEntity'
|
||||||
|
DESC 'RFC2256: an application entity'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( presentationAddress $ cn )
|
||||||
|
MAY ( supportedApplicationContext $ seeAlso $ ou $ o $ l $
|
||||||
|
description ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.13 NAME 'dSA'
|
||||||
|
DESC 'RFC2256: a directory system agent (a server)'
|
||||||
|
SUP applicationEntity STRUCTURAL
|
||||||
|
MAY knowledgeInformation )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.14 NAME 'device'
|
||||||
|
DESC 'RFC2256: a device'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST cn
|
||||||
|
MAY ( serialNumber $ seeAlso $ owner $ ou $ o $ l $ description ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.15 NAME 'strongAuthenticationUser'
|
||||||
|
DESC 'RFC2256: a strong authentication user'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MUST userCertificate )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.16 NAME 'certificationAuthority'
|
||||||
|
DESC 'RFC2256: a certificate authority'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MUST ( authorityRevocationList $ certificateRevocationList $
|
||||||
|
cACertificate ) MAY crossCertificatePair )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.17 NAME 'groupOfUniqueNames'
|
||||||
|
DESC 'RFC2256: a group of unique names (DN and Unique Identifier)'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( uniqueMember $ cn )
|
||||||
|
MAY ( businessCategory $ seeAlso $ owner $ ou $ o $ description ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.18 NAME 'userSecurityInformation'
|
||||||
|
DESC 'RFC2256: a user security information'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MAY ( supportedAlgorithms ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.16.2 NAME 'certificationAuthority-V2'
|
||||||
|
SUP certificationAuthority
|
||||||
|
AUXILIARY MAY ( deltaRevocationList ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.19 NAME 'cRLDistributionPoint'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( cn )
|
||||||
|
MAY ( certificateRevocationList $ authorityRevocationList $
|
||||||
|
deltaRevocationList ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.20 NAME 'dmd'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( dmdName )
|
||||||
|
MAY ( userPassword $ searchGuide $ seeAlso $ businessCategory $
|
||||||
|
x121Address $ registeredAddress $ destinationIndicator $
|
||||||
|
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||||
|
telephoneNumber $ internationaliSDNNumber $ facsimileTelephoneNumber $
|
||||||
|
street $ postOfficeBox $ postalCode $ postalAddress $
|
||||||
|
physicalDeliveryOfficeName $ st $ l $ description ) )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Object Classes from RFC 2587
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.21 NAME 'pkiUser'
|
||||||
|
DESC 'RFC2587: a PKI user'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MAY userCertificate )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.22 NAME 'pkiCA'
|
||||||
|
DESC 'RFC2587: PKI certificate authority'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MAY ( authorityRevocationList $ certificateRevocationList $
|
||||||
|
cACertificate $ crossCertificatePair ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 2.5.6.23 NAME 'deltaCRL'
|
||||||
|
DESC 'RFC2587: PKI user'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MAY deltaRevocationList )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Standard Track URI label schema from RFC 2079
|
||||||
|
# system schema
|
||||||
|
#olcAttributeTypes: ( 1.3.6.1.4.1.250.1.57 NAME 'labeledURI'
|
||||||
|
# DESC 'RFC2079: Uniform Resource Identifier with optional label'
|
||||||
|
# EQUALITY caseExactMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 1.3.6.1.4.1.250.3.15 NAME 'labeledURIObject'
|
||||||
|
DESC 'RFC2079: object that contains the URI attribute type'
|
||||||
|
MAY ( labeledURI )
|
||||||
|
SUP top AUXILIARY )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Derived from RFC 1274, but with new "short names"
|
||||||
|
#
|
||||||
|
#olcAttributeTypes: ( 0.9.2342.19200300.100.1.1
|
||||||
|
# NAME ( 'uid' 'userid' )
|
||||||
|
# DESC 'RFC1274: user identifier'
|
||||||
|
# EQUALITY caseIgnoreMatch
|
||||||
|
# SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||||
|
#
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.3
|
||||||
|
NAME ( 'mail' 'rfc822Mailbox' )
|
||||||
|
DESC 'RFC1274: RFC822 Mailbox'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256} )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( 0.9.2342.19200300.100.4.19 NAME 'simpleSecurityObject'
|
||||||
|
DESC 'RFC1274: simple security object'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MUST userPassword )
|
||||||
|
#
|
||||||
|
# RFC 1274 + RFC 2247
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.25
|
||||||
|
NAME ( 'dc' 'domainComponent' )
|
||||||
|
DESC 'RFC1274/2247: domain component'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||||
|
#
|
||||||
|
# RFC 2247
|
||||||
|
olcObjectClasses: ( 1.3.6.1.4.1.1466.344 NAME 'dcObject'
|
||||||
|
DESC 'RFC2247: domain component object'
|
||||||
|
SUP top AUXILIARY MUST dc )
|
||||||
|
#
|
||||||
|
# RFC 2377
|
||||||
|
olcObjectClasses: ( 1.3.6.1.1.3.1 NAME 'uidObject'
|
||||||
|
DESC 'RFC2377: uid object'
|
||||||
|
SUP top AUXILIARY MUST uid )
|
||||||
|
#
|
||||||
|
# From COSINE Pilot
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.37
|
||||||
|
NAME 'associatedDomain'
|
||||||
|
DESC 'RFC1274: domain associated with object'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
#
|
||||||
|
# RFC 2459 -- deprecated in favor of 'mail' (in cosine.schema)
|
||||||
|
olcAttributeTypes: ( 1.2.840.113549.1.9.1
|
||||||
|
NAME ( 'email' 'emailAddress' 'pkcs9email' )
|
||||||
|
DESC 'RFC3280: legacy attribute for email addresses in DNs'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
|
||||||
|
#
|
||||||
610
docker/ldap/data/etc/schema/core.schema
Normal file
610
docker/ldap/data/etc/schema/core.schema
Normal file
@ -0,0 +1,610 @@
|
|||||||
|
# OpenLDAP Core schema
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
## Portions Copyright (C) The Internet Society (1997-2006).
|
||||||
|
## All Rights Reserved.
|
||||||
|
##
|
||||||
|
## This document and translations of it may be copied and furnished to
|
||||||
|
## others, and derivative works that comment on or otherwise explain it
|
||||||
|
## or assist in its implementation may be prepared, copied, published
|
||||||
|
## and distributed, in whole or in part, without restriction of any
|
||||||
|
## kind, provided that the above copyright notice and this paragraph are
|
||||||
|
## included on all such copies and derivative works. However, this
|
||||||
|
## document itself may not be modified in any way, such as by removing
|
||||||
|
## the copyright notice or references to the Internet Society or other
|
||||||
|
## Internet organizations, except as needed for the purpose of
|
||||||
|
## developing Internet standards in which case the procedures for
|
||||||
|
## copyrights defined in the Internet Standards process must be
|
||||||
|
## followed, or as required to translate it into languages other than
|
||||||
|
## English.
|
||||||
|
##
|
||||||
|
## The limited permissions granted above are perpetual and will not be
|
||||||
|
## revoked by the Internet Society or its successors or assigns.
|
||||||
|
##
|
||||||
|
## This document and the information contained herein is provided on an
|
||||||
|
## "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||||||
|
## TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||||||
|
## BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||||||
|
## HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||||||
|
## MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||||
|
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Includes LDAPv3 schema items from:
|
||||||
|
# RFC 2252/2256 (LDAPv3)
|
||||||
|
#
|
||||||
|
# Select standard track schema items:
|
||||||
|
# RFC 1274 (uid/dc)
|
||||||
|
# RFC 2079 (URI)
|
||||||
|
# RFC 2247 (dc/dcObject)
|
||||||
|
# RFC 2587 (PKI)
|
||||||
|
# RFC 2589 (Dynamic Directory Services)
|
||||||
|
# RFC 4524 (associatedDomain)
|
||||||
|
#
|
||||||
|
# Select informational schema items:
|
||||||
|
# RFC 2377 (uidObject)
|
||||||
|
|
||||||
|
#
|
||||||
|
# Standard attribute types from RFC 2256
|
||||||
|
#
|
||||||
|
|
||||||
|
# system schema
|
||||||
|
#attributetype ( 2.5.4.0 NAME 'objectClass'
|
||||||
|
# DESC 'RFC2256: object classes of the entity'
|
||||||
|
# EQUALITY objectIdentifierMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
|
||||||
|
|
||||||
|
# system schema
|
||||||
|
#attributetype ( 2.5.4.1 NAME ( 'aliasedObjectName' 'aliasedEntryName' )
|
||||||
|
# DESC 'RFC2256: name of aliased object'
|
||||||
|
# EQUALITY distinguishedNameMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.2 NAME 'knowledgeInformation'
|
||||||
|
DESC 'RFC2256: knowledge information'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} )
|
||||||
|
|
||||||
|
# system schema
|
||||||
|
#attributetype ( 2.5.4.3 NAME ( 'cn' 'commonName' )
|
||||||
|
# DESC 'RFC2256: common name(s) for which the entity is known by'
|
||||||
|
# SUP name )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.4 NAME ( 'sn' 'surname' )
|
||||||
|
DESC 'RFC2256: last (family) name(s) for which the entity is known by'
|
||||||
|
SUP name )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.5 NAME 'serialNumber'
|
||||||
|
DESC 'RFC2256: serial number of the entity'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.44{64} )
|
||||||
|
|
||||||
|
# RFC 4519 definition ('countryName' in X.500 and RFC2256)
|
||||||
|
attributetype ( 2.5.4.6 NAME ( 'c' 'countryName' )
|
||||||
|
DESC 'RFC4519: two-letter ISO-3166 country code'
|
||||||
|
SUP name
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.11
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
#attributetype ( 2.5.4.6 NAME ( 'c' 'countryName' )
|
||||||
|
# DESC 'RFC2256: ISO-3166 country 2-letter code'
|
||||||
|
# SUP name SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.7 NAME ( 'l' 'localityName' )
|
||||||
|
DESC 'RFC2256: locality which this object resides in'
|
||||||
|
SUP name )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.8 NAME ( 'st' 'stateOrProvinceName' )
|
||||||
|
DESC 'RFC2256: state or province which this object resides in'
|
||||||
|
SUP name )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.9 NAME ( 'street' 'streetAddress' )
|
||||||
|
DESC 'RFC2256: street address of this object'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.10 NAME ( 'o' 'organizationName' )
|
||||||
|
DESC 'RFC2256: organization this object belongs to'
|
||||||
|
SUP name )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.11 NAME ( 'ou' 'organizationalUnitName' )
|
||||||
|
DESC 'RFC2256: organizational unit this object belongs to'
|
||||||
|
SUP name )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.12 NAME 'title'
|
||||||
|
DESC 'RFC2256: title associated with the entity'
|
||||||
|
SUP name )
|
||||||
|
|
||||||
|
# system schema
|
||||||
|
#attributetype ( 2.5.4.13 NAME 'description'
|
||||||
|
# DESC 'RFC2256: descriptive information'
|
||||||
|
# EQUALITY caseIgnoreMatch
|
||||||
|
# SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1024} )
|
||||||
|
|
||||||
|
# Deprecated by enhancedSearchGuide
|
||||||
|
attributetype ( 2.5.4.14 NAME 'searchGuide'
|
||||||
|
DESC 'RFC2256: search guide, deprecated by enhancedSearchGuide'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.25 )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.15 NAME 'businessCategory'
|
||||||
|
DESC 'RFC2256: business category'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.16 NAME 'postalAddress'
|
||||||
|
DESC 'RFC2256: postal address'
|
||||||
|
EQUALITY caseIgnoreListMatch
|
||||||
|
SUBSTR caseIgnoreListSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.17 NAME 'postalCode'
|
||||||
|
DESC 'RFC2256: postal code'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{40} )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.18 NAME 'postOfficeBox'
|
||||||
|
DESC 'RFC2256: Post Office Box'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{40} )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.19 NAME 'physicalDeliveryOfficeName'
|
||||||
|
DESC 'RFC2256: Physical Delivery Office Name'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.20 NAME 'telephoneNumber'
|
||||||
|
DESC 'RFC2256: Telephone Number'
|
||||||
|
EQUALITY telephoneNumberMatch
|
||||||
|
SUBSTR telephoneNumberSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.50{32} )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.21 NAME 'telexNumber'
|
||||||
|
DESC 'RFC2256: Telex Number'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.52 )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.22 NAME 'teletexTerminalIdentifier'
|
||||||
|
DESC 'RFC2256: Teletex Terminal Identifier'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.51 )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.23 NAME ( 'facsimileTelephoneNumber' 'fax' )
|
||||||
|
DESC 'RFC2256: Facsimile (Fax) Telephone Number'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.22 )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.24 NAME 'x121Address'
|
||||||
|
DESC 'RFC2256: X.121 Address'
|
||||||
|
EQUALITY numericStringMatch
|
||||||
|
SUBSTR numericStringSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.36{15} )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.25 NAME 'internationaliSDNNumber'
|
||||||
|
DESC 'RFC2256: international ISDN number'
|
||||||
|
EQUALITY numericStringMatch
|
||||||
|
SUBSTR numericStringSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.36{16} )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.26 NAME 'registeredAddress'
|
||||||
|
DESC 'RFC2256: registered postal address'
|
||||||
|
SUP postalAddress
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.27 NAME 'destinationIndicator'
|
||||||
|
DESC 'RFC2256: destination indicator'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.44{128} )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.28 NAME 'preferredDeliveryMethod'
|
||||||
|
DESC 'RFC2256: preferred delivery method'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.14
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.29 NAME 'presentationAddress'
|
||||||
|
DESC 'RFC2256: presentation address'
|
||||||
|
EQUALITY presentationAddressMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.43
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.30 NAME 'supportedApplicationContext'
|
||||||
|
DESC 'RFC2256: supported application context'
|
||||||
|
EQUALITY objectIdentifierMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.31 NAME 'member'
|
||||||
|
DESC 'RFC2256: member of a group'
|
||||||
|
SUP distinguishedName )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.32 NAME 'owner'
|
||||||
|
DESC 'RFC2256: owner (of the object)'
|
||||||
|
SUP distinguishedName )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.33 NAME 'roleOccupant'
|
||||||
|
DESC 'RFC2256: occupant of role'
|
||||||
|
SUP distinguishedName )
|
||||||
|
|
||||||
|
# system schema
|
||||||
|
#attributetype ( 2.5.4.34 NAME 'seeAlso'
|
||||||
|
# DESC 'RFC2256: DN of related object'
|
||||||
|
# SUP distinguishedName )
|
||||||
|
|
||||||
|
# system schema
|
||||||
|
#attributetype ( 2.5.4.35 NAME 'userPassword'
|
||||||
|
# DESC 'RFC2256/2307: password of user'
|
||||||
|
# EQUALITY octetStringMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.40{128} )
|
||||||
|
|
||||||
|
# Must be transferred using ;binary
|
||||||
|
# with certificateExactMatch rule (per X.509)
|
||||||
|
attributetype ( 2.5.4.36 NAME 'userCertificate'
|
||||||
|
DESC 'RFC2256: X.509 user certificate, use ;binary'
|
||||||
|
EQUALITY certificateExactMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.8 )
|
||||||
|
|
||||||
|
# Must be transferred using ;binary
|
||||||
|
# with certificateExactMatch rule (per X.509)
|
||||||
|
attributetype ( 2.5.4.37 NAME 'cACertificate'
|
||||||
|
DESC 'RFC2256: X.509 CA certificate, use ;binary'
|
||||||
|
EQUALITY certificateExactMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.8 )
|
||||||
|
|
||||||
|
# Must be transferred using ;binary
|
||||||
|
attributetype ( 2.5.4.38 NAME 'authorityRevocationList'
|
||||||
|
DESC 'RFC2256: X.509 authority revocation list, use ;binary'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
|
||||||
|
|
||||||
|
# Must be transferred using ;binary
|
||||||
|
attributetype ( 2.5.4.39 NAME 'certificateRevocationList'
|
||||||
|
DESC 'RFC2256: X.509 certificate revocation list, use ;binary'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
|
||||||
|
|
||||||
|
# Must be stored and requested in the binary form
|
||||||
|
attributetype ( 2.5.4.40 NAME 'crossCertificatePair'
|
||||||
|
DESC 'RFC2256: X.509 cross certificate pair, use ;binary'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.10 )
|
||||||
|
|
||||||
|
# system schema
|
||||||
|
#attributetype ( 2.5.4.41 NAME 'name'
|
||||||
|
# EQUALITY caseIgnoreMatch
|
||||||
|
# SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.42 NAME ( 'givenName' 'gn' )
|
||||||
|
DESC 'RFC2256: first name(s) for which the entity is known by'
|
||||||
|
SUP name )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.43 NAME 'initials'
|
||||||
|
DESC 'RFC2256: initials of some or all of names, but not the surname(s).'
|
||||||
|
SUP name )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.44 NAME 'generationQualifier'
|
||||||
|
DESC 'RFC2256: name qualifier indicating a generation'
|
||||||
|
SUP name )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.45 NAME 'x500UniqueIdentifier'
|
||||||
|
DESC 'RFC2256: X.500 unique identifier'
|
||||||
|
EQUALITY bitStringMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.6 )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.46 NAME 'dnQualifier'
|
||||||
|
DESC 'RFC2256: DN qualifier'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
ORDERING caseIgnoreOrderingMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.44 )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.47 NAME 'enhancedSearchGuide'
|
||||||
|
DESC 'RFC2256: enhanced search guide'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.21 )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.48 NAME 'protocolInformation'
|
||||||
|
DESC 'RFC2256: protocol information'
|
||||||
|
EQUALITY protocolInformationMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.42 )
|
||||||
|
|
||||||
|
# system schema
|
||||||
|
#attributetype ( 2.5.4.49 NAME 'distinguishedName'
|
||||||
|
# EQUALITY distinguishedNameMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.50 NAME 'uniqueMember'
|
||||||
|
DESC 'RFC2256: unique member of a group'
|
||||||
|
EQUALITY uniqueMemberMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.34 )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.51 NAME 'houseIdentifier'
|
||||||
|
DESC 'RFC2256: house identifier'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} )
|
||||||
|
|
||||||
|
# Must be transferred using ;binary
|
||||||
|
attributetype ( 2.5.4.52 NAME 'supportedAlgorithms'
|
||||||
|
DESC 'RFC2256: supported algorithms'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.49 )
|
||||||
|
|
||||||
|
# Must be transferred using ;binary
|
||||||
|
attributetype ( 2.5.4.53 NAME 'deltaRevocationList'
|
||||||
|
DESC 'RFC2256: delta revocation list; use ;binary'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.9 )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.54 NAME 'dmdName'
|
||||||
|
DESC 'RFC2256: name of DMD'
|
||||||
|
SUP name )
|
||||||
|
|
||||||
|
attributetype ( 2.5.4.65 NAME 'pseudonym'
|
||||||
|
DESC 'X.520(4th): pseudonym for the object'
|
||||||
|
SUP name )
|
||||||
|
|
||||||
|
# Standard object classes from RFC2256
|
||||||
|
|
||||||
|
# system schema
|
||||||
|
#objectclass ( 2.5.6.0 NAME 'top'
|
||||||
|
# DESC 'RFC2256: top of the superclass chain'
|
||||||
|
# ABSTRACT
|
||||||
|
# MUST objectClass )
|
||||||
|
|
||||||
|
# system schema
|
||||||
|
#objectclass ( 2.5.6.1 NAME 'alias'
|
||||||
|
# DESC 'RFC2256: an alias'
|
||||||
|
# SUP top STRUCTURAL
|
||||||
|
# MUST aliasedObjectName )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.2 NAME 'country'
|
||||||
|
DESC 'RFC2256: a country'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST c
|
||||||
|
MAY ( searchGuide $ description ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.3 NAME 'locality'
|
||||||
|
DESC 'RFC2256: a locality'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MAY ( street $ seeAlso $ searchGuide $ st $ l $ description ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.4 NAME 'organization'
|
||||||
|
DESC 'RFC2256: an organization'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST o
|
||||||
|
MAY ( userPassword $ searchGuide $ seeAlso $ businessCategory $
|
||||||
|
x121Address $ registeredAddress $ destinationIndicator $
|
||||||
|
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||||
|
telephoneNumber $ internationaliSDNNumber $
|
||||||
|
facsimileTelephoneNumber $ street $ postOfficeBox $ postalCode $
|
||||||
|
postalAddress $ physicalDeliveryOfficeName $ st $ l $ description ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.5 NAME 'organizationalUnit'
|
||||||
|
DESC 'RFC2256: an organizational unit'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ou
|
||||||
|
MAY ( userPassword $ searchGuide $ seeAlso $ businessCategory $
|
||||||
|
x121Address $ registeredAddress $ destinationIndicator $
|
||||||
|
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||||
|
telephoneNumber $ internationaliSDNNumber $
|
||||||
|
facsimileTelephoneNumber $ street $ postOfficeBox $ postalCode $
|
||||||
|
postalAddress $ physicalDeliveryOfficeName $ st $ l $ description ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.6 NAME 'person'
|
||||||
|
DESC 'RFC2256: a person'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( sn $ cn )
|
||||||
|
MAY ( userPassword $ telephoneNumber $ seeAlso $ description ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.7 NAME 'organizationalPerson'
|
||||||
|
DESC 'RFC2256: an organizational person'
|
||||||
|
SUP person STRUCTURAL
|
||||||
|
MAY ( title $ x121Address $ registeredAddress $ destinationIndicator $
|
||||||
|
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||||
|
telephoneNumber $ internationaliSDNNumber $
|
||||||
|
facsimileTelephoneNumber $ street $ postOfficeBox $ postalCode $
|
||||||
|
postalAddress $ physicalDeliveryOfficeName $ ou $ st $ l ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.8 NAME 'organizationalRole'
|
||||||
|
DESC 'RFC2256: an organizational role'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST cn
|
||||||
|
MAY ( x121Address $ registeredAddress $ destinationIndicator $
|
||||||
|
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||||
|
telephoneNumber $ internationaliSDNNumber $ facsimileTelephoneNumber $
|
||||||
|
seeAlso $ roleOccupant $ preferredDeliveryMethod $ street $
|
||||||
|
postOfficeBox $ postalCode $ postalAddress $
|
||||||
|
physicalDeliveryOfficeName $ ou $ st $ l $ description ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.9 NAME 'groupOfNames'
|
||||||
|
DESC 'RFC2256: a group of names (DNs)'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( member $ cn )
|
||||||
|
MAY ( businessCategory $ seeAlso $ owner $ ou $ o $ description ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.10 NAME 'residentialPerson'
|
||||||
|
DESC 'RFC2256: an residential person'
|
||||||
|
SUP person STRUCTURAL
|
||||||
|
MUST l
|
||||||
|
MAY ( businessCategory $ x121Address $ registeredAddress $
|
||||||
|
destinationIndicator $ preferredDeliveryMethod $ telexNumber $
|
||||||
|
teletexTerminalIdentifier $ telephoneNumber $ internationaliSDNNumber $
|
||||||
|
facsimileTelephoneNumber $ preferredDeliveryMethod $ street $
|
||||||
|
postOfficeBox $ postalCode $ postalAddress $
|
||||||
|
physicalDeliveryOfficeName $ st $ l ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.11 NAME 'applicationProcess'
|
||||||
|
DESC 'RFC2256: an application process'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST cn
|
||||||
|
MAY ( seeAlso $ ou $ l $ description ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.12 NAME 'applicationEntity'
|
||||||
|
DESC 'RFC2256: an application entity'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( presentationAddress $ cn )
|
||||||
|
MAY ( supportedApplicationContext $ seeAlso $ ou $ o $ l $
|
||||||
|
description ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.13 NAME 'dSA'
|
||||||
|
DESC 'RFC2256: a directory system agent (a server)'
|
||||||
|
SUP applicationEntity STRUCTURAL
|
||||||
|
MAY knowledgeInformation )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.14 NAME 'device'
|
||||||
|
DESC 'RFC2256: a device'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST cn
|
||||||
|
MAY ( serialNumber $ seeAlso $ owner $ ou $ o $ l $ description ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.15 NAME 'strongAuthenticationUser'
|
||||||
|
DESC 'RFC2256: a strong authentication user'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MUST userCertificate )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.16 NAME 'certificationAuthority'
|
||||||
|
DESC 'RFC2256: a certificate authority'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MUST ( authorityRevocationList $ certificateRevocationList $
|
||||||
|
cACertificate ) MAY crossCertificatePair )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.17 NAME 'groupOfUniqueNames'
|
||||||
|
DESC 'RFC2256: a group of unique names (DN and Unique Identifier)'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( uniqueMember $ cn )
|
||||||
|
MAY ( businessCategory $ seeAlso $ owner $ ou $ o $ description ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.18 NAME 'userSecurityInformation'
|
||||||
|
DESC 'RFC2256: a user security information'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MAY ( supportedAlgorithms ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.16.2 NAME 'certificationAuthority-V2'
|
||||||
|
SUP certificationAuthority
|
||||||
|
AUXILIARY MAY ( deltaRevocationList ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.19 NAME 'cRLDistributionPoint'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( cn )
|
||||||
|
MAY ( certificateRevocationList $ authorityRevocationList $
|
||||||
|
deltaRevocationList ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.20 NAME 'dmd'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( dmdName )
|
||||||
|
MAY ( userPassword $ searchGuide $ seeAlso $ businessCategory $
|
||||||
|
x121Address $ registeredAddress $ destinationIndicator $
|
||||||
|
preferredDeliveryMethod $ telexNumber $ teletexTerminalIdentifier $
|
||||||
|
telephoneNumber $ internationaliSDNNumber $ facsimileTelephoneNumber $
|
||||||
|
street $ postOfficeBox $ postalCode $ postalAddress $
|
||||||
|
physicalDeliveryOfficeName $ st $ l $ description ) )
|
||||||
|
|
||||||
|
#
|
||||||
|
# Object Classes from RFC 2587
|
||||||
|
#
|
||||||
|
objectclass ( 2.5.6.21 NAME 'pkiUser'
|
||||||
|
DESC 'RFC2587: a PKI user'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MAY userCertificate )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.22 NAME 'pkiCA'
|
||||||
|
DESC 'RFC2587: PKI certificate authority'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MAY ( authorityRevocationList $ certificateRevocationList $
|
||||||
|
cACertificate $ crossCertificatePair ) )
|
||||||
|
|
||||||
|
objectclass ( 2.5.6.23 NAME 'deltaCRL'
|
||||||
|
DESC 'RFC2587: PKI user'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MAY deltaRevocationList )
|
||||||
|
|
||||||
|
#
|
||||||
|
# Standard Track URI label schema from RFC 2079
|
||||||
|
# system schema
|
||||||
|
#attributetype ( 1.3.6.1.4.1.250.1.57 NAME 'labeledURI'
|
||||||
|
# DESC 'RFC2079: Uniform Resource Identifier with optional label'
|
||||||
|
# EQUALITY caseExactMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
|
||||||
|
objectclass ( 1.3.6.1.4.1.250.3.15 NAME 'labeledURIObject'
|
||||||
|
DESC 'RFC2079: object that contains the URI attribute type'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MAY ( labeledURI ) )
|
||||||
|
|
||||||
|
#
|
||||||
|
# Derived from RFC 1274, but with new "short names"
|
||||||
|
#
|
||||||
|
#attributetype ( 0.9.2342.19200300.100.1.1
|
||||||
|
# NAME ( 'uid' 'userid' )
|
||||||
|
# DESC 'RFC1274: user identifier'
|
||||||
|
# EQUALITY caseIgnoreMatch
|
||||||
|
# SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||||
|
|
||||||
|
attributetype ( 0.9.2342.19200300.100.1.3
|
||||||
|
NAME ( 'mail' 'rfc822Mailbox' )
|
||||||
|
DESC 'RFC1274: RFC822 Mailbox'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256} )
|
||||||
|
|
||||||
|
objectclass ( 0.9.2342.19200300.100.4.19 NAME 'simpleSecurityObject'
|
||||||
|
DESC 'RFC1274: simple security object'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MUST userPassword )
|
||||||
|
|
||||||
|
# RFC 1274 + RFC 2247
|
||||||
|
attributetype ( 0.9.2342.19200300.100.1.25
|
||||||
|
NAME ( 'dc' 'domainComponent' )
|
||||||
|
DESC 'RFC1274/2247: domain component'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||||
|
|
||||||
|
# RFC 2247
|
||||||
|
objectclass ( 1.3.6.1.4.1.1466.344 NAME 'dcObject'
|
||||||
|
DESC 'RFC2247: domain component object'
|
||||||
|
SUP top AUXILIARY MUST dc )
|
||||||
|
|
||||||
|
# RFC 2377
|
||||||
|
objectclass ( 1.3.6.1.1.3.1 NAME 'uidObject'
|
||||||
|
DESC 'RFC2377: uid object'
|
||||||
|
SUP top AUXILIARY MUST uid )
|
||||||
|
|
||||||
|
# RFC 4524
|
||||||
|
# The 'associatedDomain' attribute specifies DNS [RFC1034][RFC2181]
|
||||||
|
# host names [RFC1123] that are associated with an object. That is,
|
||||||
|
# values of this attribute should conform to the following ABNF:
|
||||||
|
#
|
||||||
|
# domain = root / label *( DOT label )
|
||||||
|
# root = SPACE
|
||||||
|
# label = LETDIG [ *61( LETDIG / HYPHEN ) LETDIG ]
|
||||||
|
# LETDIG = %x30-39 / %x41-5A / %x61-7A ; "0" - "9" / "A"-"Z" / "a"-"z"
|
||||||
|
# SPACE = %x20 ; space (" ")
|
||||||
|
# HYPHEN = %x2D ; hyphen ("-")
|
||||||
|
# DOT = %x2E ; period (".")
|
||||||
|
attributetype ( 0.9.2342.19200300.100.1.37
|
||||||
|
NAME 'associatedDomain'
|
||||||
|
DESC 'RFC1274: domain associated with object'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
|
||||||
|
# RFC 2459 -- deprecated in favor of 'mail' (in cosine.schema)
|
||||||
|
attributetype ( 1.2.840.113549.1.9.1
|
||||||
|
NAME ( 'email' 'emailAddress' 'pkcs9email' )
|
||||||
|
DESC 'RFC3280: legacy attribute for email addresses in DNs'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
|
||||||
|
|
||||||
200
docker/ldap/data/etc/schema/cosine.ldif
Normal file
200
docker/ldap/data/etc/schema/cosine.ldif
Normal file
@ -0,0 +1,200 @@
|
|||||||
|
# RFC1274: Cosine and Internet X.500 schema
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
# RFC1274: Cosine and Internet X.500 schema
|
||||||
|
#
|
||||||
|
# This file contains LDAPv3 schema derived from X.500 COSINE "pilot"
|
||||||
|
# schema. As this schema was defined for X.500(89), some
|
||||||
|
# oddities were introduced in the mapping to LDAPv3. The
|
||||||
|
# mappings were based upon: draft-ietf-asid-ldapv3-attributes-03.txt
|
||||||
|
# (a work in progress)
|
||||||
|
#
|
||||||
|
# Note: It seems that the pilot schema evolved beyond what was
|
||||||
|
# described in RFC1274. However, this document attempts to describes
|
||||||
|
# RFC1274 as published.
|
||||||
|
#
|
||||||
|
# Depends on core.ldif
|
||||||
|
#
|
||||||
|
# This file was automatically generated from cosine.schema; see that
|
||||||
|
# file for complete background.
|
||||||
|
#
|
||||||
|
dn: cn=cosine,cn=schema,cn=config
|
||||||
|
objectClass: olcSchemaConfig
|
||||||
|
cn: cosine
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.2 NAME 'textEncodedORAddress'
|
||||||
|
EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.
|
||||||
|
1466.115.121.1.15{256} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.4 NAME 'info' DESC 'RFC1274: g
|
||||||
|
eneral information' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{2048} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.5 NAME ( 'drink' 'favouriteDri
|
||||||
|
nk' ) DESC 'RFC1274: favorite drink' EQUALITY caseIgnoreMatch SUBSTR caseIgno
|
||||||
|
reSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.6 NAME 'roomNumber' DESC 'RFC1
|
||||||
|
274: room number' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch S
|
||||||
|
YNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.7 NAME 'photo' DESC 'RFC1274:
|
||||||
|
photo (G3 fax)' SYNTAX 1.3.6.1.4.1.1466.115.121.1.23{25000} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.8 NAME 'userClass' DESC 'RFC12
|
||||||
|
74: category of user' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMat
|
||||||
|
ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.9 NAME 'host' DESC 'RFC1274: h
|
||||||
|
ost computer' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTA
|
||||||
|
X 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.10 NAME 'manager' DESC 'RFC127
|
||||||
|
4: DN of manager' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115
|
||||||
|
.121.1.12 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.11 NAME 'documentIdentifier' D
|
||||||
|
ESC 'RFC1274: unique identifier of document' EQUALITY caseIgnoreMatch SUBSTR
|
||||||
|
caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.12 NAME 'documentTitle' DESC '
|
||||||
|
RFC1274: title of document' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstri
|
||||||
|
ngsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.13 NAME 'documentVersion' DES
|
||||||
|
C 'RFC1274: version of document' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSu
|
||||||
|
bstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.14 NAME 'documentAuthor' DESC
|
||||||
|
'RFC1274: DN of author of document' EQUALITY distinguishedNameMatch SYNTAX 1
|
||||||
|
.3.6.1.4.1.1466.115.121.1.12 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.15 NAME 'documentLocation' DE
|
||||||
|
SC 'RFC1274: location of document original' EQUALITY caseIgnoreMatch SUBSTR c
|
||||||
|
aseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.20 NAME ( 'homePhone' 'homeTe
|
||||||
|
lephoneNumber' ) DESC 'RFC1274: home telephone number' EQUALITY telephoneNumb
|
||||||
|
erMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121
|
||||||
|
.1.50 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.21 NAME 'secretary' DESC 'RFC
|
||||||
|
1274: DN of secretary' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.146
|
||||||
|
6.115.121.1.12 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.22 NAME 'otherMailbox' SYNTAX
|
||||||
|
1.3.6.1.4.1.1466.115.121.1.39 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.26 NAME 'aRecord' EQUALITY ca
|
||||||
|
seIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.27 NAME 'mDRecord' EQUALITY c
|
||||||
|
aseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.28 NAME 'mXRecord' EQUALITY c
|
||||||
|
aseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.29 NAME 'nSRecord' EQUALITY c
|
||||||
|
aseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.30 NAME 'sOARecord' EQUALITY
|
||||||
|
caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.31 NAME 'cNAMERecord' EQUALIT
|
||||||
|
Y caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.38 NAME 'associatedName' DESC
|
||||||
|
'RFC1274: DN of entry associated with domain' EQUALITY distinguishedNameMatc
|
||||||
|
h SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.39 NAME 'homePostalAddress' D
|
||||||
|
ESC 'RFC1274: home postal address' EQUALITY caseIgnoreListMatch SUBSTR caseIg
|
||||||
|
noreListSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.40 NAME 'personalTitle' DESC
|
||||||
|
'RFC1274: personal title' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstring
|
||||||
|
sMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.41 NAME ( 'mobile' 'mobileTel
|
||||||
|
ephoneNumber' ) DESC 'RFC1274: mobile telephone number' EQUALITY telephoneNum
|
||||||
|
berMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.12
|
||||||
|
1.1.50 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.42 NAME ( 'pager' 'pagerTelep
|
||||||
|
honeNumber' ) DESC 'RFC1274: pager telephone number' EQUALITY telephoneNumber
|
||||||
|
Match SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1
|
||||||
|
.50 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.43 NAME ( 'co' 'friendlyCount
|
||||||
|
ryName' ) DESC 'RFC1274: friendly country name' EQUALITY caseIgnoreMatch SUBS
|
||||||
|
TR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.44 NAME 'uniqueIdentifier' DE
|
||||||
|
SC 'RFC1274: unique identifer' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.14
|
||||||
|
66.115.121.1.15{256} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.45 NAME 'organizationalStatus
|
||||||
|
' DESC 'RFC1274: organizational status' EQUALITY caseIgnoreMatch SUBSTR caseI
|
||||||
|
gnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.46 NAME 'janetMailbox' DESC '
|
||||||
|
RFC1274: Janet mailbox' EQUALITY caseIgnoreIA5Match SUBSTR caseIgnoreIA5Subst
|
||||||
|
ringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.47 NAME 'mailPreferenceOption
|
||||||
|
' DESC 'RFC1274: mail preference option' SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
)
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.48 NAME 'buildingName' DESC '
|
||||||
|
RFC1274: name of building' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstrin
|
||||||
|
gsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.49 NAME 'dSAQuality' DESC 'RF
|
||||||
|
C1274: DSA Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.19 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.50 NAME 'singleLevelQuality'
|
||||||
|
DESC 'RFC1274: Single Level Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.13 SIN
|
||||||
|
GLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.51 NAME 'subtreeMinimumQualit
|
||||||
|
y' DESC 'RFC1274: Subtree Mininum Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.
|
||||||
|
13 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.52 NAME 'subtreeMaximumQualit
|
||||||
|
y' DESC 'RFC1274: Subtree Maximun Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.
|
||||||
|
13 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.53 NAME 'personalSignature' D
|
||||||
|
ESC 'RFC1274: Personal Signature (G3 fax)' SYNTAX 1.3.6.1.4.1.1466.115.121.1.
|
||||||
|
23 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.54 NAME 'dITRedirect' DESC 'R
|
||||||
|
FC1274: DIT Redirect' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466
|
||||||
|
.115.121.1.12 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.55 NAME 'audio' DESC 'RFC1274
|
||||||
|
: audio (u-law)' SYNTAX 1.3.6.1.4.1.1466.115.121.1.4{25000} )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.56 NAME 'documentPublisher' D
|
||||||
|
ESC 'RFC1274: publisher of document' EQUALITY caseIgnoreMatch SUBSTR caseIgno
|
||||||
|
reSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
olcObjectClasses: ( 0.9.2342.19200300.100.4.4 NAME ( 'pilotPerson' 'newPilo
|
||||||
|
tPerson' ) SUP person STRUCTURAL MAY ( userid $ textEncodedORAddress $ rfc822
|
||||||
|
Mailbox $ favouriteDrink $ roomNumber $ userClass $ homeTelephoneNumber $ hom
|
||||||
|
ePostalAddress $ secretary $ personalTitle $ preferredDeliveryMethod $ busine
|
||||||
|
ssCategory $ janetMailbox $ otherMailbox $ mobileTelephoneNumber $ pagerTelep
|
||||||
|
honeNumber $ organizationalStatus $ mailPreferenceOption $ personalSignature
|
||||||
|
) )
|
||||||
|
olcObjectClasses: ( 0.9.2342.19200300.100.4.5 NAME 'account' SUP top STRUCT
|
||||||
|
URAL MUST userid MAY ( description $ seeAlso $ localityName $ organizationNam
|
||||||
|
e $ organizationalUnitName $ host ) )
|
||||||
|
olcObjectClasses: ( 0.9.2342.19200300.100.4.6 NAME 'document' SUP top STRUC
|
||||||
|
TURAL MUST documentIdentifier MAY ( commonName $ description $ seeAlso $ loca
|
||||||
|
lityName $ organizationName $ organizationalUnitName $ documentTitle $ docume
|
||||||
|
ntVersion $ documentAuthor $ documentLocation $ documentPublisher ) )
|
||||||
|
olcObjectClasses: ( 0.9.2342.19200300.100.4.7 NAME 'room' SUP top STRUCTURA
|
||||||
|
L MUST commonName MAY ( roomNumber $ description $ seeAlso $ telephoneNumber
|
||||||
|
) )
|
||||||
|
olcObjectClasses: ( 0.9.2342.19200300.100.4.9 NAME 'documentSeries' SUP top
|
||||||
|
STRUCTURAL MUST commonName MAY ( description $ seeAlso $ telephonenumber $ l
|
||||||
|
ocalityName $ organizationName $ organizationalUnitName ) )
|
||||||
|
olcObjectClasses: ( 0.9.2342.19200300.100.4.13 NAME 'domain' SUP top STRUCT
|
||||||
|
URAL MUST domainComponent MAY ( associatedName $ organizationName $ descripti
|
||||||
|
on $ businessCategory $ seeAlso $ searchGuide $ userPassword $ localityName $
|
||||||
|
stateOrProvinceName $ streetAddress $ physicalDeliveryOfficeName $ postalAdd
|
||||||
|
ress $ postalCode $ postOfficeBox $ streetAddress $ facsimileTelephoneNumber
|
||||||
|
$ internationalISDNNumber $ telephoneNumber $ teletexTerminalIdentifier $ tel
|
||||||
|
exNumber $ preferredDeliveryMethod $ destinationIndicator $ registeredAddress
|
||||||
|
$ x121Address ) )
|
||||||
|
olcObjectClasses: ( 0.9.2342.19200300.100.4.14 NAME 'RFC822localPart' SUP d
|
||||||
|
omain STRUCTURAL MAY ( commonName $ surname $ description $ seeAlso $ telepho
|
||||||
|
neNumber $ physicalDeliveryOfficeName $ postalAddress $ postalCode $ postOffi
|
||||||
|
ceBox $ streetAddress $ facsimileTelephoneNumber $ internationalISDNNumber $
|
||||||
|
telephoneNumber $ teletexTerminalIdentifier $ telexNumber $ preferredDelivery
|
||||||
|
Method $ destinationIndicator $ registeredAddress $ x121Address ) )
|
||||||
|
olcObjectClasses: ( 0.9.2342.19200300.100.4.15 NAME 'dNSDomain' SUP domain
|
||||||
|
STRUCTURAL MAY ( ARecord $ MDRecord $ MXRecord $ NSRecord $ SOARecord $ CNAME
|
||||||
|
Record ) )
|
||||||
|
olcObjectClasses: ( 0.9.2342.19200300.100.4.17 NAME 'domainRelatedObject' D
|
||||||
|
ESC 'RFC1274: an object related to an domain' SUP top AUXILIARY MUST associat
|
||||||
|
edDomain )
|
||||||
|
olcObjectClasses: ( 0.9.2342.19200300.100.4.18 NAME 'friendlyCountry' SUP c
|
||||||
|
ountry STRUCTURAL MUST friendlyCountryName )
|
||||||
|
olcObjectClasses: ( 0.9.2342.19200300.100.4.20 NAME 'pilotOrganization' SU
|
||||||
|
P ( organization $ organizationalUnit ) STRUCTURAL MAY buildingName )
|
||||||
|
olcObjectClasses: ( 0.9.2342.19200300.100.4.21 NAME 'pilotDSA' SUP dsa STR
|
||||||
|
UCTURAL MAY dSAQuality )
|
||||||
|
olcObjectClasses: ( 0.9.2342.19200300.100.4.22 NAME 'qualityLabelledData'
|
||||||
|
SUP top AUXILIARY MUST dsaQuality MAY ( subtreeMinimumQuality $ subtreeMaximu
|
||||||
|
mQuality ) )
|
||||||
2571
docker/ldap/data/etc/schema/cosine.schema
Normal file
2571
docker/ldap/data/etc/schema/cosine.schema
Normal file
File diff suppressed because it is too large
Load Diff
83
docker/ldap/data/etc/schema/duaconf.ldif
Normal file
83
docker/ldap/data/etc/schema/duaconf.ldif
Normal file
@ -0,0 +1,83 @@
|
|||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
# DUA schema from draft-joslin-config-schema (a work in progress)
|
||||||
|
#
|
||||||
|
# This file was automatically generated from duaconf.schema; see that file
|
||||||
|
# for complete references.
|
||||||
|
#
|
||||||
|
dn: cn=duaconf,cn=schema,cn=config
|
||||||
|
objectClass: olcSchemaConfig
|
||||||
|
cn: duaconf
|
||||||
|
olcObjectIdentifier: {0}DUAConfSchemaOID 1.3.6.1.4.1.11.1.3.1
|
||||||
|
olcAttributeTypes: {0}( DUAConfSchemaOID:1.0 NAME 'defaultServerList' DESC 'De
|
||||||
|
fault LDAP server host address used by a DUA' EQUALITY caseIgnoreMatch SYNTAX
|
||||||
|
1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {1}( DUAConfSchemaOID:1.1 NAME 'defaultSearchBase' DESC 'De
|
||||||
|
fault LDAP base DN used by a DUA' EQUALITY distinguishedNameMatch SYNTAX 1.3.
|
||||||
|
6.1.4.1.1466.115.121.1.12 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {2}( DUAConfSchemaOID:1.2 NAME 'preferredServerList' DESC '
|
||||||
|
Preferred LDAP server host addresses to be used by a DUA' EQUALITY
|
||||||
|
caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {3}( DUAConfSchemaOID:1.3 NAME 'searchTimeLimit' DESC 'Maxi
|
||||||
|
mum time in seconds a DUA should allow for a search to complete' E
|
||||||
|
QUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {4}( DUAConfSchemaOID:1.4 NAME 'bindTimeLimit' DESC 'Maximu
|
||||||
|
m time in seconds a DUA should allow for the bind operation to com
|
||||||
|
plete' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALU
|
||||||
|
E )
|
||||||
|
olcAttributeTypes: {5}( DUAConfSchemaOID:1.5 NAME 'followReferrals' DESC 'Tell
|
||||||
|
s DUA if it should follow referrals returned by a DSA search resul
|
||||||
|
t' EQUALITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {6}( DUAConfSchemaOID:1.16 NAME 'dereferenceAliases' DESC '
|
||||||
|
Tells DUA if it should dereference aliases' EQUALITY booleanMatch SYNTAX 1.3.
|
||||||
|
6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {7}( DUAConfSchemaOID:1.6 NAME 'authenticationMethod' DESC
|
||||||
|
'A keystring which identifies the type of authentication method us
|
||||||
|
ed to contact the DSA' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.1
|
||||||
|
21.1.15 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {8}( DUAConfSchemaOID:1.7 NAME 'profileTTL' DESC 'Time to l
|
||||||
|
ive, in seconds, before a client DUA should re-read this configura
|
||||||
|
tion profile' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SING
|
||||||
|
LE-VALUE )
|
||||||
|
olcAttributeTypes: {9}( DUAConfSchemaOID:1.14 NAME 'serviceSearchDescriptor' D
|
||||||
|
ESC 'LDAP search descriptor list used by a DUA' EQUALITY caseExactMatch SYNTA
|
||||||
|
X 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
olcAttributeTypes: {10}( DUAConfSchemaOID:1.9 NAME 'attributeMap' DESC 'Attrib
|
||||||
|
ute mappings used by a DUA' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.14
|
||||||
|
66.115.121.1.26 )
|
||||||
|
olcAttributeTypes: {11}( DUAConfSchemaOID:1.10 NAME 'credentialLevel' DESC 'Id
|
||||||
|
entifies type of credentials a DUA should use when binding to the
|
||||||
|
LDAP server' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||||
|
SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {12}( DUAConfSchemaOID:1.11 NAME 'objectclassMap' DESC 'Obj
|
||||||
|
ectclass mappings used by a DUA' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4
|
||||||
|
.1.1466.115.121.1.26 )
|
||||||
|
olcAttributeTypes: {13}( DUAConfSchemaOID:1.12 NAME 'defaultSearchScope' DESC
|
||||||
|
'Default search scope used by a DUA' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6
|
||||||
|
.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {14}( DUAConfSchemaOID:1.13 NAME 'serviceCredentialLevel' D
|
||||||
|
ESC 'Identifies type of credentials a DUA should use when binding
|
||||||
|
to the LDAP server for a specific service' EQUALITY caseIgnoreIA5M
|
||||||
|
atch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
olcAttributeTypes: {15}( DUAConfSchemaOID:1.15 NAME 'serviceAuthenticationMeth
|
||||||
|
od' DESC 'Authentication method used by a service of the DUA' EQUALITY caseIg
|
||||||
|
noreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
olcObjectClasses: {0}( DUAConfSchemaOID:2.5 NAME 'DUAConfigProfile' DESC 'Abst
|
||||||
|
raction of a base configuration for a DUA' SUP top STRUCTURAL MUST cn MAY ( d
|
||||||
|
efaultServerList $ preferredServerList $ defaultSearchBase $ defaultSearchSco
|
||||||
|
pe $ searchTimeLimit $ bindTimeLimit $ credentialLevel $ authenticationMethod
|
||||||
|
$ followReferrals $ dereferenceAliases $ serviceSearchDescriptor $ serviceCr
|
||||||
|
edentialLevel $ serviceAuthenticationMethod $ objectclassMap $ attributeMap $
|
||||||
|
profileTTL ) )
|
||||||
261
docker/ldap/data/etc/schema/duaconf.schema
Normal file
261
docker/ldap/data/etc/schema/duaconf.schema
Normal file
@ -0,0 +1,261 @@
|
|||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
|
||||||
|
# DUA schema from draft-joslin-config-schema (a work in progress)
|
||||||
|
|
||||||
|
# Contents of this file are subject to change (including deletion)
|
||||||
|
# without notice.
|
||||||
|
#
|
||||||
|
# Not recommended for production use!
|
||||||
|
# Use with extreme caution!
|
||||||
|
|
||||||
|
## Notes:
|
||||||
|
## - The matching rule for attributes followReferrals and dereferenceAliases
|
||||||
|
## has been changed to booleanMatch since their syntax is boolean
|
||||||
|
## - There was a typo in the name of the dereferenceAliases attributeType
|
||||||
|
## in the DUAConfigProfile objectClass definition
|
||||||
|
## - Credit goes to the original Authors
|
||||||
|
|
||||||
|
#
|
||||||
|
# Application Working Group M. Ansari
|
||||||
|
# INTERNET-DRAFT Sun Microsystems, Inc.
|
||||||
|
# Expires Febuary 2003 L. Howard
|
||||||
|
# PADL Software Pty. Ltd.
|
||||||
|
# B. Joslin [ed.]
|
||||||
|
# Hewlett-Packard Company
|
||||||
|
#
|
||||||
|
# September 15th, 2003
|
||||||
|
# Intended Category: Informational
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# A Configuration Schema for LDAP Based
|
||||||
|
# Directory User Agents
|
||||||
|
# <draft-joslin-config-schema-07.txt>
|
||||||
|
#
|
||||||
|
#Status of this Memo
|
||||||
|
#
|
||||||
|
# This memo provides information for the Internet community. This
|
||||||
|
# memo does not specify an Internet standard of any kind. Distribu-
|
||||||
|
# tion of this memo is unlimited.
|
||||||
|
#
|
||||||
|
# This document is an Internet-Draft and is in full conformance with
|
||||||
|
# all provisions of Section 10 of RFC2026.
|
||||||
|
#
|
||||||
|
# This document is an Internet-Draft. Internet-Drafts are working
|
||||||
|
# documents of the Internet Engineering Task Force (IETF), its areas,
|
||||||
|
# and its working groups. Note that other groups may also distribute
|
||||||
|
# working documents as Internet-Drafts.
|
||||||
|
#
|
||||||
|
# Internet-Drafts are draft documents valid for a maximum of six
|
||||||
|
# months. Internet-Drafts may be updated, replaced, or made obsolete
|
||||||
|
# by other documents at any time. It is not appropriate to use
|
||||||
|
# Internet-Drafts as reference material or to cite them other than as
|
||||||
|
# a "working draft" or "work in progress".
|
||||||
|
#
|
||||||
|
# To learn the current status of any Internet-Draft, please check the
|
||||||
|
# 1id-abstracts.txt listing contained in the Internet-Drafts Shadow
|
||||||
|
# Directories on ds.internic.net (US East Coast), nic.nordu.net
|
||||||
|
# (Europe), ftp.isi.edu (US West Coast), or munnari.oz.au (Pacific
|
||||||
|
# Rim).
|
||||||
|
#
|
||||||
|
# Distribution of this document is unlimited.
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Abstract
|
||||||
|
#
|
||||||
|
# This document describes a mechanism for global configuration of
|
||||||
|
# similar directory user agents. This document defines a schema for
|
||||||
|
# configuration of these DUAs that may be discovered using the Light-
|
||||||
|
# weight Directory Access Protocol in RFC 2251[17]. A set of attri-
|
||||||
|
# bute types and an objectclass are proposed, along with specific
|
||||||
|
# guidelines for interpreting them. A significant feature of the
|
||||||
|
# global configuration policy for DUAs is a mechanism that allows
|
||||||
|
# DUAs to re-configure their schema to that of the end user's
|
||||||
|
# environment. This configuration is achieved through attribute and
|
||||||
|
# objectclass mapping. This document is intended to be a skeleton
|
||||||
|
# for future documents that describe configuration of specific DUA
|
||||||
|
# services.
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# [trimmed]
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# 2. General Issues
|
||||||
|
#
|
||||||
|
# The schema defined by this document is defined under the "DUA Con-
|
||||||
|
# figuration Schema." This schema is derived from the OID: iso (1)
|
||||||
|
# org (3) dod (6) internet (1) private (4) enterprises (1) Hewlett-
|
||||||
|
# Packard Company (11) directory (1) LDAP-UX Integration Project (3)
|
||||||
|
# DUA Configuration Schema (1). This OID is represented in this
|
||||||
|
# document by the keystring "DUAConfSchemaOID"
|
||||||
|
# (1.3.6.1.4.1.11.1.3.1).
|
||||||
|
objectidentifier DUAConfSchemaOID 1.3.6.1.4.1.11.1.3.1
|
||||||
|
#
|
||||||
|
# 2.2 Attributes
|
||||||
|
#
|
||||||
|
# The attributes and classes defined in this document are summarized
|
||||||
|
# below.
|
||||||
|
#
|
||||||
|
# The following attributes are defined in this document:
|
||||||
|
#
|
||||||
|
# preferredServerList
|
||||||
|
# defaultServerList
|
||||||
|
# defaultSearchBase
|
||||||
|
# defaultSearchScope
|
||||||
|
# authenticationMethod
|
||||||
|
# credentialLevel
|
||||||
|
# serviceSearchDescriptor
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Joslin [Page 3]
|
||||||
|
# Internet-Draft DUA Configuration Schema October 2002
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# serviceCredentialLevel
|
||||||
|
# serviceAuthenticationMethod
|
||||||
|
# attributeMap
|
||||||
|
# objectclassMap
|
||||||
|
# searchTimeLimit
|
||||||
|
# bindTimeLimit
|
||||||
|
# followReferrals
|
||||||
|
# dereferenceAliases
|
||||||
|
# profileTTL
|
||||||
|
#
|
||||||
|
# 2.3 Object Classes
|
||||||
|
#
|
||||||
|
# The following object class is defined in this document:
|
||||||
|
#
|
||||||
|
# DUAConfigProfile
|
||||||
|
#
|
||||||
|
#
|
||||||
|
attributeType ( DUAConfSchemaOID:1.0 NAME 'defaultServerList'
|
||||||
|
DESC 'Default LDAP server host address used by a DUA'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributeType ( DUAConfSchemaOID:1.1 NAME 'defaultSearchBase'
|
||||||
|
DESC 'Default LDAP base DN used by a DUA'
|
||||||
|
EQUALITY distinguishedNameMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributeType ( DUAConfSchemaOID:1.2 NAME 'preferredServerList'
|
||||||
|
DESC 'Preferred LDAP server host addresses to be used by a
|
||||||
|
DUA'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributeType ( DUAConfSchemaOID:1.3 NAME 'searchTimeLimit'
|
||||||
|
DESC 'Maximum time in seconds a DUA should allow for a
|
||||||
|
search to complete'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributeType ( DUAConfSchemaOID:1.4 NAME 'bindTimeLimit'
|
||||||
|
DESC 'Maximum time in seconds a DUA should allow for the
|
||||||
|
bind operation to complete'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributeType ( DUAConfSchemaOID:1.5 NAME 'followReferrals'
|
||||||
|
DESC 'Tells DUA if it should follow referrals
|
||||||
|
returned by a DSA search result'
|
||||||
|
EQUALITY booleanMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributeType ( DUAConfSchemaOID:1.16 NAME 'dereferenceAliases'
|
||||||
|
DESC 'Tells DUA if it should dereference aliases'
|
||||||
|
EQUALITY booleanMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributeType ( DUAConfSchemaOID:1.6 NAME 'authenticationMethod'
|
||||||
|
DESC 'A keystring which identifies the type of
|
||||||
|
authentication method used to contact the DSA'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributeType ( DUAConfSchemaOID:1.7 NAME 'profileTTL'
|
||||||
|
DESC 'Time to live, in seconds, before a client DUA
|
||||||
|
should re-read this configuration profile'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributeType ( DUAConfSchemaOID:1.14 NAME 'serviceSearchDescriptor'
|
||||||
|
DESC 'LDAP search descriptor list used by a DUA'
|
||||||
|
EQUALITY caseExactMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
|
||||||
|
attributeType ( DUAConfSchemaOID:1.9 NAME 'attributeMap'
|
||||||
|
DESC 'Attribute mappings used by a DUA'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
|
||||||
|
attributeType ( DUAConfSchemaOID:1.10 NAME 'credentialLevel'
|
||||||
|
DESC 'Identifies type of credentials a DUA should
|
||||||
|
use when binding to the LDAP server'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributeType ( DUAConfSchemaOID:1.11 NAME 'objectclassMap'
|
||||||
|
DESC 'Objectclass mappings used by a DUA'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
|
||||||
|
attributeType ( DUAConfSchemaOID:1.12 NAME 'defaultSearchScope'
|
||||||
|
DESC 'Default search scope used by a DUA'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributeType ( DUAConfSchemaOID:1.13 NAME 'serviceCredentialLevel'
|
||||||
|
DESC 'Identifies type of credentials a DUA
|
||||||
|
should use when binding to the LDAP server for a
|
||||||
|
specific service'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
|
||||||
|
attributeType ( DUAConfSchemaOID:1.15 NAME 'serviceAuthenticationMethod'
|
||||||
|
DESC 'Authentication method used by a service of the DUA'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
#
|
||||||
|
# 4. Class Definition
|
||||||
|
#
|
||||||
|
# The objectclass below is constructed from the attributes defined in
|
||||||
|
# 3, with the exception of the cn attribute, which is defined in RFC
|
||||||
|
# 2256 [8]. cn is used to represent the name of the DUA configura-
|
||||||
|
# tion profile.
|
||||||
|
#
|
||||||
|
objectClass ( DUAConfSchemaOID:2.5 NAME 'DUAConfigProfile'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
DESC 'Abstraction of a base configuration for a DUA'
|
||||||
|
MUST ( cn )
|
||||||
|
MAY ( defaultServerList $ preferredServerList $
|
||||||
|
defaultSearchBase $ defaultSearchScope $
|
||||||
|
searchTimeLimit $ bindTimeLimit $
|
||||||
|
credentialLevel $ authenticationMethod $
|
||||||
|
followReferrals $ dereferenceAliases $
|
||||||
|
serviceSearchDescriptor $ serviceCredentialLevel $
|
||||||
|
serviceAuthenticationMethod $ objectclassMap $
|
||||||
|
attributeMap $ profileTTL ) )
|
||||||
71
docker/ldap/data/etc/schema/dyngroup.ldif
Normal file
71
docker/ldap/data/etc/schema/dyngroup.ldif
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
# dyngroup.schema -- Dynamic Group schema
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
# Dynamic Group schema (experimental), as defined by Netscape. See
|
||||||
|
# http://www.redhat.com/docs/manuals/ent-server/pdf/esadmin611.pdf
|
||||||
|
# page 70 for details on how these groups were used.
|
||||||
|
#
|
||||||
|
# A description of the objectclass definition is available here:
|
||||||
|
# http://www.redhat.com/docs/manuals/dir-server/schema/7.1/oc_dir.html#1303745
|
||||||
|
#
|
||||||
|
# depends upon:
|
||||||
|
# core.schema
|
||||||
|
#
|
||||||
|
# These definitions are considered experimental due to the lack of
|
||||||
|
# a formal specification (e.g., RFC).
|
||||||
|
#
|
||||||
|
# NOT RECOMMENDED FOR PRODUCTION USE! USE WITH CAUTION!
|
||||||
|
#
|
||||||
|
# The Netscape documentation describes this as an auxiliary objectclass
|
||||||
|
# but their implementations have always defined it as a structural class.
|
||||||
|
# The sloppiness here is because Netscape-derived servers don't actually
|
||||||
|
# implement the X.500 data model, and they don't honor the distinction
|
||||||
|
# between structural and auxiliary classes. This fact is noted here:
|
||||||
|
# http://forum.java.sun.com/thread.jspa?threadID=5016864&messageID=9034636
|
||||||
|
#
|
||||||
|
# In accordance with other existing implementations, we define it as a
|
||||||
|
# structural class.
|
||||||
|
#
|
||||||
|
# Our definition of memberURL also does not match theirs but again
|
||||||
|
# their published definition and what works in practice do not agree.
|
||||||
|
# In other words, the Netscape definitions are broken and interoperability
|
||||||
|
# is not guaranteed.
|
||||||
|
#
|
||||||
|
# Also see the new DynGroup proposed spec at
|
||||||
|
# http://tools.ietf.org/html/draft-haripriya-dynamicgroup-02
|
||||||
|
dn: cn=dyngroup,cn=schema,cn=config
|
||||||
|
objectClass: olcSchemaConfig
|
||||||
|
cn: dyngroup
|
||||||
|
olcObjectIdentifier: {0}NetscapeRoot 2.16.840.1.113730
|
||||||
|
olcObjectIdentifier: {1}NetscapeLDAP NetscapeRoot:3
|
||||||
|
olcObjectIdentifier: {2}NetscapeLDAPattributeType NetscapeLDAP:1
|
||||||
|
olcObjectIdentifier: {3}NetscapeLDAPobjectClass NetscapeLDAP:2
|
||||||
|
olcObjectIdentifier: {4}OpenLDAPExp11 1.3.6.1.4.1.4203.666.11
|
||||||
|
olcObjectIdentifier: {5}DynGroupBase OpenLDAPExp11:8
|
||||||
|
olcObjectIdentifier: {6}DynGroupAttr DynGroupBase:1
|
||||||
|
olcObjectIdentifier: {7}DynGroupOC DynGroupBase:2
|
||||||
|
olcAttributeTypes: {0}( NetscapeLDAPattributeType:198 NAME 'memberURL' DESC 'I
|
||||||
|
dentifies an URL associated with each member of a group. Any type of labeled
|
||||||
|
URL can be used.' SUP labeledURI )
|
||||||
|
olcAttributeTypes: {1}( DynGroupAttr:1 NAME 'dgIdentity' DESC 'Identity to use
|
||||||
|
when processing the memberURL' SUP distinguishedName SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {2}( DynGroupAttr:2 NAME 'dgAuthz' DESC 'Optional authoriza
|
||||||
|
tion rules that determine who is allowed to assume the dgIdentity' EQUALITY a
|
||||||
|
uthzMatch SYNTAX 1.3.6.1.4.1.4203.666.2.7 X-ORDERED 'VALUES' )
|
||||||
|
olcObjectClasses: {0}( NetscapeLDAPobjectClass:33 NAME 'groupOfURLs' SUP top S
|
||||||
|
TRUCTURAL MUST cn MAY ( memberURL $ businessCategory $ description $ o $ ou $
|
||||||
|
owner $ seeAlso ) )
|
||||||
|
olcObjectClasses: {1}( DynGroupOC:1 NAME 'dgIdentityAux' SUP top AUXILIARY MAY
|
||||||
|
( dgIdentity $ dgAuthz ) )
|
||||||
91
docker/ldap/data/etc/schema/dyngroup.schema
Normal file
91
docker/ldap/data/etc/schema/dyngroup.schema
Normal file
@ -0,0 +1,91 @@
|
|||||||
|
# dyngroup.schema -- Dynamic Group schema
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
# Dynamic Group schema (experimental), as defined by Netscape. See
|
||||||
|
# http://www.redhat.com/docs/manuals/ent-server/pdf/esadmin611.pdf
|
||||||
|
# page 70 for details on how these groups were used.
|
||||||
|
#
|
||||||
|
# A description of the objectclass definition is available here:
|
||||||
|
# http://www.redhat.com/docs/manuals/dir-server/schema/7.1/oc_dir.html#1303745
|
||||||
|
#
|
||||||
|
# depends upon:
|
||||||
|
# core.schema
|
||||||
|
#
|
||||||
|
# These definitions are considered experimental due to the lack of
|
||||||
|
# a formal specification (e.g., RFC).
|
||||||
|
#
|
||||||
|
# NOT RECOMMENDED FOR PRODUCTION USE! USE WITH CAUTION!
|
||||||
|
#
|
||||||
|
# The Netscape documentation describes this as an auxiliary objectclass
|
||||||
|
# but their implementations have always defined it as a structural class.
|
||||||
|
# The sloppiness here is because Netscape-derived servers don't actually
|
||||||
|
# implement the X.500 data model, and they don't honor the distinction
|
||||||
|
# between structural and auxiliary classes. This fact is noted here:
|
||||||
|
# http://forum.java.sun.com/thread.jspa?threadID=5016864&messageID=9034636
|
||||||
|
#
|
||||||
|
# In accordance with other existing implementations, we define it as a
|
||||||
|
# structural class.
|
||||||
|
#
|
||||||
|
# Our definition of memberURL also does not match theirs but again
|
||||||
|
# their published definition and what works in practice do not agree.
|
||||||
|
# In other words, the Netscape definitions are broken and interoperability
|
||||||
|
# is not guaranteed.
|
||||||
|
#
|
||||||
|
# Also see the new DynGroup proposed spec at
|
||||||
|
# http://tools.ietf.org/html/draft-haripriya-dynamicgroup-02
|
||||||
|
|
||||||
|
objectIdentifier NetscapeRoot 2.16.840.1.113730
|
||||||
|
|
||||||
|
objectIdentifier NetscapeLDAP NetscapeRoot:3
|
||||||
|
objectIdentifier NetscapeLDAPattributeType NetscapeLDAP:1
|
||||||
|
objectIdentifier NetscapeLDAPobjectClass NetscapeLDAP:2
|
||||||
|
|
||||||
|
objectIdentifier OpenLDAPExp11 1.3.6.1.4.1.4203.666.11
|
||||||
|
objectIdentifier DynGroupBase OpenLDAPExp11:8
|
||||||
|
objectIdentifier DynGroupAttr DynGroupBase:1
|
||||||
|
objectIdentifier DynGroupOC DynGroupBase:2
|
||||||
|
|
||||||
|
attributetype ( NetscapeLDAPattributeType:198
|
||||||
|
NAME 'memberURL'
|
||||||
|
DESC 'Identifies an URL associated with each member of a group. Any type of labeled URL can be used.'
|
||||||
|
SUP labeledURI )
|
||||||
|
|
||||||
|
attributetype ( DynGroupAttr:1
|
||||||
|
NAME 'dgIdentity'
|
||||||
|
DESC 'Identity to use when processing the memberURL'
|
||||||
|
SUP distinguishedName SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributeType ( DynGroupAttr:2
|
||||||
|
NAME 'dgAuthz'
|
||||||
|
DESC 'Optional authorization rules that determine who is allowed to assume the dgIdentity'
|
||||||
|
EQUALITY authzMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.4203.666.2.7
|
||||||
|
X-ORDERED 'VALUES' )
|
||||||
|
|
||||||
|
objectClass ( NetscapeLDAPobjectClass:33
|
||||||
|
NAME 'groupOfURLs'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST cn
|
||||||
|
MAY ( memberURL $ businessCategory $ description $ o $ ou $
|
||||||
|
owner $ seeAlso ) )
|
||||||
|
|
||||||
|
# The Haripriya dyngroup schema still needs a lot of work.
|
||||||
|
# We're just adding support for the dgIdentity attribute for now...
|
||||||
|
objectClass ( DynGroupOC:1
|
||||||
|
NAME 'dgIdentityAux'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MAY ( dgIdentity $ dgAuthz ) )
|
||||||
|
|
||||||
|
|
||||||
69
docker/ldap/data/etc/schema/inetorgperson.ldif
Normal file
69
docker/ldap/data/etc/schema/inetorgperson.ldif
Normal file
@ -0,0 +1,69 @@
|
|||||||
|
# InetOrgPerson (RFC2798)
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
# InetOrgPerson (RFC2798)
|
||||||
|
#
|
||||||
|
# Depends upon
|
||||||
|
# Definition of an X.500 Attribute Type and an Object Class to Hold
|
||||||
|
# Uniform Resource Identifiers (URIs) [RFC2079]
|
||||||
|
# (core.ldif)
|
||||||
|
#
|
||||||
|
# A Summary of the X.500(96) User Schema for use with LDAPv3 [RFC2256]
|
||||||
|
# (core.ldif)
|
||||||
|
#
|
||||||
|
# The COSINE and Internet X.500 Schema [RFC1274] (cosine.ldif)
|
||||||
|
#
|
||||||
|
# This file was automatically generated from inetorgperson.schema; see
|
||||||
|
# that file for complete references.
|
||||||
|
#
|
||||||
|
dn: cn=inetorgperson,cn=schema,cn=config
|
||||||
|
objectClass: olcSchemaConfig
|
||||||
|
cn: inetorgperson
|
||||||
|
olcAttributeTypes: ( 2.16.840.1.113730.3.1.1 NAME 'carLicense' DESC 'RFC279
|
||||||
|
8: vehicle license or registration plate' EQUALITY caseIgnoreMatch SUBSTR cas
|
||||||
|
eIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
olcAttributeTypes: ( 2.16.840.1.113730.3.1.2 NAME 'departmentNumber' DESC '
|
||||||
|
RFC2798: identifies a department within an organization' EQUALITY caseIgnoreM
|
||||||
|
atch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
olcAttributeTypes: ( 2.16.840.1.113730.3.1.241 NAME 'displayName' DESC 'RFC
|
||||||
|
2798: preferred name to be used when displaying entries' EQUALITY caseIgnoreM
|
||||||
|
atch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SI
|
||||||
|
NGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 2.16.840.1.113730.3.1.3 NAME 'employeeNumber' DESC 'RF
|
||||||
|
C2798: numerically identifies an employee within an organization' EQUALITY ca
|
||||||
|
seIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.12
|
||||||
|
1.1.15 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 2.16.840.1.113730.3.1.4 NAME 'employeeType' DESC 'RFC2
|
||||||
|
798: type of employment for a person' EQUALITY caseIgnoreMatch SUBSTR caseIgn
|
||||||
|
oreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
olcAttributeTypes: ( 0.9.2342.19200300.100.1.60 NAME 'jpegPhoto' DESC 'RFC2
|
||||||
|
798: a JPEG image' SYNTAX 1.3.6.1.4.1.1466.115.121.1.28 )
|
||||||
|
olcAttributeTypes: ( 2.16.840.1.113730.3.1.39 NAME 'preferredLanguage' DESC
|
||||||
|
'RFC2798: preferred written or spoken language for a person' EQUALITY caseIg
|
||||||
|
noreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.
|
||||||
|
15 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 2.16.840.1.113730.3.1.40 NAME 'userSMIMECertificate' D
|
||||||
|
ESC 'RFC2798: PKCS#7 SignedData used to support S/MIME' SYNTAX 1.3.6.1.4.1.14
|
||||||
|
66.115.121.1.5 )
|
||||||
|
olcAttributeTypes: ( 2.16.840.1.113730.3.1.216 NAME 'userPKCS12' DESC 'RFC2
|
||||||
|
798: personal identity information, a PKCS #12 PFX' SYNTAX 1.3.6.1.4.1.1466.1
|
||||||
|
15.121.1.5 )
|
||||||
|
olcObjectClasses: ( 2.16.840.1.113730.3.2.2 NAME 'inetOrgPerson' DESC 'RFC2
|
||||||
|
798: Internet Organizational Person' SUP organizationalPerson STRUCTURAL MAY
|
||||||
|
( audio $ businessCategory $ carLicense $ departmentNumber $ displayName $ em
|
||||||
|
ployeeNumber $ employeeType $ givenName $ homePhone $ homePostalAddress $ ini
|
||||||
|
tials $ jpegPhoto $ labeledURI $ mail $ manager $ mobile $ o $ pager $ photo
|
||||||
|
$ roomNumber $ secretary $ uid $ userCertificate $ x500uniqueIdentifier $ pre
|
||||||
|
ferredLanguage $ userSMIMECertificate $ userPKCS12 ) )
|
||||||
155
docker/ldap/data/etc/schema/inetorgperson.schema
Normal file
155
docker/ldap/data/etc/schema/inetorgperson.schema
Normal file
@ -0,0 +1,155 @@
|
|||||||
|
# inetorgperson.schema -- InetOrgPerson (RFC2798)
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
# InetOrgPerson (RFC2798)
|
||||||
|
#
|
||||||
|
# Depends upon
|
||||||
|
# Definition of an X.500 Attribute Type and an Object Class to Hold
|
||||||
|
# Uniform Resource Identifiers (URIs) [RFC2079]
|
||||||
|
# (core.schema)
|
||||||
|
#
|
||||||
|
# A Summary of the X.500(96) User Schema for use with LDAPv3 [RFC2256]
|
||||||
|
# (core.schema)
|
||||||
|
#
|
||||||
|
# The COSINE and Internet X.500 Schema [RFC1274] (cosine.schema)
|
||||||
|
|
||||||
|
# carLicense
|
||||||
|
# This multivalued field is used to record the values of the license or
|
||||||
|
# registration plate associated with an individual.
|
||||||
|
attributetype ( 2.16.840.1.113730.3.1.1
|
||||||
|
NAME 'carLicense'
|
||||||
|
DESC 'RFC2798: vehicle license or registration plate'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
|
||||||
|
# departmentNumber
|
||||||
|
# Code for department to which a person belongs. This can also be
|
||||||
|
# strictly numeric (e.g., 1234) or alphanumeric (e.g., ABC/123).
|
||||||
|
attributetype ( 2.16.840.1.113730.3.1.2
|
||||||
|
NAME 'departmentNumber'
|
||||||
|
DESC 'RFC2798: identifies a department within an organization'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
|
||||||
|
# displayName
|
||||||
|
# When displaying an entry, especially within a one-line summary list, it
|
||||||
|
# is useful to be able to identify a name to be used. Since other attri-
|
||||||
|
# bute types such as 'cn' are multivalued, an additional attribute type is
|
||||||
|
# needed. Display name is defined for this purpose.
|
||||||
|
attributetype ( 2.16.840.1.113730.3.1.241
|
||||||
|
NAME 'displayName'
|
||||||
|
DESC 'RFC2798: preferred name to be used when displaying entries'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
# employeeNumber
|
||||||
|
# Numeric or alphanumeric identifier assigned to a person, typically based
|
||||||
|
# on order of hire or association with an organization. Single valued.
|
||||||
|
attributetype ( 2.16.840.1.113730.3.1.3
|
||||||
|
NAME 'employeeNumber'
|
||||||
|
DESC 'RFC2798: numerically identifies an employee within an organization'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
# employeeType
|
||||||
|
# Used to identify the employer to employee relationship. Typical values
|
||||||
|
# used will be "Contractor", "Employee", "Intern", "Temp", "External", and
|
||||||
|
# "Unknown" but any value may be used.
|
||||||
|
attributetype ( 2.16.840.1.113730.3.1.4
|
||||||
|
NAME 'employeeType'
|
||||||
|
DESC 'RFC2798: type of employment for a person'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
|
||||||
|
# jpegPhoto
|
||||||
|
# Used to store one or more images of a person using the JPEG File
|
||||||
|
# Interchange Format [JFIF].
|
||||||
|
# Note that the jpegPhoto attribute type was defined for use in the
|
||||||
|
# Internet X.500 pilots but no referencable definition for it could be
|
||||||
|
# located.
|
||||||
|
attributetype ( 0.9.2342.19200300.100.1.60
|
||||||
|
NAME 'jpegPhoto'
|
||||||
|
DESC 'RFC2798: a JPEG image'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.28 )
|
||||||
|
|
||||||
|
# preferredLanguage
|
||||||
|
# Used to indicate an individual's preferred written or spoken
|
||||||
|
# language. This is useful for international correspondence or human-
|
||||||
|
# computer interaction. Values for this attribute type MUST conform to
|
||||||
|
# the definition of the Accept-Language header field defined in
|
||||||
|
# [RFC2068] with one exception: the sequence "Accept-Language" ":"
|
||||||
|
# should be omitted. This is a single valued attribute type.
|
||||||
|
attributetype ( 2.16.840.1.113730.3.1.39
|
||||||
|
NAME 'preferredLanguage'
|
||||||
|
DESC 'RFC2798: preferred written or spoken language for a person'
|
||||||
|
EQUALITY caseIgnoreMatch
|
||||||
|
SUBSTR caseIgnoreSubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
# userSMIMECertificate
|
||||||
|
# A PKCS#7 [RFC2315] SignedData, where the content that is signed is
|
||||||
|
# ignored by consumers of userSMIMECertificate values. It is
|
||||||
|
# recommended that values have a `contentType' of data with an absent
|
||||||
|
# `content' field. Values of this attribute contain a person's entire
|
||||||
|
# certificate chain and an smimeCapabilities field [RFC2633] that at a
|
||||||
|
# minimum describes their SMIME algorithm capabilities. Values for
|
||||||
|
# this attribute are to be stored and requested in binary form, as
|
||||||
|
# 'userSMIMECertificate;binary'. If available, this attribute is
|
||||||
|
# preferred over the userCertificate attribute for S/MIME applications.
|
||||||
|
## OpenLDAP note: ";binary" transfer should NOT be used as syntax is binary
|
||||||
|
attributetype ( 2.16.840.1.113730.3.1.40
|
||||||
|
NAME 'userSMIMECertificate'
|
||||||
|
DESC 'RFC2798: PKCS#7 SignedData used to support S/MIME'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.5 )
|
||||||
|
|
||||||
|
# userPKCS12
|
||||||
|
# PKCS #12 [PKCS12] provides a format for exchange of personal identity
|
||||||
|
# information. When such information is stored in a directory service,
|
||||||
|
# the userPKCS12 attribute should be used. This attribute is to be stored
|
||||||
|
# and requested in binary form, as 'userPKCS12;binary'. The attribute
|
||||||
|
# values are PFX PDUs stored as binary data.
|
||||||
|
## OpenLDAP note: ";binary" transfer should NOT be used as syntax is binary
|
||||||
|
attributetype ( 2.16.840.1.113730.3.1.216
|
||||||
|
NAME 'userPKCS12'
|
||||||
|
DESC 'RFC2798: personal identity information, a PKCS #12 PFX'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.5 )
|
||||||
|
|
||||||
|
|
||||||
|
# inetOrgPerson
|
||||||
|
# The inetOrgPerson represents people who are associated with an
|
||||||
|
# organization in some way. It is a structural class and is derived
|
||||||
|
# from the organizationalPerson which is defined in X.521 [X521].
|
||||||
|
objectclass ( 2.16.840.1.113730.3.2.2
|
||||||
|
NAME 'inetOrgPerson'
|
||||||
|
DESC 'RFC2798: Internet Organizational Person'
|
||||||
|
SUP organizationalPerson
|
||||||
|
STRUCTURAL
|
||||||
|
MAY (
|
||||||
|
audio $ businessCategory $ carLicense $ departmentNumber $
|
||||||
|
displayName $ employeeNumber $ employeeType $ givenName $
|
||||||
|
homePhone $ homePostalAddress $ initials $ jpegPhoto $
|
||||||
|
labeledURI $ mail $ manager $ mobile $ o $ pager $
|
||||||
|
photo $ roomNumber $ secretary $ uid $ userCertificate $
|
||||||
|
x500uniqueIdentifier $ preferredLanguage $
|
||||||
|
userSMIMECertificate $ userPKCS12 )
|
||||||
|
)
|
||||||
59
docker/ldap/data/etc/schema/java.ldif
Normal file
59
docker/ldap/data/etc/schema/java.ldif
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
# java.ldif -- Java Object Schema
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
# Java Object Schema (defined in RFC 2713)
|
||||||
|
# depends upon core.ldif
|
||||||
|
#
|
||||||
|
# This file was automatically generated from java.schema; see that file
|
||||||
|
# for complete references.
|
||||||
|
#
|
||||||
|
dn: cn=java,cn=schema,cn=config
|
||||||
|
objectClass: olcSchemaConfig
|
||||||
|
cn: java
|
||||||
|
olcAttributeTypes: {0}( 1.3.6.1.4.1.42.2.27.4.1.6 NAME 'javaClassName' DESC 'F
|
||||||
|
ully qualified name of distinguished Java class or interface' EQUALITY caseEx
|
||||||
|
actMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {1}( 1.3.6.1.4.1.42.2.27.4.1.7 NAME 'javaCodebase' DESC 'UR
|
||||||
|
L(s) specifying the location of class definition' EQUALITY caseExactIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
olcAttributeTypes: {2}( 1.3.6.1.4.1.42.2.27.4.1.13 NAME 'javaClassNames' DESC
|
||||||
|
'Fully qualified Java class or interface name' EQUALITY caseExactMatch SYNTAX
|
||||||
|
1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
olcAttributeTypes: {3}( 1.3.6.1.4.1.42.2.27.4.1.8 NAME 'javaSerializedData' DE
|
||||||
|
SC 'Serialized form of a Java object' SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 SI
|
||||||
|
NGLE-VALUE )
|
||||||
|
olcAttributeTypes: {4}( 1.3.6.1.4.1.42.2.27.4.1.10 NAME 'javaFactory' DESC 'Fu
|
||||||
|
lly qualified Java class name of a JNDI object factory' EQUALITY caseExactMat
|
||||||
|
ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {5}( 1.3.6.1.4.1.42.2.27.4.1.11 NAME 'javaReferenceAddress'
|
||||||
|
DESC 'Addresses associated with a JNDI Reference' EQUALITY caseExactMatch SY
|
||||||
|
NTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
olcAttributeTypes: {6}( 1.3.6.1.4.1.42.2.27.4.1.12 NAME 'javaDoc' DESC 'The Ja
|
||||||
|
va documentation for the class' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1
|
||||||
|
.1466.115.121.1.26 )
|
||||||
|
olcObjectClasses: {0}( 1.3.6.1.4.1.42.2.27.4.2.1 NAME 'javaContainer' DESC 'Co
|
||||||
|
ntainer for a Java object' SUP top STRUCTURAL MUST cn )
|
||||||
|
olcObjectClasses: {1}( 1.3.6.1.4.1.42.2.27.4.2.4 NAME 'javaObject' DESC 'Java
|
||||||
|
object representation' SUP top ABSTRACT MUST javaClassName MAY ( javaClassNam
|
||||||
|
es $ javaCodebase $ javaDoc $ description ) )
|
||||||
|
olcObjectClasses: {2}( 1.3.6.1.4.1.42.2.27.4.2.5 NAME 'javaSerializedObject' D
|
||||||
|
ESC 'Java serialized object' SUP javaObject AUXILIARY MUST javaSerializedData
|
||||||
|
)
|
||||||
|
olcObjectClasses: {3}( 1.3.6.1.4.1.42.2.27.4.2.8 NAME 'javaMarshalledObject' D
|
||||||
|
ESC 'Java marshalled object' SUP javaObject AUXILIARY MUST javaSerializedData
|
||||||
|
)
|
||||||
|
olcObjectClasses: {4}( 1.3.6.1.4.1.42.2.27.4.2.7 NAME 'javaNamingReference' DE
|
||||||
|
SC 'JNDI reference' SUP javaObject AUXILIARY MAY ( javaReferenceAddress $ jav
|
||||||
|
aFactory ) )
|
||||||
403
docker/ldap/data/etc/schema/java.schema
Normal file
403
docker/ldap/data/etc/schema/java.schema
Normal file
@ -0,0 +1,403 @@
|
|||||||
|
# java.schema -- Java Object Schema
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
# Java Object Schema (defined in RFC 2713)
|
||||||
|
# depends upon core.schema
|
||||||
|
#
|
||||||
|
|
||||||
|
# Network Working Group V. Ryan
|
||||||
|
# Request for Comments: 2713 S. Seligman
|
||||||
|
# Category: Informational R. Lee
|
||||||
|
# Sun Microsystems, Inc.
|
||||||
|
# October 1999
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Schema for Representing Java(tm) Objects in an LDAP Directory
|
||||||
|
#
|
||||||
|
# Status of this Memo
|
||||||
|
#
|
||||||
|
# This memo provides information for the Internet community. It does
|
||||||
|
# not specify an Internet standard of any kind. Distribution of this
|
||||||
|
# memo is unlimited.
|
||||||
|
#
|
||||||
|
# Copyright Notice
|
||||||
|
#
|
||||||
|
# Copyright (C) The Internet Society (1999). All Rights Reserved.
|
||||||
|
#
|
||||||
|
# Abstract
|
||||||
|
#
|
||||||
|
# This document defines the schema for representing Java(tm) objects in
|
||||||
|
# an LDAP directory [LDAPv3]. It defines schema elements to represent
|
||||||
|
# a Java serialized object [Serial], a Java marshalled object [RMI], a
|
||||||
|
# Java remote object [RMI], and a JNDI reference [JNDI].
|
||||||
|
#
|
||||||
|
|
||||||
|
# [trimmed]
|
||||||
|
|
||||||
|
# 3 Attribute Type Definitions
|
||||||
|
#
|
||||||
|
# The following attribute types are defined in this document:
|
||||||
|
#
|
||||||
|
# javaClassName
|
||||||
|
# javaClassNames
|
||||||
|
# javaCodebase
|
||||||
|
# javaSerializedData
|
||||||
|
# javaFactory
|
||||||
|
# javaReferenceAddress
|
||||||
|
# javaDoc
|
||||||
|
#
|
||||||
|
# 3.1 javaClassName
|
||||||
|
#
|
||||||
|
# This attribute stores the fully qualified name of the Java object's
|
||||||
|
# "distinguished" class or interface (for example, "java.lang.String").
|
||||||
|
# It is a single-valued attribute. This attribute's syntax is '
|
||||||
|
# Directory String' and its case is significant.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.1.6
|
||||||
|
# NAME 'javaClassName'
|
||||||
|
# DESC 'Fully qualified name of distinguished Java class or
|
||||||
|
# interface'
|
||||||
|
# EQUALITY caseExactMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||||
|
# SINGLE-VALUE
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.6
|
||||||
|
NAME 'javaClassName'
|
||||||
|
DESC 'Fully qualified name of distinguished Java class or interface'
|
||||||
|
EQUALITY caseExactMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
# 3.2 javaCodebase
|
||||||
|
#
|
||||||
|
# This attribute stores the Java class definition's locations. It
|
||||||
|
# specifies the locations from which to load the class definition for
|
||||||
|
# the class specified by the javaClassName attribute. Each value of
|
||||||
|
# the attribute contains an ordered list of URLs, separated by spaces.
|
||||||
|
# For example, a value of "url1 url2 url3" means that the three
|
||||||
|
# (possibly interdependent) URLs (url1, url2, and url3) form the
|
||||||
|
# codebase for loading in the Java class definition.
|
||||||
|
#
|
||||||
|
# If the javaCodebase attribute contains more than one value, each
|
||||||
|
# value is an independent codebase. That is, there is no relationship
|
||||||
|
# between the URLs in one value and those in another; each value can be
|
||||||
|
# viewed as an alternate source for loading the Java class definition.
|
||||||
|
# See [Java] for information regarding class loading.
|
||||||
|
#
|
||||||
|
# This attribute's syntax is 'IA5 String' and its case is significant.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.1.7
|
||||||
|
# NAME 'javaCodebase'
|
||||||
|
# DESC 'URL(s) specifying the location of class definition'
|
||||||
|
# EQUALITY caseExactIA5Match
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.7
|
||||||
|
NAME 'javaCodebase'
|
||||||
|
DESC 'URL(s) specifying the location of class definition'
|
||||||
|
EQUALITY caseExactIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
|
||||||
|
# 3.3 javaClassNames
|
||||||
|
#
|
||||||
|
# This attribute stores the Java object's fully qualified class or
|
||||||
|
# interface names (for example, "java.lang.String"). It is a
|
||||||
|
# multivalued attribute. When more than one value is present, each is
|
||||||
|
# the name of a class or interface, or ancestor class or interface, of
|
||||||
|
# this object.
|
||||||
|
#
|
||||||
|
# This attribute's syntax is 'Directory String' and its case is
|
||||||
|
# significant.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.1.13
|
||||||
|
# NAME 'javaClassNames'
|
||||||
|
# DESC 'Fully qualified Java class or interface name'
|
||||||
|
# EQUALITY caseExactMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.13
|
||||||
|
NAME 'javaClassNames'
|
||||||
|
DESC 'Fully qualified Java class or interface name'
|
||||||
|
EQUALITY caseExactMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
|
||||||
|
# 3.4 javaSerializedData
|
||||||
|
#
|
||||||
|
# This attribute stores the serialized form of a Java object. The
|
||||||
|
# serialized form is described in [Serial].
|
||||||
|
#
|
||||||
|
# This attribute's syntax is 'Octet String'.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.1.8
|
||||||
|
# NAME 'javaSerializedData
|
||||||
|
# DESC 'Serialized form of a Java object'
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.40
|
||||||
|
# SINGLE-VALUE
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.8
|
||||||
|
NAME 'javaSerializedData'
|
||||||
|
DESC 'Serialized form of a Java object'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.40
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
# 3.5 javaFactory
|
||||||
|
#
|
||||||
|
# This attribute stores the fully qualified class name of the object
|
||||||
|
# factory (for example, "com.wiz.jndi.WizObjectFactory") that can be
|
||||||
|
# used to create an instance of the object identified by the
|
||||||
|
# javaClassName attribute.
|
||||||
|
#
|
||||||
|
# This attribute's syntax is 'Directory String' and its case is
|
||||||
|
# significant.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.1.10
|
||||||
|
# NAME 'javaFactory'
|
||||||
|
# DESC 'Fully qualified Java class name of a JNDI object factory'
|
||||||
|
# EQUALITY caseExactMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||||
|
# SINGLE-VALUE
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.10
|
||||||
|
NAME 'javaFactory'
|
||||||
|
DESC 'Fully qualified Java class name of a JNDI object factory'
|
||||||
|
EQUALITY caseExactMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
# 3.6 javaReferenceAddress
|
||||||
|
#
|
||||||
|
# This attribute represents the sequence of addresses of a JNDI
|
||||||
|
# reference. Each of its values represents one address, a Java object
|
||||||
|
# of type javax.naming.RefAddr. Its value is a concatenation of the
|
||||||
|
# address type and address contents, preceded by a sequence number (the
|
||||||
|
# order of addresses in a JNDI reference is significant). For example:
|
||||||
|
#
|
||||||
|
# #0#TypeA#ValA
|
||||||
|
# #1#TypeB#ValB
|
||||||
|
# #2#TypeC##rO0ABXNyABpq...
|
||||||
|
#
|
||||||
|
# In more detail, the value is encoded as follows:
|
||||||
|
#
|
||||||
|
# The delimiter is the first character of the value. For readability
|
||||||
|
# the character '#' is recommended when it is not otherwise used
|
||||||
|
# anywhere in the value, but any character may be used subject to
|
||||||
|
# restrictions given below.
|
||||||
|
#
|
||||||
|
# The first delimiter is followed by the sequence number. The sequence
|
||||||
|
# number of an address is its position in the JNDI reference, with the
|
||||||
|
# first address being numbered 0. It is represented by its shortest
|
||||||
|
# string form, in decimal notation.
|
||||||
|
#
|
||||||
|
# The sequence number is followed by a delimiter, then by the address
|
||||||
|
# type, and then by another delimiter. If the address is of Java class
|
||||||
|
# javax.naming.StringRefAddr, then this delimiter is followed by the
|
||||||
|
# value of the address contents (which is a string). Otherwise, this
|
||||||
|
# delimiter is followed immediately by another delimiter, and then by
|
||||||
|
# the Base64 encoding of the serialized form of the entire address.
|
||||||
|
#
|
||||||
|
# The delimiter may be any character other than a digit or a character
|
||||||
|
# contained in the address type. In addition, if the address contents
|
||||||
|
# is a string, the delimiter may not be the first character of that
|
||||||
|
# string.
|
||||||
|
#
|
||||||
|
# This attribute's syntax is 'Directory String' and its case is
|
||||||
|
# significant. It can contain multiple values.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.1.11
|
||||||
|
# NAME 'javaReferenceAddress'
|
||||||
|
# DESC 'Addresses associated with a JNDI Reference'
|
||||||
|
# EQUALITY caseExactMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.11
|
||||||
|
NAME 'javaReferenceAddress'
|
||||||
|
DESC 'Addresses associated with a JNDI Reference'
|
||||||
|
EQUALITY caseExactMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
|
||||||
|
# 3.7 javaDoc
|
||||||
|
#
|
||||||
|
# This attribute stores a pointer to the Java documentation for the
|
||||||
|
# class. It's value is a URL. For example, the following URL points to
|
||||||
|
# the specification of the java.lang.String class:
|
||||||
|
# http://java.sun.com/products/jdk/1.2/docs/api/java/lang/String.html
|
||||||
|
#
|
||||||
|
# This attribute's syntax is 'IA5 String' and its case is significant.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.1.12
|
||||||
|
# NAME 'javaDoc'
|
||||||
|
# DESC 'The Java documentation for the class'
|
||||||
|
# EQUALITY caseExactIA5Match
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.4.1.12
|
||||||
|
NAME 'javaDoc'
|
||||||
|
DESC 'The Java documentation for the class'
|
||||||
|
EQUALITY caseExactIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
|
||||||
|
# 4 Object Class Definitions
|
||||||
|
#
|
||||||
|
# The following object classes are defined in this document:
|
||||||
|
#
|
||||||
|
# javaContainer
|
||||||
|
# javaObject
|
||||||
|
# javaSerializedObject
|
||||||
|
# javaMarshalledObject
|
||||||
|
# javaNamingReference
|
||||||
|
#
|
||||||
|
# 4.1 javaContainer
|
||||||
|
#
|
||||||
|
# This structural object class represents a container for a Java
|
||||||
|
# object.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.2.1
|
||||||
|
# NAME 'javaContainer'
|
||||||
|
# DESC 'Container for a Java object'
|
||||||
|
# SUP top
|
||||||
|
# STRUCTURAL
|
||||||
|
# MUST ( cn )
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.1
|
||||||
|
NAME 'javaContainer'
|
||||||
|
DESC 'Container for a Java object'
|
||||||
|
SUP top
|
||||||
|
STRUCTURAL
|
||||||
|
MUST cn )
|
||||||
|
|
||||||
|
# 4.2 javaObject
|
||||||
|
#
|
||||||
|
# This abstract object class represents a Java object. A javaObject
|
||||||
|
# cannot exist in the directory; only auxiliary or structural
|
||||||
|
# subclasses of it can exist in the directory.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.2.4
|
||||||
|
# NAME 'javaObject'
|
||||||
|
# DESC 'Java object representation'
|
||||||
|
# SUP top
|
||||||
|
# ABSTRACT
|
||||||
|
# MUST ( javaClassName )
|
||||||
|
# MAY ( javaClassNames $
|
||||||
|
# javaCodebase $
|
||||||
|
# javaDoc $
|
||||||
|
# description )
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.4
|
||||||
|
NAME 'javaObject'
|
||||||
|
DESC 'Java object representation'
|
||||||
|
SUP top
|
||||||
|
ABSTRACT
|
||||||
|
MUST javaClassName
|
||||||
|
MAY ( javaClassNames $ javaCodebase $
|
||||||
|
javaDoc $ description ) )
|
||||||
|
|
||||||
|
# 4.3 javaSerializedObject
|
||||||
|
#
|
||||||
|
# This auxiliary object class represents a Java serialized object. It
|
||||||
|
# must be mixed in with a structural object class.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.2.5
|
||||||
|
# NAME 'javaSerializedObject'
|
||||||
|
# DESC 'Java serialized object'
|
||||||
|
# SUP javaObject
|
||||||
|
# AUXILIARY
|
||||||
|
# MUST ( javaSerializedData )
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.5
|
||||||
|
NAME 'javaSerializedObject'
|
||||||
|
DESC 'Java serialized object'
|
||||||
|
SUP javaObject
|
||||||
|
AUXILIARY
|
||||||
|
MUST javaSerializedData )
|
||||||
|
|
||||||
|
# 4.4 javaMarshalledObject
|
||||||
|
#
|
||||||
|
# This auxiliary object class represents a Java marshalled object. It
|
||||||
|
# must be mixed in with a structural object class.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.2.8
|
||||||
|
# NAME 'javaMarshalledObject'
|
||||||
|
# DESC 'Java marshalled object'
|
||||||
|
# SUP javaObject
|
||||||
|
# AUXILIARY
|
||||||
|
# MUST ( javaSerializedData )
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.8
|
||||||
|
NAME 'javaMarshalledObject'
|
||||||
|
DESC 'Java marshalled object'
|
||||||
|
SUP javaObject
|
||||||
|
AUXILIARY
|
||||||
|
MUST javaSerializedData )
|
||||||
|
|
||||||
|
# 4.5 javaNamingReference
|
||||||
|
#
|
||||||
|
# This auxiliary object class represents a JNDI reference. It must be
|
||||||
|
# mixed in with a structural object class.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.4.2.7
|
||||||
|
# NAME 'javaNamingReference'
|
||||||
|
# DESC 'JNDI reference'
|
||||||
|
# SUP javaObject
|
||||||
|
# AUXILIARY
|
||||||
|
# MAY ( javaReferenceAddress $
|
||||||
|
# javaFactory )
|
||||||
|
# )
|
||||||
|
#
|
||||||
|
objectclass ( 1.3.6.1.4.1.42.2.27.4.2.7
|
||||||
|
NAME 'javaNamingReference'
|
||||||
|
DESC 'JNDI reference'
|
||||||
|
SUP javaObject
|
||||||
|
AUXILIARY
|
||||||
|
MAY ( javaReferenceAddress $ javaFactory ) )
|
||||||
|
|
||||||
|
# Full Copyright Statement
|
||||||
|
#
|
||||||
|
# Copyright (C) The Internet Society (1999). All Rights Reserved.
|
||||||
|
#
|
||||||
|
# This document and translations of it may be copied and furnished to
|
||||||
|
# others, and derivative works that comment on or otherwise explain it
|
||||||
|
# or assist in its implementation may be prepared, copied, published
|
||||||
|
# and distributed, in whole or in part, without restriction of any
|
||||||
|
# kind, provided that the above copyright notice and this paragraph are
|
||||||
|
# included on all such copies and derivative works. However, this
|
||||||
|
# document itself may not be modified in any way, such as by removing
|
||||||
|
# the copyright notice or references to the Internet Society or other
|
||||||
|
# Internet organizations, except as needed for the purpose of
|
||||||
|
# developing Internet standards in which case the procedures for
|
||||||
|
# copyrights defined in the Internet Standards process must be
|
||||||
|
# followed, or as required to translate it into languages other than
|
||||||
|
# English.
|
||||||
|
#
|
||||||
|
# The limited permissions granted above are perpetual and will not be
|
||||||
|
# revoked by the Internet Society or its successors or assigns.
|
||||||
|
#
|
||||||
|
# This document and the information contained herein is provided on an
|
||||||
|
# "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||||||
|
# TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||||||
|
# BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||||||
|
# HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||||||
|
# MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||||
45
docker/ldap/data/etc/schema/misc.ldif
Normal file
45
docker/ldap/data/etc/schema/misc.ldif
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
# misc.ldif -- assorted schema definitions
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
# Assorted definitions from several sources, including
|
||||||
|
# ''works in progress''. Contents of this file are
|
||||||
|
# subject to change (including deletion) without notice.
|
||||||
|
#
|
||||||
|
# Not recommended for production use!
|
||||||
|
# Use with extreme caution!
|
||||||
|
#
|
||||||
|
# This file was automatically generated from misc.schema; see that file
|
||||||
|
# for complete references.
|
||||||
|
#
|
||||||
|
dn: cn=misc,cn=schema,cn=config
|
||||||
|
objectClass: olcSchemaConfig
|
||||||
|
cn: misc
|
||||||
|
olcAttributeTypes: {0}( 2.16.840.1.113730.3.1.13 NAME 'mailLocalAddress' DESC
|
||||||
|
'RFC822 email address of this recipient' EQUALITY caseIgnoreIA5Match SYNTAX 1
|
||||||
|
.3.6.1.4.1.1466.115.121.1.26{256} )
|
||||||
|
olcAttributeTypes: {1}( 2.16.840.1.113730.3.1.18 NAME 'mailHost' DESC 'FQDN of
|
||||||
|
the SMTP/MTA of this recipient' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4
|
||||||
|
.1.1466.115.121.1.26{256} SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {2}( 2.16.840.1.113730.3.1.47 NAME 'mailRoutingAddress' DES
|
||||||
|
C 'RFC822 routing address of this recipient' EQUALITY caseIgnoreIA5Match SYNT
|
||||||
|
AX 1.3.6.1.4.1.1466.115.121.1.26{256} SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {3}( 1.3.6.1.4.1.42.2.27.2.1.15 NAME 'rfc822MailMember' DES
|
||||||
|
C 'rfc822 mail address of group member(s)' EQUALITY caseIgnoreIA5Match SYNTAX
|
||||||
|
1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
olcObjectClasses: {0}( 2.16.840.1.113730.3.2.147 NAME 'inetLocalMailRecipient'
|
||||||
|
DESC 'Internet local mail recipient' SUP top AUXILIARY MAY ( mailLocalAddres
|
||||||
|
s $ mailHost $ mailRoutingAddress ) )
|
||||||
|
olcObjectClasses: {1}( 1.3.6.1.4.1.42.2.27.1.2.5 NAME 'nisMailAlias' DESC 'NIS
|
||||||
|
mail alias' SUP top STRUCTURAL MUST cn MAY rfc822MailMember )
|
||||||
75
docker/ldap/data/etc/schema/misc.schema
Normal file
75
docker/ldap/data/etc/schema/misc.schema
Normal file
@ -0,0 +1,75 @@
|
|||||||
|
# misc.schema -- assorted schema definitions
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
# Assorted definitions from several sources, including
|
||||||
|
# ''works in progress''. Contents of this file are
|
||||||
|
# subject to change (including deletion) without notice.
|
||||||
|
#
|
||||||
|
# Not recommended for production use!
|
||||||
|
# Use with extreme caution!
|
||||||
|
|
||||||
|
#-----------------------------------------------------------
|
||||||
|
# draft-lachman-laser-ldap-mail-routing-02.txt !!!EXPIRED!!!
|
||||||
|
# (a work in progress)
|
||||||
|
#
|
||||||
|
attributetype ( 2.16.840.1.113730.3.1.13
|
||||||
|
NAME 'mailLocalAddress'
|
||||||
|
DESC 'RFC822 email address of this recipient'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256} )
|
||||||
|
|
||||||
|
attributetype ( 2.16.840.1.113730.3.1.18
|
||||||
|
NAME 'mailHost'
|
||||||
|
DESC 'FQDN of the SMTP/MTA of this recipient'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256}
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 2.16.840.1.113730.3.1.47
|
||||||
|
NAME 'mailRoutingAddress'
|
||||||
|
DESC 'RFC822 routing address of this recipient'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256}
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
# I-D leaves this OID TBD.
|
||||||
|
# iPlanet uses 2.16.840.1.113.730.3.2.147 but that is an
|
||||||
|
# improperly delegated OID. A typo is likely.
|
||||||
|
objectclass ( 2.16.840.1.113730.3.2.147
|
||||||
|
NAME 'inetLocalMailRecipient'
|
||||||
|
DESC 'Internet local mail recipient'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MAY ( mailLocalAddress $ mailHost $ mailRoutingAddress ) )
|
||||||
|
|
||||||
|
#-----------------------------------------------------------
|
||||||
|
# draft-srivastava-ldap-mail-00.txt !!!EXPIRED!!!
|
||||||
|
# (a work in progress)
|
||||||
|
#
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.2.1.15
|
||||||
|
NAME 'rfc822MailMember'
|
||||||
|
DESC 'rfc822 mail address of group member(s)'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
|
||||||
|
#-----------------------------------------------------------
|
||||||
|
# !!!no I-D!!!
|
||||||
|
# (a work in progress)
|
||||||
|
#
|
||||||
|
objectclass ( 1.3.6.1.4.1.42.2.27.1.2.5
|
||||||
|
NAME 'nisMailAlias'
|
||||||
|
DESC 'NIS mail alias'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST cn
|
||||||
|
MAY rfc822MailMember )
|
||||||
120
docker/ldap/data/etc/schema/nis.ldif
Normal file
120
docker/ldap/data/etc/schema/nis.ldif
Normal file
@ -0,0 +1,120 @@
|
|||||||
|
# NIS (RFC2307)
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
# Definitions from RFC2307 (Experimental)
|
||||||
|
# An Approach for Using LDAP as a Network Information Service
|
||||||
|
#
|
||||||
|
# Depends upon core.ldif and cosine.ldif
|
||||||
|
#
|
||||||
|
# This file was automatically generated from nis.schema; see that file
|
||||||
|
# for complete references.
|
||||||
|
#
|
||||||
|
dn: cn=nis,cn=schema,cn=config
|
||||||
|
objectClass: olcSchemaConfig
|
||||||
|
cn: nis
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.2 NAME 'gecos' DESC 'The GECOS field; th
|
||||||
|
e common name' EQUALITY caseIgnoreIA5Match SUBSTR caseIgnoreIA5SubstringsMatc
|
||||||
|
h SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.3 NAME 'homeDirectory' DESC 'The absolut
|
||||||
|
e path to the home directory' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1
|
||||||
|
466.115.121.1.26 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.4 NAME 'loginShell' DESC 'The path to th
|
||||||
|
e login shell' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.2
|
||||||
|
6 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.5 NAME 'shadowLastChange' EQUALITY integ
|
||||||
|
erMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.6 NAME 'shadowMin' EQUALITY integerMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.7 NAME 'shadowMax' EQUALITY integerMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.8 NAME 'shadowWarning' EQUALITY integerM
|
||||||
|
atch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.9 NAME 'shadowInactive' EQUALITY integer
|
||||||
|
Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.10 NAME 'shadowExpire' EQUALITY integerM
|
||||||
|
atch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.11 NAME 'shadowFlag' EQUALITY integerMat
|
||||||
|
ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.12 NAME 'memberUid' EQUALITY caseExactI
|
||||||
|
A5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.
|
||||||
|
26 )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.13 NAME 'memberNisNetgroup' EQUALITY ca
|
||||||
|
seExactIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.11
|
||||||
|
5.121.1.26 )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.14 NAME 'nisNetgroupTriple' DESC 'Netgr
|
||||||
|
oup triple' SYNTAX 1.3.6.1.1.1.0.0 )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.15 NAME 'ipServicePort' EQUALITY intege
|
||||||
|
rMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.16 NAME 'ipServiceProtocol' SUP name )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.17 NAME 'ipProtocolNumber' EQUALITY int
|
||||||
|
egerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.18 NAME 'oncRpcNumber' EQUALITY integer
|
||||||
|
Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.19 NAME 'ipHostNumber' DESC 'IP address
|
||||||
|
' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.20 NAME 'ipNetworkNumber' DESC 'IP netw
|
||||||
|
ork' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} SI
|
||||||
|
NGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.21 NAME 'ipNetmaskNumber' DESC 'IP netm
|
||||||
|
ask' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} SI
|
||||||
|
NGLE-VALUE )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.22 NAME 'macAddress' DESC 'MAC address'
|
||||||
|
EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.23 NAME 'bootParameter' DESC 'rpc.bootp
|
||||||
|
aramd parameter' SYNTAX 1.3.6.1.1.1.0.1 )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.24 NAME 'bootFile' DESC 'Boot image nam
|
||||||
|
e' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.26 NAME 'nisMapName' SUP name )
|
||||||
|
olcAttributeTypes: ( 1.3.6.1.1.1.1.27 NAME 'nisMapEntry' EQUALITY caseExac
|
||||||
|
tIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.
|
||||||
|
1.26{1024} SINGLE-VALUE )
|
||||||
|
olcObjectClasses: ( 1.3.6.1.1.1.2.0 NAME 'posixAccount' DESC 'Abstraction o
|
||||||
|
f an account with POSIX attributes' SUP top AUXILIARY MUST ( cn $ uid $ uidNu
|
||||||
|
mber $ gidNumber $ homeDirectory ) MAY ( userPassword $ loginShell $ gecos $
|
||||||
|
description ) )
|
||||||
|
olcObjectClasses: ( 1.3.6.1.1.1.2.1 NAME 'shadowAccount' DESC 'Additional a
|
||||||
|
ttributes for shadow passwords' SUP top AUXILIARY MUST uid MAY ( userPassword
|
||||||
|
$ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive
|
||||||
|
$ shadowExpire $ shadowFlag $ description ) )
|
||||||
|
olcObjectClasses: ( 1.3.6.1.1.1.2.2 NAME 'posixGroup' DESC 'Abstraction of
|
||||||
|
a group of accounts' SUP top STRUCTURAL MUST ( cn $ gidNumber ) MAY ( userPas
|
||||||
|
sword $ memberUid $ description ) )
|
||||||
|
olcObjectClasses: ( 1.3.6.1.1.1.2.3 NAME 'ipService' DESC 'Abstraction an I
|
||||||
|
nternet Protocol service' SUP top STRUCTURAL MUST ( cn $ ipServicePort $ ipSe
|
||||||
|
rviceProtocol ) MAY description )
|
||||||
|
olcObjectClasses: ( 1.3.6.1.1.1.2.4 NAME 'ipProtocol' DESC 'Abstraction of
|
||||||
|
an IP protocol' SUP top STRUCTURAL MUST ( cn $ ipProtocolNumber $ description
|
||||||
|
) MAY description )
|
||||||
|
olcObjectClasses: ( 1.3.6.1.1.1.2.5 NAME 'oncRpc' DESC 'Abstraction of an O
|
||||||
|
NC/RPC binding' SUP top STRUCTURAL MUST ( cn $ oncRpcNumber $ description ) M
|
||||||
|
AY description )
|
||||||
|
olcObjectClasses: ( 1.3.6.1.1.1.2.6 NAME 'ipHost' DESC 'Abstraction of a ho
|
||||||
|
st, an IP device' SUP top AUXILIARY MUST ( cn $ ipHostNumber ) MAY ( l $ desc
|
||||||
|
ription $ manager ) )
|
||||||
|
olcObjectClasses: ( 1.3.6.1.1.1.2.7 NAME 'ipNetwork' DESC 'Abstraction of a
|
||||||
|
n IP network' SUP top STRUCTURAL MUST ( cn $ ipNetworkNumber ) MAY ( ipNetmas
|
||||||
|
kNumber $ l $ description $ manager ) )
|
||||||
|
olcObjectClasses: ( 1.3.6.1.1.1.2.8 NAME 'nisNetgroup' DESC 'Abstraction of
|
||||||
|
a netgroup' SUP top STRUCTURAL MUST cn MAY ( nisNetgroupTriple $ memberNisNe
|
||||||
|
tgroup $ description ) )
|
||||||
|
olcObjectClasses: ( 1.3.6.1.1.1.2.9 NAME 'nisMap' DESC 'A generic abstracti
|
||||||
|
on of a NIS map' SUP top STRUCTURAL MUST nisMapName MAY description )
|
||||||
|
olcObjectClasses: ( 1.3.6.1.1.1.2.10 NAME 'nisObject' DESC 'An entry in a
|
||||||
|
NIS map' SUP top STRUCTURAL MUST ( cn $ nisMapEntry $ nisMapName ) MAY descri
|
||||||
|
ption )
|
||||||
|
olcObjectClasses: ( 1.3.6.1.1.1.2.11 NAME 'ieee802Device' DESC 'A device w
|
||||||
|
ith a MAC address' SUP top AUXILIARY MAY macAddress )
|
||||||
|
olcObjectClasses: ( 1.3.6.1.1.1.2.12 NAME 'bootableDevice' DESC 'A device
|
||||||
|
with boot parameters' SUP top AUXILIARY MAY ( bootFile $ bootParameter ) )
|
||||||
237
docker/ldap/data/etc/schema/nis.schema
Normal file
237
docker/ldap/data/etc/schema/nis.schema
Normal file
@ -0,0 +1,237 @@
|
|||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
|
||||||
|
# Definitions from RFC2307 (Experimental)
|
||||||
|
# An Approach for Using LDAP as a Network Information Service
|
||||||
|
|
||||||
|
# Depends upon core.schema and cosine.schema
|
||||||
|
|
||||||
|
# Note: The definitions in RFC2307 are given in syntaxes closely related
|
||||||
|
# to those in RFC2252, however, some liberties are taken that are not
|
||||||
|
# supported by RFC2252. This file has been written following RFC2252
|
||||||
|
# strictly.
|
||||||
|
|
||||||
|
# OID Base is iso(1) org(3) dod(6) internet(1) directory(1) nisSchema(1).
|
||||||
|
# i.e. nisSchema in RFC2307 is 1.3.6.1.1.1
|
||||||
|
#
|
||||||
|
# Syntaxes are under 1.3.6.1.1.1.0 (two new syntaxes are defined)
|
||||||
|
# validaters for these syntaxes are incomplete, they only
|
||||||
|
# implement printable string validation (which is good as the
|
||||||
|
# common use of these syntaxes violates the specification).
|
||||||
|
# Attribute types are under 1.3.6.1.1.1.1
|
||||||
|
# Object classes are under 1.3.6.1.1.1.2
|
||||||
|
|
||||||
|
# Attribute Type Definitions
|
||||||
|
|
||||||
|
# builtin
|
||||||
|
#attributetype ( 1.3.6.1.1.1.1.0 NAME 'uidNumber'
|
||||||
|
# DESC 'An integer uniquely identifying a user in an administrative domain'
|
||||||
|
# EQUALITY integerMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
|
||||||
|
# builtin
|
||||||
|
#attributetype ( 1.3.6.1.1.1.1.1 NAME 'gidNumber'
|
||||||
|
# DESC 'An integer uniquely identifying a group in an administrative domain'
|
||||||
|
# EQUALITY integerMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.2 NAME 'gecos'
|
||||||
|
DESC 'The GECOS field; the common name'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SUBSTR caseIgnoreIA5SubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.3 NAME 'homeDirectory'
|
||||||
|
DESC 'The absolute path to the home directory'
|
||||||
|
EQUALITY caseExactIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.4 NAME 'loginShell'
|
||||||
|
DESC 'The path to the login shell'
|
||||||
|
EQUALITY caseExactIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.5 NAME 'shadowLastChange'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.6 NAME 'shadowMin'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.7 NAME 'shadowMax'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.8 NAME 'shadowWarning'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.9 NAME 'shadowInactive'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.10 NAME 'shadowExpire'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.11 NAME 'shadowFlag'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.12 NAME 'memberUid'
|
||||||
|
EQUALITY caseExactIA5Match
|
||||||
|
SUBSTR caseExactIA5SubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.13 NAME 'memberNisNetgroup'
|
||||||
|
EQUALITY caseExactIA5Match
|
||||||
|
SUBSTR caseExactIA5SubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.14 NAME 'nisNetgroupTriple'
|
||||||
|
DESC 'Netgroup triple'
|
||||||
|
SYNTAX 1.3.6.1.1.1.0.0 )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.15 NAME 'ipServicePort'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.16 NAME 'ipServiceProtocol'
|
||||||
|
SUP name )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.17 NAME 'ipProtocolNumber'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.18 NAME 'oncRpcNumber'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.19 NAME 'ipHostNumber'
|
||||||
|
DESC 'IP address'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.20 NAME 'ipNetworkNumber'
|
||||||
|
DESC 'IP network'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.21 NAME 'ipNetmaskNumber'
|
||||||
|
DESC 'IP netmask'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} SINGLE-VALUE )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.22 NAME 'macAddress'
|
||||||
|
DESC 'MAC address'
|
||||||
|
EQUALITY caseIgnoreIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.23 NAME 'bootParameter'
|
||||||
|
DESC 'rpc.bootparamd parameter'
|
||||||
|
SYNTAX 1.3.6.1.1.1.0.1 )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.24 NAME 'bootFile'
|
||||||
|
DESC 'Boot image name'
|
||||||
|
EQUALITY caseExactIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.26 NAME 'nisMapName'
|
||||||
|
SUP name )
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.1.1.1.27 NAME 'nisMapEntry'
|
||||||
|
EQUALITY caseExactIA5Match
|
||||||
|
SUBSTR caseExactIA5SubstringsMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{1024} SINGLE-VALUE )
|
||||||
|
|
||||||
|
# Object Class Definitions
|
||||||
|
|
||||||
|
objectclass ( 1.3.6.1.1.1.2.0 NAME 'posixAccount'
|
||||||
|
DESC 'Abstraction of an account with POSIX attributes'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MUST ( cn $ uid $ uidNumber $ gidNumber $ homeDirectory )
|
||||||
|
MAY ( userPassword $ loginShell $ gecos $ description ) )
|
||||||
|
|
||||||
|
objectclass ( 1.3.6.1.1.1.2.1 NAME 'shadowAccount'
|
||||||
|
DESC 'Additional attributes for shadow passwords'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MUST uid
|
||||||
|
MAY ( userPassword $ shadowLastChange $ shadowMin $
|
||||||
|
shadowMax $ shadowWarning $ shadowInactive $
|
||||||
|
shadowExpire $ shadowFlag $ description ) )
|
||||||
|
|
||||||
|
objectclass ( 1.3.6.1.1.1.2.2 NAME 'posixGroup'
|
||||||
|
DESC 'Abstraction of a group of accounts'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( cn $ gidNumber )
|
||||||
|
MAY ( userPassword $ memberUid $ description ) )
|
||||||
|
|
||||||
|
objectclass ( 1.3.6.1.1.1.2.3 NAME 'ipService'
|
||||||
|
DESC 'Abstraction an Internet Protocol service'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( cn $ ipServicePort $ ipServiceProtocol )
|
||||||
|
MAY ( description ) )
|
||||||
|
|
||||||
|
objectclass ( 1.3.6.1.1.1.2.4 NAME 'ipProtocol'
|
||||||
|
DESC 'Abstraction of an IP protocol'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( cn $ ipProtocolNumber $ description )
|
||||||
|
MAY description )
|
||||||
|
|
||||||
|
objectclass ( 1.3.6.1.1.1.2.5 NAME 'oncRpc'
|
||||||
|
DESC 'Abstraction of an ONC/RPC binding'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( cn $ oncRpcNumber $ description )
|
||||||
|
MAY description )
|
||||||
|
|
||||||
|
objectclass ( 1.3.6.1.1.1.2.6 NAME 'ipHost'
|
||||||
|
DESC 'Abstraction of a host, an IP device'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MUST ( cn $ ipHostNumber )
|
||||||
|
MAY ( l $ description $ manager ) )
|
||||||
|
|
||||||
|
objectclass ( 1.3.6.1.1.1.2.7 NAME 'ipNetwork'
|
||||||
|
DESC 'Abstraction of an IP network'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( cn $ ipNetworkNumber )
|
||||||
|
MAY ( ipNetmaskNumber $ l $ description $ manager ) )
|
||||||
|
|
||||||
|
objectclass ( 1.3.6.1.1.1.2.8 NAME 'nisNetgroup'
|
||||||
|
DESC 'Abstraction of a netgroup'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST cn
|
||||||
|
MAY ( nisNetgroupTriple $ memberNisNetgroup $ description ) )
|
||||||
|
|
||||||
|
objectclass ( 1.3.6.1.1.1.2.9 NAME 'nisMap'
|
||||||
|
DESC 'A generic abstraction of a NIS map'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST nisMapName
|
||||||
|
MAY description )
|
||||||
|
|
||||||
|
objectclass ( 1.3.6.1.1.1.2.10 NAME 'nisObject'
|
||||||
|
DESC 'An entry in a NIS map'
|
||||||
|
SUP top STRUCTURAL
|
||||||
|
MUST ( cn $ nisMapEntry $ nisMapName )
|
||||||
|
MAY description )
|
||||||
|
|
||||||
|
objectclass ( 1.3.6.1.1.1.2.11 NAME 'ieee802Device'
|
||||||
|
DESC 'A device with a MAC address'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MAY macAddress )
|
||||||
|
|
||||||
|
objectclass ( 1.3.6.1.1.1.2.12 NAME 'bootableDevice'
|
||||||
|
DESC 'A device with boot parameters'
|
||||||
|
SUP top AUXILIARY
|
||||||
|
MAY ( bootFile $ bootParameter ) )
|
||||||
88
docker/ldap/data/etc/schema/openldap.ldif
Normal file
88
docker/ldap/data/etc/schema/openldap.ldif
Normal file
@ -0,0 +1,88 @@
|
|||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# OpenLDAP Project's directory schema items
|
||||||
|
#
|
||||||
|
# depends upon:
|
||||||
|
# core.schema
|
||||||
|
# cosine.schema
|
||||||
|
# inetorgperson.schema
|
||||||
|
#
|
||||||
|
# These are provided for informational purposes only.
|
||||||
|
#
|
||||||
|
# This openldap.ldif file is provided as a demonstration of how to
|
||||||
|
# convert a *.schema file into *.ldif format. The key points:
|
||||||
|
# In LDIF, a blank line terminates an entry. Blank lines in a *.schema
|
||||||
|
# file should be replaced with a single '#' to turn them into
|
||||||
|
# comments, or they should just be removed.
|
||||||
|
# In addition to the actual schema directives, the file needs a small
|
||||||
|
# header to make it a valid LDAP entry. This header must provide the
|
||||||
|
# dn of the entry, the objectClass, and the cn, as shown here:
|
||||||
|
#
|
||||||
|
dn: cn=openldap,cn=schema,cn=config
|
||||||
|
objectClass: olcSchemaConfig
|
||||||
|
cn: openldap
|
||||||
|
#
|
||||||
|
# The schema directives need to be changed to LDAP Attributes.
|
||||||
|
# First a basic string substitution can be done on each of the keywords:
|
||||||
|
# objectIdentifier -> olcObjectIdentifier:
|
||||||
|
# objectClass -> olcObjectClasses:
|
||||||
|
# attributeType -> olcAttributeTypes:
|
||||||
|
# Then leading whitespace must be fixed. The slapd.conf format allows
|
||||||
|
# tabs or spaces to denote line continuation, while LDIF only allows
|
||||||
|
# the space character.
|
||||||
|
# Also slapd.conf preserves the continuation character, while LDIF strips
|
||||||
|
# it out. So a single TAB/SPACE in slapd.conf must be replaced with
|
||||||
|
# two SPACEs in LDIF, otherwise the continued text may get joined as
|
||||||
|
# a single word.
|
||||||
|
# The directives must be listed in a proper sequence:
|
||||||
|
# All olcObjectIdentifiers must be first, so they may be referenced by
|
||||||
|
# any following definitions.
|
||||||
|
# All olcAttributeTypes must be next, so they may be referenced by any
|
||||||
|
# following objectClass definitions.
|
||||||
|
# All olcObjectClasses must be after the olcAttributeTypes.
|
||||||
|
# And of course, any superior must occur before anything that inherits
|
||||||
|
# from it.
|
||||||
|
#
|
||||||
|
olcObjectIdentifier: OpenLDAProot 1.3.6.1.4.1.4203
|
||||||
|
#
|
||||||
|
olcObjectIdentifier: OpenLDAP OpenLDAProot:1
|
||||||
|
olcObjectIdentifier: OpenLDAPattributeType OpenLDAP:3
|
||||||
|
olcObjectIdentifier: OpenLDAPobjectClass OpenLDAP:4
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( OpenLDAPobjectClass:3
|
||||||
|
NAME 'OpenLDAPorg'
|
||||||
|
DESC 'OpenLDAP Organizational Object'
|
||||||
|
SUP organization
|
||||||
|
MAY ( buildingName $ displayName $ labeledURI ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( OpenLDAPobjectClass:4
|
||||||
|
NAME 'OpenLDAPou'
|
||||||
|
DESC 'OpenLDAP Organizational Unit Object'
|
||||||
|
SUP organizationalUnit
|
||||||
|
MAY ( buildingName $ displayName $ labeledURI $ o ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( OpenLDAPobjectClass:5
|
||||||
|
NAME 'OpenLDAPperson'
|
||||||
|
DESC 'OpenLDAP Person'
|
||||||
|
SUP ( pilotPerson $ inetOrgPerson )
|
||||||
|
MUST ( uid $ cn )
|
||||||
|
MAY ( givenName $ labeledURI $ o ) )
|
||||||
|
#
|
||||||
|
olcObjectClasses: ( OpenLDAPobjectClass:6
|
||||||
|
NAME 'OpenLDAPdisplayableObject'
|
||||||
|
DESC 'OpenLDAP Displayable Object'
|
||||||
|
AUXILIARY
|
||||||
|
MAY displayName )
|
||||||
54
docker/ldap/data/etc/schema/openldap.schema
Normal file
54
docker/ldap/data/etc/schema/openldap.schema
Normal file
@ -0,0 +1,54 @@
|
|||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
|
||||||
|
#
|
||||||
|
# OpenLDAP Project's directory schema items
|
||||||
|
#
|
||||||
|
# depends upon:
|
||||||
|
# core.schema
|
||||||
|
# cosine.schema
|
||||||
|
# inetorgperson.schema
|
||||||
|
#
|
||||||
|
# These are provided for informational purposes only.
|
||||||
|
|
||||||
|
objectIdentifier OpenLDAProot 1.3.6.1.4.1.4203
|
||||||
|
|
||||||
|
objectIdentifier OpenLDAP OpenLDAProot:1
|
||||||
|
objectIdentifier OpenLDAPattributeType OpenLDAP:3
|
||||||
|
objectIdentifier OpenLDAPobjectClass OpenLDAP:4
|
||||||
|
|
||||||
|
objectClass ( OpenLDAPobjectClass:3
|
||||||
|
NAME 'OpenLDAPorg'
|
||||||
|
DESC 'OpenLDAP Organizational Object'
|
||||||
|
SUP organization
|
||||||
|
MAY ( buildingName $ displayName $ labeledURI ) )
|
||||||
|
|
||||||
|
objectClass ( OpenLDAPobjectClass:4
|
||||||
|
NAME 'OpenLDAPou'
|
||||||
|
DESC 'OpenLDAP Organizational Unit Object'
|
||||||
|
SUP organizationalUnit
|
||||||
|
MAY ( buildingName $ displayName $ labeledURI $ o ) )
|
||||||
|
|
||||||
|
objectClass ( OpenLDAPobjectClass:5
|
||||||
|
NAME 'OpenLDAPperson'
|
||||||
|
DESC 'OpenLDAP Person'
|
||||||
|
SUP ( pilotPerson $ inetOrgPerson )
|
||||||
|
MUST ( uid $ cn )
|
||||||
|
MAY ( givenName $ labeledURI $ o ) )
|
||||||
|
|
||||||
|
objectClass ( OpenLDAPobjectClass:6
|
||||||
|
NAME 'OpenLDAPdisplayableObject'
|
||||||
|
DESC 'OpenLDAP Displayable Object'
|
||||||
|
AUXILIARY
|
||||||
|
MAY displayName )
|
||||||
123
docker/ldap/data/etc/schema/pmi.ldif
Normal file
123
docker/ldap/data/etc/schema/pmi.ldif
Normal file
@ -0,0 +1,123 @@
|
|||||||
|
# OpenLDAP X.509 PMI schema
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
## Portions Copyright (C) The Internet Society (1997-2006).
|
||||||
|
## All Rights Reserved.
|
||||||
|
#
|
||||||
|
# Includes LDAPv3 schema items from:
|
||||||
|
# ITU X.509 (08/2005)
|
||||||
|
#
|
||||||
|
# This file was automatically generated from pmi.schema; see that file
|
||||||
|
# for complete references.
|
||||||
|
#
|
||||||
|
dn: cn=pmi,cn=schema,cn=config
|
||||||
|
objectClass: olcSchemaConfig
|
||||||
|
cn: pmi
|
||||||
|
olcObjectIdentifier: {0}id-oc-pmiUser 2.5.6.24
|
||||||
|
olcObjectIdentifier: {1}id-oc-pmiAA 2.5.6.25
|
||||||
|
olcObjectIdentifier: {2}id-oc-pmiSOA 2.5.6.26
|
||||||
|
olcObjectIdentifier: {3}id-oc-attCertCRLDistributionPts 2.5.6.27
|
||||||
|
olcObjectIdentifier: {4}id-oc-privilegePolicy 2.5.6.32
|
||||||
|
olcObjectIdentifier: {5}id-oc-pmiDelegationPath 2.5.6.33
|
||||||
|
olcObjectIdentifier: {6}id-oc-protectedPrivilegePolicy 2.5.6.34
|
||||||
|
olcObjectIdentifier: {7}id-at-attributeCertificate 2.5.4.58
|
||||||
|
olcObjectIdentifier: {8}id-at-attributeCertificateRevocationList 2.5.4.59
|
||||||
|
olcObjectIdentifier: {9}id-at-aACertificate 2.5.4.61
|
||||||
|
olcObjectIdentifier: {10}id-at-attributeDescriptorCertificate 2.5.4.62
|
||||||
|
olcObjectIdentifier: {11}id-at-attributeAuthorityRevocationList 2.5.4.63
|
||||||
|
olcObjectIdentifier: {12}id-at-privPolicy 2.5.4.71
|
||||||
|
olcObjectIdentifier: {13}id-at-role 2.5.4.72
|
||||||
|
olcObjectIdentifier: {14}id-at-delegationPath 2.5.4.73
|
||||||
|
olcObjectIdentifier: {15}id-at-protPrivPolicy 2.5.4.74
|
||||||
|
olcObjectIdentifier: {16}id-at-xMLPrivilegeInfo 2.5.4.75
|
||||||
|
olcObjectIdentifier: {17}id-at-xMLPprotPrivPolicy 2.5.4.76
|
||||||
|
olcObjectIdentifier: {18}id-mr 2.5.13
|
||||||
|
olcObjectIdentifier: {19}id-mr-attributeCertificateMatch id-mr:42
|
||||||
|
olcObjectIdentifier: {20}id-mr-attributeCertificateExactMatch id-mr:45
|
||||||
|
olcObjectIdentifier: {21}id-mr-holderIssuerMatch id-mr:46
|
||||||
|
olcObjectIdentifier: {22}id-mr-authAttIdMatch id-mr:53
|
||||||
|
olcObjectIdentifier: {23}id-mr-roleSpecCertIdMatch id-mr:54
|
||||||
|
olcObjectIdentifier: {24}id-mr-basicAttConstraintsMatch id-mr:55
|
||||||
|
olcObjectIdentifier: {25}id-mr-delegatedNameConstraintsMatch id-mr:56
|
||||||
|
olcObjectIdentifier: {26}id-mr-timeSpecMatch id-mr:57
|
||||||
|
olcObjectIdentifier: {27}id-mr-attDescriptorMatch id-mr:58
|
||||||
|
olcObjectIdentifier: {28}id-mr-acceptableCertPoliciesMatch id-mr:59
|
||||||
|
olcObjectIdentifier: {29}id-mr-delegationPathMatch id-mr:61
|
||||||
|
olcObjectIdentifier: {30}id-mr-sOAIdentifierMatch id-mr:66
|
||||||
|
olcObjectIdentifier: {31}id-mr-indirectIssuerMatch id-mr:67
|
||||||
|
olcObjectIdentifier: {32}AttributeCertificate 1.3.6.1.4.1.4203.666.11.10.2.1
|
||||||
|
olcObjectIdentifier: {33}CertificateList 1.3.6.1.4.1.1466.115.121.1.9
|
||||||
|
olcObjectIdentifier: {34}AttCertPath 1.3.6.1.4.1.4203.666.11.10.2.4
|
||||||
|
olcObjectIdentifier: {35}PolicySyntax 1.3.6.1.4.1.4203.666.11.10.2.5
|
||||||
|
olcObjectIdentifier: {36}RoleSyntax 1.3.6.1.4.1.4203.666.11.10.2.6
|
||||||
|
olcLdapSyntaxes: {0}( 1.3.6.1.4.1.4203.666.11.10.2.4 DESC 'X.509 PMI attribute
|
||||||
|
cartificate path: SEQUENCE OF AttributeCertificate' X-SUBST '1.3.6.1.4.1.146
|
||||||
|
6.115.121.1.15' )
|
||||||
|
olcLdapSyntaxes: {1}( 1.3.6.1.4.1.4203.666.11.10.2.5 DESC 'X.509 PMI policy sy
|
||||||
|
ntax' X-SUBST '1.3.6.1.4.1.1466.115.121.1.15' )
|
||||||
|
olcLdapSyntaxes: {2}( 1.3.6.1.4.1.4203.666.11.10.2.6 DESC 'X.509 PMI role synt
|
||||||
|
ax' X-SUBST '1.3.6.1.4.1.1466.115.121.1.15' )
|
||||||
|
olcAttributeTypes: {0}( id-at-role NAME 'role' DESC 'X.509 Role attribute, use
|
||||||
|
;binary' SYNTAX RoleSyntax )
|
||||||
|
olcAttributeTypes: {1}( id-at-xMLPrivilegeInfo NAME 'xmlPrivilegeInfo' DESC 'X
|
||||||
|
.509 XML privilege information attribute' SYNTAX 1.3.6.1.4.1.1466.115.121.1.1
|
||||||
|
5 )
|
||||||
|
olcAttributeTypes: {2}( id-at-attributeCertificate NAME 'attributeCertificateA
|
||||||
|
ttribute' DESC 'X.509 Attribute certificate attribute, use ;binary' EQUALITY
|
||||||
|
attributeCertificateExactMatch SYNTAX AttributeCertificate )
|
||||||
|
olcAttributeTypes: {3}( id-at-aACertificate NAME 'aACertificate' DESC 'X.509 A
|
||||||
|
A certificate attribute, use ;binary' EQUALITY attributeCertificateExactMatch
|
||||||
|
SYNTAX AttributeCertificate )
|
||||||
|
olcAttributeTypes: {4}( id-at-attributeDescriptorCertificate NAME 'attributeDe
|
||||||
|
scriptorCertificate' DESC 'X.509 Attribute descriptor certificate attribute,
|
||||||
|
use ;binary' EQUALITY attributeCertificateExactMatch SYNTAX AttributeCertific
|
||||||
|
ate )
|
||||||
|
olcAttributeTypes: {5}( id-at-attributeCertificateRevocationList NAME 'attribu
|
||||||
|
teCertificateRevocationList' DESC 'X.509 Attribute certificate revocation lis
|
||||||
|
t attribute, use ;binary' SYNTAX CertificateList X-EQUALITY 'certificateListE
|
||||||
|
xactMatch, not implemented yet' )
|
||||||
|
olcAttributeTypes: {6}( id-at-attributeAuthorityRevocationList NAME 'attribute
|
||||||
|
AuthorityRevocationList' DESC 'X.509 AA certificate revocation list attribute
|
||||||
|
, use ;binary' SYNTAX CertificateList X-EQUALITY 'certificateListExactMatch,
|
||||||
|
not implemented yet' )
|
||||||
|
olcAttributeTypes: {7}( id-at-delegationPath NAME 'delegationPath' DESC 'X.509
|
||||||
|
Delegation path attribute, use ;binary' SYNTAX AttCertPath )
|
||||||
|
olcAttributeTypes: {8}( id-at-privPolicy NAME 'privPolicy' DESC 'X.509 Privile
|
||||||
|
ge policy attribute, use ;binary' SYNTAX PolicySyntax )
|
||||||
|
olcAttributeTypes: {9}( id-at-protPrivPolicy NAME 'protPrivPolicy' DESC 'X.509
|
||||||
|
Protected privilege policy attribute, use ;binary' EQUALITY attributeCertifi
|
||||||
|
cateExactMatch SYNTAX AttributeCertificate )
|
||||||
|
olcAttributeTypes: {10}( id-at-xMLPprotPrivPolicy NAME 'xmlPrivPolicy' DESC 'X
|
||||||
|
.509 XML Protected privilege policy attribute' SYNTAX 1.3.6.1.4.1.1466.115.12
|
||||||
|
1.1.15 )
|
||||||
|
olcObjectClasses: {0}( id-oc-pmiUser NAME 'pmiUser' DESC 'X.509 PMI user objec
|
||||||
|
t class' SUP top AUXILIARY MAY attributeCertificateAttribute )
|
||||||
|
olcObjectClasses: {1}( id-oc-pmiAA NAME 'pmiAA' DESC 'X.509 PMI AA object clas
|
||||||
|
s' SUP top AUXILIARY MAY ( aACertificate $ attributeCertificateRevocationList
|
||||||
|
$ attributeAuthorityRevocationList ) )
|
||||||
|
olcObjectClasses: {2}( id-oc-pmiSOA NAME 'pmiSOA' DESC 'X.509 PMI SOA object c
|
||||||
|
lass' SUP top AUXILIARY MAY ( attributeCertificateRevocationList $ attributeA
|
||||||
|
uthorityRevocationList $ attributeDescriptorCertificate ) )
|
||||||
|
olcObjectClasses: {3}( id-oc-attCertCRLDistributionPts NAME 'attCertCRLDistrib
|
||||||
|
utionPt' DESC 'X.509 Attribute certificate CRL distribution point object clas
|
||||||
|
s' SUP top AUXILIARY MAY ( attributeCertificateRevocationList $ attributeAuth
|
||||||
|
orityRevocationList ) )
|
||||||
|
olcObjectClasses: {4}( id-oc-pmiDelegationPath NAME 'pmiDelegationPath' DESC '
|
||||||
|
X.509 PMI delegation path' SUP top AUXILIARY MAY delegationPath )
|
||||||
|
olcObjectClasses: {5}( id-oc-privilegePolicy NAME 'privilegePolicy' DESC 'X.50
|
||||||
|
9 Privilege policy object class' SUP top AUXILIARY MAY privPolicy )
|
||||||
|
olcObjectClasses: {6}( id-oc-protectedPrivilegePolicy NAME 'protectedPrivilege
|
||||||
|
Policy' DESC 'X.509 Protected privilege policy object class' SUP top AUXILIAR
|
||||||
|
Y MAY protPrivPolicy )
|
||||||
464
docker/ldap/data/etc/schema/pmi.schema
Normal file
464
docker/ldap/data/etc/schema/pmi.schema
Normal file
@ -0,0 +1,464 @@
|
|||||||
|
# OpenLDAP X.509 PMI schema
|
||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 1998-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
## Portions Copyright (C) The Internet Society (1997-2006).
|
||||||
|
## All Rights Reserved.
|
||||||
|
##
|
||||||
|
## This document and translations of it may be copied and furnished to
|
||||||
|
## others, and derivative works that comment on or otherwise explain it
|
||||||
|
## or assist in its implementation may be prepared, copied, published
|
||||||
|
## and distributed, in whole or in part, without restriction of any
|
||||||
|
## kind, provided that the above copyright notice and this paragraph are
|
||||||
|
## included on all such copies and derivative works. However, this
|
||||||
|
## document itself may not be modified in any way, such as by removing
|
||||||
|
## the copyright notice or references to the Internet Society or other
|
||||||
|
## Internet organizations, except as needed for the purpose of
|
||||||
|
## developing Internet standards in which case the procedures for
|
||||||
|
## copyrights defined in the Internet Standards process must be
|
||||||
|
## followed, or as required to translate it into languages other than
|
||||||
|
## English.
|
||||||
|
##
|
||||||
|
## The limited permissions granted above are perpetual and will not be
|
||||||
|
## revoked by the Internet Society or its successors or assigns.
|
||||||
|
##
|
||||||
|
## This document and the information contained herein is provided on an
|
||||||
|
## "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
||||||
|
## TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
||||||
|
## BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
||||||
|
## HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
||||||
|
## MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||||
|
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Includes LDAPv3 schema items from:
|
||||||
|
# ITU X.509 (08/2005)
|
||||||
|
#
|
||||||
|
## X.509 (08/2005) pp. 120-121
|
||||||
|
##
|
||||||
|
## -- object identifier assignments --
|
||||||
|
## -- object classes --
|
||||||
|
## id-oc-pmiUser OBJECT IDENTIFIER ::= {id-oc 24}
|
||||||
|
## id-oc-pmiAA OBJECT IDENTIFIER ::= {id-oc 25}
|
||||||
|
## id-oc-pmiSOA OBJECT IDENTIFIER ::= {id-oc 26}
|
||||||
|
## id-oc-attCertCRLDistributionPts OBJECT IDENTIFIER ::= {id-oc 27}
|
||||||
|
## id-oc-privilegePolicy OBJECT IDENTIFIER ::= {id-oc 32}
|
||||||
|
## id-oc-pmiDelegationPath OBJECT IDENTIFIER ::= {id-oc 33}
|
||||||
|
## id-oc-protectedPrivilegePolicy OBJECT IDENTIFIER ::= {id-oc 34}
|
||||||
|
## -- directory attributes --
|
||||||
|
## id-at-attributeCertificate OBJECT IDENTIFIER ::= {id-at 58}
|
||||||
|
## id-at-attributeCertificateRevocationList OBJECT IDENTIFIER ::= {id-at 59}
|
||||||
|
## id-at-aACertificate OBJECT IDENTIFIER ::= {id-at 61}
|
||||||
|
## id-at-attributeDescriptorCertificate OBJECT IDENTIFIER ::= {id-at 62}
|
||||||
|
## id-at-attributeAuthorityRevocationList OBJECT IDENTIFIER ::= {id-at 63}
|
||||||
|
## id-at-privPolicy OBJECT IDENTIFIER ::= {id-at 71}
|
||||||
|
## id-at-role OBJECT IDENTIFIER ::= {id-at 72}
|
||||||
|
## id-at-delegationPath OBJECT IDENTIFIER ::= {id-at 73}
|
||||||
|
## id-at-protPrivPolicy OBJECT IDENTIFIER ::= {id-at 74}
|
||||||
|
## id-at-xMLPrivilegeInfo OBJECT IDENTIFIER ::= {id-at 75}
|
||||||
|
## id-at-xMLPprotPrivPolicy OBJECT IDENTIFIER ::= {id-at 76}
|
||||||
|
## -- attribute certificate extensions --
|
||||||
|
## id-ce-authorityAttributeIdentifier OBJECT IDENTIFIER ::= {id-ce 38}
|
||||||
|
## id-ce-roleSpecCertIdentifier OBJECT IDENTIFIER ::= {id-ce 39}
|
||||||
|
## id-ce-basicAttConstraints OBJECT IDENTIFIER ::= {id-ce 41}
|
||||||
|
## id-ce-delegatedNameConstraints OBJECT IDENTIFIER ::= {id-ce 42}
|
||||||
|
## id-ce-timeSpecification OBJECT IDENTIFIER ::= {id-ce 43}
|
||||||
|
## id-ce-attributeDescriptor OBJECT IDENTIFIER ::= {id-ce 48}
|
||||||
|
## id-ce-userNotice OBJECT IDENTIFIER ::= {id-ce 49}
|
||||||
|
## id-ce-sOAIdentifier OBJECT IDENTIFIER ::= {id-ce 50}
|
||||||
|
## id-ce-acceptableCertPolicies OBJECT IDENTIFIER ::= {id-ce 52}
|
||||||
|
## id-ce-targetInformation OBJECT IDENTIFIER ::= {id-ce 55}
|
||||||
|
## id-ce-noRevAvail OBJECT IDENTIFIER ::= {id-ce 56}
|
||||||
|
## id-ce-acceptablePrivilegePolicies OBJECT IDENTIFIER ::= {id-ce 57}
|
||||||
|
## id-ce-indirectIssuer OBJECT IDENTIFIER ::= {id-ce 61}
|
||||||
|
## id-ce-noAssertion OBJECT IDENTIFIER ::= {id-ce 62}
|
||||||
|
## id-ce-issuedOnBehalfOf OBJECT IDENTIFIER ::= {id-ce 64}
|
||||||
|
## -- PMI matching rules --
|
||||||
|
## id-mr-attributeCertificateMatch OBJECT IDENTIFIER ::= {id-mr 42}
|
||||||
|
## id-mr-attributeCertificateExactMatch OBJECT IDENTIFIER ::= {id-mr 45}
|
||||||
|
## id-mr-holderIssuerMatch OBJECT IDENTIFIER ::= {id-mr 46}
|
||||||
|
## id-mr-authAttIdMatch OBJECT IDENTIFIER ::= {id-mr 53}
|
||||||
|
## id-mr-roleSpecCertIdMatch OBJECT IDENTIFIER ::= {id-mr 54}
|
||||||
|
## id-mr-basicAttConstraintsMatch OBJECT IDENTIFIER ::= {id-mr 55}
|
||||||
|
## id-mr-delegatedNameConstraintsMatch OBJECT IDENTIFIER ::= {id-mr 56}
|
||||||
|
## id-mr-timeSpecMatch OBJECT IDENTIFIER ::= {id-mr 57}
|
||||||
|
## id-mr-attDescriptorMatch OBJECT IDENTIFIER ::= {id-mr 58}
|
||||||
|
## id-mr-acceptableCertPoliciesMatch OBJECT IDENTIFIER ::= {id-mr 59}
|
||||||
|
## id-mr-delegationPathMatch OBJECT IDENTIFIER ::= {id-mr 61}
|
||||||
|
## id-mr-sOAIdentifierMatch OBJECT IDENTIFIER ::= {id-mr 66}
|
||||||
|
## id-mr-indirectIssuerMatch OBJECT IDENTIFIER ::= {id-mr 67}
|
||||||
|
##
|
||||||
|
##
|
||||||
|
## X.509 (08/2005) pp. 71, 86-89
|
||||||
|
##
|
||||||
|
## 14.4.1 Role attribute
|
||||||
|
## role ATTRIBUTE ::= {
|
||||||
|
## WITH SYNTAX RoleSyntax
|
||||||
|
## ID id-at-role }
|
||||||
|
## RoleSyntax ::= SEQUENCE {
|
||||||
|
## roleAuthority [0] GeneralNames OPTIONAL,
|
||||||
|
## roleName [1] GeneralName }
|
||||||
|
##
|
||||||
|
## 14.5 XML privilege information attribute
|
||||||
|
## xmlPrivilegeInfo ATTRIBUTE ::= {
|
||||||
|
## WITH SYNTAX UTF8String -- contains XML-encoded privilege information
|
||||||
|
## ID id-at-xMLPrivilegeInfo }
|
||||||
|
##
|
||||||
|
## 17.1 PMI directory object classes
|
||||||
|
##
|
||||||
|
## 17.1.1 PMI user object class
|
||||||
|
## pmiUser OBJECT-CLASS ::= {
|
||||||
|
## -- a PMI user (i.e., a "holder")
|
||||||
|
## SUBCLASS OF {top}
|
||||||
|
## KIND auxiliary
|
||||||
|
## MAY CONTAIN {attributeCertificateAttribute}
|
||||||
|
## ID id-oc-pmiUser }
|
||||||
|
##
|
||||||
|
## 17.1.2 PMI AA object class
|
||||||
|
## pmiAA OBJECT-CLASS ::= {
|
||||||
|
## -- a PMI AA
|
||||||
|
## SUBCLASS OF {top}
|
||||||
|
## KIND auxiliary
|
||||||
|
## MAY CONTAIN {aACertificate |
|
||||||
|
## attributeCertificateRevocationList |
|
||||||
|
## attributeAuthorityRevocationList}
|
||||||
|
## ID id-oc-pmiAA }
|
||||||
|
##
|
||||||
|
## 17.1.3 PMI SOA object class
|
||||||
|
## pmiSOA OBJECT-CLASS ::= { -- a PMI Source of Authority
|
||||||
|
## SUBCLASS OF {top}
|
||||||
|
## KIND auxiliary
|
||||||
|
## MAY CONTAIN {attributeCertificateRevocationList |
|
||||||
|
## attributeAuthorityRevocationList |
|
||||||
|
## attributeDescriptorCertificate}
|
||||||
|
## ID id-oc-pmiSOA }
|
||||||
|
##
|
||||||
|
## 17.1.4 Attribute certificate CRL distribution point object class
|
||||||
|
## attCertCRLDistributionPt OBJECT-CLASS ::= {
|
||||||
|
## SUBCLASS OF {top}
|
||||||
|
## KIND auxiliary
|
||||||
|
## MAY CONTAIN { attributeCertificateRevocationList |
|
||||||
|
## attributeAuthorityRevocationList }
|
||||||
|
## ID id-oc-attCertCRLDistributionPts }
|
||||||
|
##
|
||||||
|
## 17.1.5 PMI delegation path
|
||||||
|
## pmiDelegationPath OBJECT-CLASS ::= {
|
||||||
|
## SUBCLASS OF {top}
|
||||||
|
## KIND auxiliary
|
||||||
|
## MAY CONTAIN { delegationPath }
|
||||||
|
## ID id-oc-pmiDelegationPath }
|
||||||
|
##
|
||||||
|
## 17.1.6 Privilege policy object class
|
||||||
|
## privilegePolicy OBJECT-CLASS ::= {
|
||||||
|
## SUBCLASS OF {top}
|
||||||
|
## KIND auxiliary
|
||||||
|
## MAY CONTAIN {privPolicy }
|
||||||
|
## ID id-oc-privilegePolicy }
|
||||||
|
##
|
||||||
|
## 17.1.7 Protected privilege policy object class
|
||||||
|
## protectedPrivilegePolicy OBJECT-CLASS ::= {
|
||||||
|
## SUBCLASS OF {top}
|
||||||
|
## KIND auxiliary
|
||||||
|
## MAY CONTAIN {protPrivPolicy }
|
||||||
|
## ID id-oc-protectedPrivilegePolicy }
|
||||||
|
##
|
||||||
|
## 17.2 PMI Directory attributes
|
||||||
|
##
|
||||||
|
## 17.2.1 Attribute certificate attribute
|
||||||
|
## attributeCertificateAttribute ATTRIBUTE ::= {
|
||||||
|
## WITH SYNTAX AttributeCertificate
|
||||||
|
## EQUALITY MATCHING RULE attributeCertificateExactMatch
|
||||||
|
## ID id-at-attributeCertificate }
|
||||||
|
##
|
||||||
|
## 17.2.2 AA certificate attribute
|
||||||
|
## aACertificate ATTRIBUTE ::= {
|
||||||
|
## WITH SYNTAX AttributeCertificate
|
||||||
|
## EQUALITY MATCHING RULE attributeCertificateExactMatch
|
||||||
|
## ID id-at-aACertificate }
|
||||||
|
##
|
||||||
|
## 17.2.3 Attribute descriptor certificate attribute
|
||||||
|
## attributeDescriptorCertificate ATTRIBUTE ::= {
|
||||||
|
## WITH SYNTAX AttributeCertificate
|
||||||
|
## EQUALITY MATCHING RULE attributeCertificateExactMatch
|
||||||
|
## ID id-at-attributeDescriptorCertificate }
|
||||||
|
##
|
||||||
|
## 17.2.4 Attribute certificate revocation list attribute
|
||||||
|
## attributeCertificateRevocationList ATTRIBUTE ::= {
|
||||||
|
## WITH SYNTAX CertificateList
|
||||||
|
## EQUALITY MATCHING RULE certificateListExactMatch
|
||||||
|
## ID id-at-attributeCertificateRevocationList}
|
||||||
|
##
|
||||||
|
## 17.2.5 AA certificate revocation list attribute
|
||||||
|
## attributeAuthorityRevocationList ATTRIBUTE ::= {
|
||||||
|
## WITH SYNTAX CertificateList
|
||||||
|
## EQUALITY MATCHING RULE certificateListExactMatch
|
||||||
|
## ID id-at-attributeAuthorityRevocationList }
|
||||||
|
##
|
||||||
|
## 17.2.6 Delegation path attribute
|
||||||
|
## delegationPath ATTRIBUTE ::= {
|
||||||
|
## WITH SYNTAX AttCertPath
|
||||||
|
## ID id-at-delegationPath }
|
||||||
|
## AttCertPath ::= SEQUENCE OF AttributeCertificate
|
||||||
|
##
|
||||||
|
## 17.2.7 Privilege policy attribute
|
||||||
|
## privPolicy ATTRIBUTE ::= {
|
||||||
|
## WITH SYNTAX PolicySyntax
|
||||||
|
## ID id-at-privPolicy }
|
||||||
|
##
|
||||||
|
## 17.2.8 Protected privilege policy attribute
|
||||||
|
## protPrivPolicy ATTRIBUTE ::= {
|
||||||
|
## WITH SYNTAX AttributeCertificate
|
||||||
|
## EQUALITY MATCHING RULE attributeCertificateExactMatch
|
||||||
|
## ID id-at-protPrivPolicy }
|
||||||
|
##
|
||||||
|
## 17.2.9 XML Protected privilege policy attribute
|
||||||
|
## xmlPrivPolicy ATTRIBUTE ::= {
|
||||||
|
## WITH SYNTAX UTF8String -- contains XML-encoded privilege policy information
|
||||||
|
## ID id-at-xMLPprotPrivPolicy }
|
||||||
|
##
|
||||||
|
|
||||||
|
## -- object identifier assignments --
|
||||||
|
## -- object classes --
|
||||||
|
objectidentifier id-oc-pmiUser 2.5.6.24
|
||||||
|
objectidentifier id-oc-pmiAA 2.5.6.25
|
||||||
|
objectidentifier id-oc-pmiSOA 2.5.6.26
|
||||||
|
objectidentifier id-oc-attCertCRLDistributionPts 2.5.6.27
|
||||||
|
objectidentifier id-oc-privilegePolicy 2.5.6.32
|
||||||
|
objectidentifier id-oc-pmiDelegationPath 2.5.6.33
|
||||||
|
objectidentifier id-oc-protectedPrivilegePolicy 2.5.6.34
|
||||||
|
## -- directory attributes --
|
||||||
|
objectidentifier id-at-attributeCertificate 2.5.4.58
|
||||||
|
objectidentifier id-at-attributeCertificateRevocationList 2.5.4.59
|
||||||
|
objectidentifier id-at-aACertificate 2.5.4.61
|
||||||
|
objectidentifier id-at-attributeDescriptorCertificate 2.5.4.62
|
||||||
|
objectidentifier id-at-attributeAuthorityRevocationList 2.5.4.63
|
||||||
|
objectidentifier id-at-privPolicy 2.5.4.71
|
||||||
|
objectidentifier id-at-role 2.5.4.72
|
||||||
|
objectidentifier id-at-delegationPath 2.5.4.73
|
||||||
|
objectidentifier id-at-protPrivPolicy 2.5.4.74
|
||||||
|
objectidentifier id-at-xMLPrivilegeInfo 2.5.4.75
|
||||||
|
objectidentifier id-at-xMLPprotPrivPolicy 2.5.4.76
|
||||||
|
## -- attribute certificate extensions --
|
||||||
|
## id-ce-authorityAttributeIdentifier OBJECT IDENTIFIER ::= {id-ce 38}
|
||||||
|
## id-ce-roleSpecCertIdentifier OBJECT IDENTIFIER ::= {id-ce 39}
|
||||||
|
## id-ce-basicAttConstraints OBJECT IDENTIFIER ::= {id-ce 41}
|
||||||
|
## id-ce-delegatedNameConstraints OBJECT IDENTIFIER ::= {id-ce 42}
|
||||||
|
## id-ce-timeSpecification OBJECT IDENTIFIER ::= {id-ce 43}
|
||||||
|
## id-ce-attributeDescriptor OBJECT IDENTIFIER ::= {id-ce 48}
|
||||||
|
## id-ce-userNotice OBJECT IDENTIFIER ::= {id-ce 49}
|
||||||
|
## id-ce-sOAIdentifier OBJECT IDENTIFIER ::= {id-ce 50}
|
||||||
|
## id-ce-acceptableCertPolicies OBJECT IDENTIFIER ::= {id-ce 52}
|
||||||
|
## id-ce-targetInformation OBJECT IDENTIFIER ::= {id-ce 55}
|
||||||
|
## id-ce-noRevAvail OBJECT IDENTIFIER ::= {id-ce 56}
|
||||||
|
## id-ce-acceptablePrivilegePolicies OBJECT IDENTIFIER ::= {id-ce 57}
|
||||||
|
## id-ce-indirectIssuer OBJECT IDENTIFIER ::= {id-ce 61}
|
||||||
|
## id-ce-noAssertion OBJECT IDENTIFIER ::= {id-ce 62}
|
||||||
|
## id-ce-issuedOnBehalfOf OBJECT IDENTIFIER ::= {id-ce 64}
|
||||||
|
## -- PMI matching rules --
|
||||||
|
objectidentifier id-mr 2.5.13
|
||||||
|
objectidentifier id-mr-attributeCertificateMatch id-mr:42
|
||||||
|
objectidentifier id-mr-attributeCertificateExactMatch id-mr:45
|
||||||
|
objectidentifier id-mr-holderIssuerMatch id-mr:46
|
||||||
|
objectidentifier id-mr-authAttIdMatch id-mr:53
|
||||||
|
objectidentifier id-mr-roleSpecCertIdMatch id-mr:54
|
||||||
|
objectidentifier id-mr-basicAttConstraintsMatch id-mr:55
|
||||||
|
objectidentifier id-mr-delegatedNameConstraintsMatch id-mr:56
|
||||||
|
objectidentifier id-mr-timeSpecMatch id-mr:57
|
||||||
|
objectidentifier id-mr-attDescriptorMatch id-mr:58
|
||||||
|
objectidentifier id-mr-acceptableCertPoliciesMatch id-mr:59
|
||||||
|
objectidentifier id-mr-delegationPathMatch id-mr:61
|
||||||
|
objectidentifier id-mr-sOAIdentifierMatch id-mr:66
|
||||||
|
objectidentifier id-mr-indirectIssuerMatch id-mr:67
|
||||||
|
## -- syntaxes --
|
||||||
|
## NOTE: 1.3.6.1.4.1.4203.666.11.10 is the oid arc assigned by OpenLDAP
|
||||||
|
## to this work in progress
|
||||||
|
objectidentifier AttributeCertificate 1.3.6.1.4.1.4203.666.11.10.2.1
|
||||||
|
objectidentifier CertificateList 1.3.6.1.4.1.1466.115.121.1.9
|
||||||
|
objectidentifier AttCertPath 1.3.6.1.4.1.4203.666.11.10.2.4
|
||||||
|
objectidentifier PolicySyntax 1.3.6.1.4.1.4203.666.11.10.2.5
|
||||||
|
objectidentifier RoleSyntax 1.3.6.1.4.1.4203.666.11.10.2.6
|
||||||
|
# NOTE: OIDs from <draft-ietf-pkix-ldap-schema-02.txt> (expired)
|
||||||
|
#objectidentifier AttributeCertificate 1.2.826.0.1.3344810.7.5
|
||||||
|
#objectidentifier AttCertPath 1.2.826.0.1.3344810.7.10
|
||||||
|
#objectidentifier PolicySyntax 1.2.826.0.1.3344810.7.17
|
||||||
|
#objectidentifier RoleSyntax 1.2.826.0.1.3344810.7.13
|
||||||
|
##
|
||||||
|
## Substitute syntaxes
|
||||||
|
##
|
||||||
|
## AttCertPath
|
||||||
|
ldapsyntax ( 1.3.6.1.4.1.4203.666.11.10.2.4
|
||||||
|
NAME 'AttCertPath'
|
||||||
|
DESC 'X.509 PMI attribute cartificate path: SEQUENCE OF AttributeCertificate'
|
||||||
|
X-SUBST '1.3.6.1.4.1.1466.115.121.1.15' )
|
||||||
|
##
|
||||||
|
## PolicySyntax
|
||||||
|
ldapsyntax ( 1.3.6.1.4.1.4203.666.11.10.2.5
|
||||||
|
NAME 'PolicySyntax'
|
||||||
|
DESC 'X.509 PMI policy syntax'
|
||||||
|
X-SUBST '1.3.6.1.4.1.1466.115.121.1.15' )
|
||||||
|
##
|
||||||
|
## RoleSyntax
|
||||||
|
ldapsyntax ( 1.3.6.1.4.1.4203.666.11.10.2.6
|
||||||
|
NAME 'RoleSyntax'
|
||||||
|
DESC 'X.509 PMI role syntax'
|
||||||
|
X-SUBST '1.3.6.1.4.1.1466.115.121.1.15' )
|
||||||
|
##
|
||||||
|
## X.509 (08/2005) pp. 71, 86-89
|
||||||
|
##
|
||||||
|
## 14.4.1 Role attribute
|
||||||
|
attributeType ( id-at-role
|
||||||
|
NAME 'role'
|
||||||
|
DESC 'X.509 Role attribute, use ;binary'
|
||||||
|
SYNTAX RoleSyntax )
|
||||||
|
##
|
||||||
|
## 14.5 XML privilege information attribute
|
||||||
|
## -- contains XML-encoded privilege information
|
||||||
|
attributeType ( id-at-xMLPrivilegeInfo
|
||||||
|
NAME 'xmlPrivilegeInfo'
|
||||||
|
DESC 'X.509 XML privilege information attribute'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
##
|
||||||
|
## 17.2 PMI Directory attributes
|
||||||
|
##
|
||||||
|
## 17.2.1 Attribute certificate attribute
|
||||||
|
attributeType ( id-at-attributeCertificate
|
||||||
|
NAME 'attributeCertificateAttribute'
|
||||||
|
DESC 'X.509 Attribute certificate attribute, use ;binary'
|
||||||
|
SYNTAX AttributeCertificate
|
||||||
|
EQUALITY attributeCertificateExactMatch )
|
||||||
|
##
|
||||||
|
## 17.2.2 AA certificate attribute
|
||||||
|
attributeType ( id-at-aACertificate
|
||||||
|
NAME 'aACertificate'
|
||||||
|
DESC 'X.509 AA certificate attribute, use ;binary'
|
||||||
|
SYNTAX AttributeCertificate
|
||||||
|
EQUALITY attributeCertificateExactMatch )
|
||||||
|
##
|
||||||
|
## 17.2.3 Attribute descriptor certificate attribute
|
||||||
|
attributeType ( id-at-attributeDescriptorCertificate
|
||||||
|
NAME 'attributeDescriptorCertificate'
|
||||||
|
DESC 'X.509 Attribute descriptor certificate attribute, use ;binary'
|
||||||
|
SYNTAX AttributeCertificate
|
||||||
|
EQUALITY attributeCertificateExactMatch )
|
||||||
|
##
|
||||||
|
## 17.2.4 Attribute certificate revocation list attribute
|
||||||
|
attributeType ( id-at-attributeCertificateRevocationList
|
||||||
|
NAME 'attributeCertificateRevocationList'
|
||||||
|
DESC 'X.509 Attribute certificate revocation list attribute, use ;binary'
|
||||||
|
SYNTAX CertificateList
|
||||||
|
X-EQUALITY 'certificateListExactMatch, not implemented yet' )
|
||||||
|
##
|
||||||
|
## 17.2.5 AA certificate revocation list attribute
|
||||||
|
attributeType ( id-at-attributeAuthorityRevocationList
|
||||||
|
NAME 'attributeAuthorityRevocationList'
|
||||||
|
DESC 'X.509 AA certificate revocation list attribute, use ;binary'
|
||||||
|
SYNTAX CertificateList
|
||||||
|
X-EQUALITY 'certificateListExactMatch, not implemented yet' )
|
||||||
|
##
|
||||||
|
## 17.2.6 Delegation path attribute
|
||||||
|
attributeType ( id-at-delegationPath
|
||||||
|
NAME 'delegationPath'
|
||||||
|
DESC 'X.509 Delegation path attribute, use ;binary'
|
||||||
|
SYNTAX AttCertPath )
|
||||||
|
## AttCertPath ::= SEQUENCE OF AttributeCertificate
|
||||||
|
##
|
||||||
|
## 17.2.7 Privilege policy attribute
|
||||||
|
attributeType ( id-at-privPolicy
|
||||||
|
NAME 'privPolicy'
|
||||||
|
DESC 'X.509 Privilege policy attribute, use ;binary'
|
||||||
|
SYNTAX PolicySyntax )
|
||||||
|
##
|
||||||
|
## 17.2.8 Protected privilege policy attribute
|
||||||
|
attributeType ( id-at-protPrivPolicy
|
||||||
|
NAME 'protPrivPolicy'
|
||||||
|
DESC 'X.509 Protected privilege policy attribute, use ;binary'
|
||||||
|
SYNTAX AttributeCertificate
|
||||||
|
EQUALITY attributeCertificateExactMatch )
|
||||||
|
##
|
||||||
|
## 17.2.9 XML Protected privilege policy attribute
|
||||||
|
## -- contains XML-encoded privilege policy information
|
||||||
|
attributeType ( id-at-xMLPprotPrivPolicy
|
||||||
|
NAME 'xmlPrivPolicy'
|
||||||
|
DESC 'X.509 XML Protected privilege policy attribute'
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
|
||||||
|
##
|
||||||
|
## 17.1 PMI directory object classes
|
||||||
|
##
|
||||||
|
## 17.1.1 PMI user object class
|
||||||
|
## -- a PMI user (i.e., a "holder")
|
||||||
|
objectClass ( id-oc-pmiUser
|
||||||
|
NAME 'pmiUser'
|
||||||
|
DESC 'X.509 PMI user object class'
|
||||||
|
SUP top
|
||||||
|
AUXILIARY
|
||||||
|
MAY ( attributeCertificateAttribute ) )
|
||||||
|
##
|
||||||
|
## 17.1.2 PMI AA object class
|
||||||
|
## -- a PMI AA
|
||||||
|
objectClass ( id-oc-pmiAA
|
||||||
|
NAME 'pmiAA'
|
||||||
|
DESC 'X.509 PMI AA object class'
|
||||||
|
SUP top
|
||||||
|
AUXILIARY
|
||||||
|
MAY ( aACertificate $
|
||||||
|
attributeCertificateRevocationList $
|
||||||
|
attributeAuthorityRevocationList
|
||||||
|
) )
|
||||||
|
##
|
||||||
|
## 17.1.3 PMI SOA object class
|
||||||
|
## -- a PMI Source of Authority
|
||||||
|
objectClass ( id-oc-pmiSOA
|
||||||
|
NAME 'pmiSOA'
|
||||||
|
DESC 'X.509 PMI SOA object class'
|
||||||
|
SUP top
|
||||||
|
AUXILIARY
|
||||||
|
MAY ( attributeCertificateRevocationList $
|
||||||
|
attributeAuthorityRevocationList $
|
||||||
|
attributeDescriptorCertificate
|
||||||
|
) )
|
||||||
|
##
|
||||||
|
## 17.1.4 Attribute certificate CRL distribution point object class
|
||||||
|
objectClass ( id-oc-attCertCRLDistributionPts
|
||||||
|
NAME 'attCertCRLDistributionPt'
|
||||||
|
DESC 'X.509 Attribute certificate CRL distribution point object class'
|
||||||
|
SUP top
|
||||||
|
AUXILIARY
|
||||||
|
MAY ( attributeCertificateRevocationList $
|
||||||
|
attributeAuthorityRevocationList
|
||||||
|
) )
|
||||||
|
##
|
||||||
|
## 17.1.5 PMI delegation path
|
||||||
|
objectClass ( id-oc-pmiDelegationPath
|
||||||
|
NAME 'pmiDelegationPath'
|
||||||
|
DESC 'X.509 PMI delegation path'
|
||||||
|
SUP top
|
||||||
|
AUXILIARY
|
||||||
|
MAY ( delegationPath ) )
|
||||||
|
##
|
||||||
|
## 17.1.6 Privilege policy object class
|
||||||
|
objectClass ( id-oc-privilegePolicy
|
||||||
|
NAME 'privilegePolicy'
|
||||||
|
DESC 'X.509 Privilege policy object class'
|
||||||
|
SUP top
|
||||||
|
AUXILIARY
|
||||||
|
MAY ( privPolicy ) )
|
||||||
|
##
|
||||||
|
## 17.1.7 Protected privilege policy object class
|
||||||
|
objectClass ( id-oc-protectedPrivilegePolicy
|
||||||
|
NAME 'protectedPrivilegePolicy'
|
||||||
|
DESC 'X.509 Protected privilege policy object class'
|
||||||
|
SUP top
|
||||||
|
AUXILIARY
|
||||||
|
MAY ( protPrivPolicy ) )
|
||||||
|
|
||||||
87
docker/ldap/data/etc/schema/ppolicy.ldif
Normal file
87
docker/ldap/data/etc/schema/ppolicy.ldif
Normal file
@ -0,0 +1,87 @@
|
|||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 2004-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
## Portions Copyright (C) The Internet Society (2004).
|
||||||
|
## Please see full copyright statement below.
|
||||||
|
#
|
||||||
|
# Definitions from Draft behera-ldap-password-policy-07 (a work in progress)
|
||||||
|
# Password Policy for LDAP Directories
|
||||||
|
# With extensions from Hewlett-Packard:
|
||||||
|
# pwdCheckModule etc.
|
||||||
|
#
|
||||||
|
# Contents of this file are subject to change (including deletion)
|
||||||
|
# without notice.
|
||||||
|
#
|
||||||
|
# Not recommended for production use!
|
||||||
|
# Use with extreme caution!
|
||||||
|
#
|
||||||
|
# This file was automatically generated from ppolicy.schema; see that file
|
||||||
|
# for complete references.
|
||||||
|
#
|
||||||
|
dn: cn=ppolicy,cn=schema,cn=config
|
||||||
|
objectClass: olcSchemaConfig
|
||||||
|
cn: ppolicy
|
||||||
|
olcAttributeTypes: {0}( 1.3.6.1.4.1.42.2.27.8.1.1 NAME 'pwdAttribute' EQUALITY
|
||||||
|
objectIdentifierMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
|
||||||
|
olcAttributeTypes: {1}( 1.3.6.1.4.1.42.2.27.8.1.2 NAME 'pwdMinAge' EQUALITY in
|
||||||
|
tegerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {2}( 1.3.6.1.4.1.42.2.27.8.1.3 NAME 'pwdMaxAge' EQUALITY in
|
||||||
|
tegerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {3}( 1.3.6.1.4.1.42.2.27.8.1.4 NAME 'pwdInHistory' EQUALITY
|
||||||
|
integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1
|
||||||
|
.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {4}( 1.3.6.1.4.1.42.2.27.8.1.5 NAME 'pwdCheckQuality' EQUAL
|
||||||
|
ITY integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.12
|
||||||
|
1.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {5}( 1.3.6.1.4.1.42.2.27.8.1.6 NAME 'pwdMinLength' EQUALITY
|
||||||
|
integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.
|
||||||
|
1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {6}( 1.3.6.1.4.1.42.2.27.8.1.7 NAME 'pwdExpireWarning' EQUA
|
||||||
|
LITY integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.
|
||||||
|
121.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {7}( 1.3.6.1.4.1.42.2.27.8.1.8 NAME 'pwdGraceAuthNLimit' EQ
|
||||||
|
UALITY integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.11
|
||||||
|
5.121.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {8}( 1.3.6.1.4.1.42.2.27.8.1.9 NAME 'pwdLockout' EQUALITY b
|
||||||
|
ooleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {9}( 1.3.6.1.4.1.42.2.27.8.1.10 NAME 'pwdLockoutDuration' E
|
||||||
|
QUALITY integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.1
|
||||||
|
15.121.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {10}( 1.3.6.1.4.1.42.2.27.8.1.11 NAME 'pwdMaxFailure' EQUAL
|
||||||
|
ITY integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.1
|
||||||
|
21.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {11}( 1.3.6.1.4.1.42.2.27.8.1.12 NAME 'pwdFailureCountInter
|
||||||
|
val' EQUALITY integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.
|
||||||
|
1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {12}( 1.3.6.1.4.1.42.2.27.8.1.13 NAME 'pwdMustChange' EQUAL
|
||||||
|
ITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {13}( 1.3.6.1.4.1.42.2.27.8.1.14 NAME 'pwdAllowUserChange'
|
||||||
|
EQUALITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {14}( 1.3.6.1.4.1.42.2.27.8.1.15 NAME 'pwdSafeModify' EQUAL
|
||||||
|
ITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {15}( 1.3.6.1.4.1.4754.1.99.1 NAME 'pwdCheckModule' DESC 'L
|
||||||
|
oadable module that instantiates "check_password() function' EQUALITY caseExa
|
||||||
|
ctIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
|
||||||
|
olcAttributeTypes: {16}( 1.3.6.1.4.1.42.2.27.8.1.30 NAME 'pwdMaxRecordedFailur
|
||||||
|
e' EQUALITY integerMatch ORDERING integerOrderingMatch SYNTAX 1.3.6.1.4.1.
|
||||||
|
1466.115.121.1.27 SINGLE-VALUE )
|
||||||
|
olcObjectClasses: {0}( 1.3.6.1.4.1.4754.2.99.1 NAME 'pwdPolicyChecker' SUP top
|
||||||
|
AUXILIARY MAY pwdCheckModule )
|
||||||
|
olcObjectClasses: {1}( 1.3.6.1.4.1.42.2.27.8.2.1 NAME 'pwdPolicy' SUP top AUXI
|
||||||
|
LIARY MUST pwdAttribute MAY ( pwdMinAge $ pwdMaxAge $ pwdInHistory $ pwdCheck
|
||||||
|
Quality $ pwdMinLength $ pwdExpireWarning $ pwdGraceAuthNLimit $ pwdLockout $
|
||||||
|
pwdLockoutDuration $ pwdMaxFailure $ pwdFailureCountInterval $ pwdMustChange
|
||||||
|
$ pwdAllowUserChange $ pwdSafeModify $ pwdMaxRecordedFailure ) )
|
||||||
556
docker/ldap/data/etc/schema/ppolicy.schema
Normal file
556
docker/ldap/data/etc/schema/ppolicy.schema
Normal file
@ -0,0 +1,556 @@
|
|||||||
|
# $OpenLDAP$
|
||||||
|
## This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||||
|
##
|
||||||
|
## Copyright 2004-2017 The OpenLDAP Foundation.
|
||||||
|
## All rights reserved.
|
||||||
|
##
|
||||||
|
## Redistribution and use in source and binary forms, with or without
|
||||||
|
## modification, are permitted only as authorized by the OpenLDAP
|
||||||
|
## Public License.
|
||||||
|
##
|
||||||
|
## A copy of this license is available in the file LICENSE in the
|
||||||
|
## top-level directory of the distribution or, alternatively, at
|
||||||
|
## <http://www.OpenLDAP.org/license.html>.
|
||||||
|
#
|
||||||
|
## Portions Copyright (C) The Internet Society (2004).
|
||||||
|
## Please see full copyright statement below.
|
||||||
|
|
||||||
|
# Definitions from Draft behera-ldap-password-policy-07 (a work in progress)
|
||||||
|
# Password Policy for LDAP Directories
|
||||||
|
# With extensions from Hewlett-Packard:
|
||||||
|
# pwdCheckModule etc.
|
||||||
|
|
||||||
|
# Contents of this file are subject to change (including deletion)
|
||||||
|
# without notice.
|
||||||
|
#
|
||||||
|
# Not recommended for production use!
|
||||||
|
# Use with extreme caution!
|
||||||
|
|
||||||
|
#Network Working Group J. Sermersheim
|
||||||
|
#Internet-Draft Novell, Inc
|
||||||
|
#Expires: April 24, 2005 L. Poitou
|
||||||
|
# Sun Microsystems
|
||||||
|
# October 24, 2004
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Password Policy for LDAP Directories
|
||||||
|
# draft-behera-ldap-password-policy-08.txt
|
||||||
|
#
|
||||||
|
#Status of this Memo
|
||||||
|
#
|
||||||
|
# This document is an Internet-Draft and is subject to all provisions
|
||||||
|
# of section 3 of RFC 3667. By submitting this Internet-Draft, each
|
||||||
|
# author represents that any applicable patent or other IPR claims of
|
||||||
|
# which he or she is aware have been or will be disclosed, and any of
|
||||||
|
# which he or she become aware will be disclosed, in accordance with
|
||||||
|
# RFC 3668.
|
||||||
|
#
|
||||||
|
# Internet-Drafts are working documents of the Internet Engineering
|
||||||
|
# Task Force (IETF), its areas, and its working groups. Note that
|
||||||
|
# other groups may also distribute working documents as
|
||||||
|
# Internet-Drafts.
|
||||||
|
#
|
||||||
|
# Internet-Drafts are draft documents valid for a maximum of six months
|
||||||
|
# and may be updated, replaced, or obsoleted by other documents at any
|
||||||
|
# time. It is inappropriate to use Internet-Drafts as reference
|
||||||
|
# material or to cite them other than as "work in progress."
|
||||||
|
#
|
||||||
|
# The list of current Internet-Drafts can be accessed at
|
||||||
|
# http://www.ietf.org/ietf/1id-abstracts.txt.
|
||||||
|
#
|
||||||
|
# The list of Internet-Draft Shadow Directories can be accessed at
|
||||||
|
# http://www.ietf.org/shadow.html.
|
||||||
|
#
|
||||||
|
# This Internet-Draft will expire on April 24, 2005.
|
||||||
|
#
|
||||||
|
#Copyright Notice
|
||||||
|
#
|
||||||
|
# Copyright (C) The Internet Society (2004).
|
||||||
|
#
|
||||||
|
#Abstract
|
||||||
|
#
|
||||||
|
# Password policy as described in this document is a set of rules that
|
||||||
|
# controls how passwords are used and administered in Lightweight
|
||||||
|
# Directory Access Protocol (LDAP) based directories. In order to
|
||||||
|
# improve the security of LDAP directories and make it difficult for
|
||||||
|
# password cracking programs to break into directories, it is desirable
|
||||||
|
# to enforce a set of rules on password usage. These rules are made to
|
||||||
|
#
|
||||||
|
# [trimmed]
|
||||||
|
#
|
||||||
|
#5. Schema used for Password Policy
|
||||||
|
#
|
||||||
|
# The schema elements defined here fall into two general categories. A
|
||||||
|
# password policy object class is defined which contains a set of
|
||||||
|
# administrative password policy attributes, and a set of operational
|
||||||
|
# attributes are defined that hold general password policy state
|
||||||
|
# information for each user.
|
||||||
|
#
|
||||||
|
#5.2 Attribute Types used in the pwdPolicy ObjectClass
|
||||||
|
#
|
||||||
|
# Following are the attribute types used by the pwdPolicy object class.
|
||||||
|
#
|
||||||
|
#5.2.1 pwdAttribute
|
||||||
|
#
|
||||||
|
# This holds the name of the attribute to which the password policy is
|
||||||
|
# applied. For example, the password policy may be applied to the
|
||||||
|
# userPassword attribute.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.1
|
||||||
|
NAME 'pwdAttribute'
|
||||||
|
EQUALITY objectIdentifierMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )
|
||||||
|
|
||||||
|
#5.2.2 pwdMinAge
|
||||||
|
#
|
||||||
|
# This attribute holds the number of seconds that must elapse between
|
||||||
|
# modifications to the password. If this attribute is not present, 0
|
||||||
|
# seconds is assumed.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.2
|
||||||
|
NAME 'pwdMinAge'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
ORDERING integerOrderingMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
#5.2.3 pwdMaxAge
|
||||||
|
#
|
||||||
|
# This attribute holds the number of seconds after which a modified
|
||||||
|
# password will expire.
|
||||||
|
#
|
||||||
|
# If this attribute is not present, or if the value is 0 the password
|
||||||
|
# does not expire. If not 0, the value must be greater than or equal
|
||||||
|
# to the value of the pwdMinAge.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.3
|
||||||
|
NAME 'pwdMaxAge'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
ORDERING integerOrderingMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
#5.2.4 pwdInHistory
|
||||||
|
#
|
||||||
|
# This attribute specifies the maximum number of used passwords stored
|
||||||
|
# in the pwdHistory attribute.
|
||||||
|
#
|
||||||
|
# If this attribute is not present, or if the value is 0, used
|
||||||
|
# passwords are not stored in the pwdHistory attribute and thus may be
|
||||||
|
# reused.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.4
|
||||||
|
NAME 'pwdInHistory'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
ORDERING integerOrderingMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
#5.2.5 pwdCheckQuality
|
||||||
|
#
|
||||||
|
# {TODO: Consider changing the syntax to OID. Each OID will list a
|
||||||
|
# quality rule (like min len, # of special characters, etc). These
|
||||||
|
# rules can be specified outsid ethis document.}
|
||||||
|
#
|
||||||
|
# {TODO: Note that even though this is meant to be a check that happens
|
||||||
|
# during password modification, it may also be allowed to happen during
|
||||||
|
# authN. This is useful for situations where the password is encrypted
|
||||||
|
# when modified, but decrypted when used to authN.}
|
||||||
|
#
|
||||||
|
# This attribute indicates how the password quality will be verified
|
||||||
|
# while being modified or added. If this attribute is not present, or
|
||||||
|
# if the value is '0', quality checking will not be enforced. A value
|
||||||
|
# of '1' indicates that the server will check the quality, and if the
|
||||||
|
# server is unable to check it (due to a hashed password or other
|
||||||
|
# reasons) it will be accepted. A value of '2' indicates that the
|
||||||
|
# server will check the quality, and if the server is unable to verify
|
||||||
|
# it, it will return an error refusing the password.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.5
|
||||||
|
NAME 'pwdCheckQuality'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
ORDERING integerOrderingMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
#5.2.6 pwdMinLength
|
||||||
|
#
|
||||||
|
# When quality checking is enabled, this attribute holds the minimum
|
||||||
|
# number of characters that must be used in a password. If this
|
||||||
|
# attribute is not present, no minimum password length will be
|
||||||
|
# enforced. If the server is unable to check the length (due to a
|
||||||
|
# hashed password or otherwise), the server will, depending on the
|
||||||
|
# value of the pwdCheckQuality attribute, either accept the password
|
||||||
|
# without checking it ('0' or '1') or refuse it ('2').
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.6
|
||||||
|
NAME 'pwdMinLength'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
ORDERING integerOrderingMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
#5.2.7 pwdExpireWarning
|
||||||
|
#
|
||||||
|
# This attribute specifies the maximum number of seconds before a
|
||||||
|
# password is due to expire that expiration warning messages will be
|
||||||
|
# returned to an authenticating user.
|
||||||
|
#
|
||||||
|
# If this attribute is not present, or if the value is 0 no warnings
|
||||||
|
# will be returned. If not 0, the value must be smaller than the value
|
||||||
|
# of the pwdMaxAge attribute.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.7
|
||||||
|
NAME 'pwdExpireWarning'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
ORDERING integerOrderingMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
#5.2.8 pwdGraceAuthNLimit
|
||||||
|
#
|
||||||
|
# This attribute specifies the number of times an expired password can
|
||||||
|
# be used to authenticate. If this attribute is not present or if the
|
||||||
|
# value is 0, authentication will fail.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.8
|
||||||
|
NAME 'pwdGraceAuthNLimit'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
ORDERING integerOrderingMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
#5.2.9 pwdLockout
|
||||||
|
#
|
||||||
|
# This attribute indicates, when its value is "TRUE", that the password
|
||||||
|
# may not be used to authenticate after a specified number of
|
||||||
|
# consecutive failed bind attempts. The maximum number of consecutive
|
||||||
|
# failed bind attempts is specified in pwdMaxFailure.
|
||||||
|
#
|
||||||
|
# If this attribute is not present, or if the value is "FALSE", the
|
||||||
|
# password may be used to authenticate when the number of failed bind
|
||||||
|
# attempts has been reached.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.9
|
||||||
|
NAME 'pwdLockout'
|
||||||
|
EQUALITY booleanMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
#5.2.10 pwdLockoutDuration
|
||||||
|
#
|
||||||
|
# This attribute holds the number of seconds that the password cannot
|
||||||
|
# be used to authenticate due to too many failed bind attempts. If
|
||||||
|
# this attribute is not present, or if the value is 0 the password
|
||||||
|
# cannot be used to authenticate until reset by a password
|
||||||
|
# administrator.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.10
|
||||||
|
NAME 'pwdLockoutDuration'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
ORDERING integerOrderingMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
#5.2.11 pwdMaxFailure
|
||||||
|
#
|
||||||
|
# This attribute specifies the number of consecutive failed bind
|
||||||
|
# attempts after which the password may not be used to authenticate.
|
||||||
|
# If this attribute is not present, or if the value is 0, this policy
|
||||||
|
# is not checked, and the value of pwdLockout will be ignored.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.11
|
||||||
|
NAME 'pwdMaxFailure'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
ORDERING integerOrderingMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
#5.2.12 pwdFailureCountInterval
|
||||||
|
#
|
||||||
|
# This attribute holds the number of seconds after which the password
|
||||||
|
# failures are purged from the failure counter, even though no
|
||||||
|
# successful authentication occurred.
|
||||||
|
#
|
||||||
|
# If this attribute is not present, or if its value is 0, the failure
|
||||||
|
# counter is only reset by a successful authentication.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.12
|
||||||
|
NAME 'pwdFailureCountInterval'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
ORDERING integerOrderingMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
#5.2.13 pwdMustChange
|
||||||
|
#
|
||||||
|
# This attribute specifies with a value of "TRUE" that users must
|
||||||
|
# change their passwords when they first bind to the directory after a
|
||||||
|
# password is set or reset by a password administrator. If this
|
||||||
|
# attribute is not present, or if the value is "FALSE", users are not
|
||||||
|
# required to change their password upon binding after the password
|
||||||
|
# administrator sets or resets the password. This attribute is not set
|
||||||
|
# due to any actions specified by this document, it is typically set by
|
||||||
|
# a password administrator after resetting a user's password.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.13
|
||||||
|
NAME 'pwdMustChange'
|
||||||
|
EQUALITY booleanMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
#5.2.14 pwdAllowUserChange
|
||||||
|
#
|
||||||
|
# This attribute indicates whether users can change their own
|
||||||
|
# passwords, although the change operation is still subject to access
|
||||||
|
# control. If this attribute is not present, a value of "TRUE" is
|
||||||
|
# assumed. This attribute is intended to be used in the absense of an
|
||||||
|
# access control mechanism.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.14
|
||||||
|
NAME 'pwdAllowUserChange'
|
||||||
|
EQUALITY booleanMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
#5.2.15 pwdSafeModify
|
||||||
|
#
|
||||||
|
# This attribute specifies whether or not the existing password must be
|
||||||
|
# sent along with the new password when being changed. If this
|
||||||
|
# attribute is not present, a "FALSE" value is assumed.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.15
|
||||||
|
NAME 'pwdSafeModify'
|
||||||
|
EQUALITY booleanMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
#ITS#8185 pwdMaxRecordedFailure
|
||||||
|
#
|
||||||
|
# This attribute specifies the maximum number of consecutive failed bind
|
||||||
|
# attempts to record. If this attribute is not present, or if the value
|
||||||
|
# is 0, it defaults to the value of pwdMaxFailure. If that value is also
|
||||||
|
# 0, this value defaults to 5.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.30
|
||||||
|
NAME 'pwdMaxRecordedFailure'
|
||||||
|
EQUALITY integerMatch
|
||||||
|
ORDERING integerOrderingMatch
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
# HP extensions
|
||||||
|
#
|
||||||
|
# pwdCheckModule
|
||||||
|
#
|
||||||
|
# This attribute names a user-defined loadable module that provides
|
||||||
|
# a check_password() function. If pwdCheckQuality is set to '1' or '2'
|
||||||
|
# this function will be called after all of the internal password
|
||||||
|
# quality checks have been passed. The function has this prototype:
|
||||||
|
#
|
||||||
|
# int check_password( char *password, char **errormessage, void *arg )
|
||||||
|
#
|
||||||
|
# The function should return LDAP_SUCCESS for a valid password.
|
||||||
|
|
||||||
|
attributetype ( 1.3.6.1.4.1.4754.1.99.1
|
||||||
|
NAME 'pwdCheckModule'
|
||||||
|
EQUALITY caseExactIA5Match
|
||||||
|
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
|
||||||
|
DESC 'Loadable module that instantiates check_password() function'
|
||||||
|
SINGLE-VALUE )
|
||||||
|
|
||||||
|
objectclass ( 1.3.6.1.4.1.4754.2.99.1
|
||||||
|
NAME 'pwdPolicyChecker'
|
||||||
|
SUP top
|
||||||
|
AUXILIARY
|
||||||
|
MAY ( pwdCheckModule ) )
|
||||||
|
|
||||||
|
#5.1 The pwdPolicy Object Class
|
||||||
|
#
|
||||||
|
# This object class contains the attributes defining a password policy
|
||||||
|
# in effect for a set of users. Section 10 describes the
|
||||||
|
# administration of this object, and the relationship between it and
|
||||||
|
# particular objects.
|
||||||
|
#
|
||||||
|
objectclass ( 1.3.6.1.4.1.42.2.27.8.2.1
|
||||||
|
NAME 'pwdPolicy'
|
||||||
|
SUP top
|
||||||
|
AUXILIARY
|
||||||
|
MUST ( pwdAttribute )
|
||||||
|
MAY ( pwdMinAge $ pwdMaxAge $ pwdInHistory $ pwdCheckQuality $
|
||||||
|
pwdMinLength $ pwdExpireWarning $ pwdGraceAuthNLimit $ pwdLockout
|
||||||
|
$ pwdLockoutDuration $ pwdMaxFailure $ pwdFailureCountInterval $
|
||||||
|
pwdMustChange $ pwdAllowUserChange $ pwdSafeModify $
|
||||||
|
pwdMaxRecordedFailure ) )
|
||||||
|
|
||||||
|
#5.3 Attribute Types for Password Policy State Information
|
||||||
|
#
|
||||||
|
# Password policy state information must be maintained for each user.
|
||||||
|
# The information is located in each user entry as a set of operational
|
||||||
|
# attributes. These operational attributes are: pwdChangedTime,
|
||||||
|
# pwdAccountLockedTime, pwdFailureTime, pwdHistory, pwdGraceUseTime,
|
||||||
|
# pwdReset, pwdPolicySubEntry.
|
||||||
|
#
|
||||||
|
#5.3.1 Password Policy State Attribute Option
|
||||||
|
#
|
||||||
|
# Since the password policy could apply to several attributes used to
|
||||||
|
# store passwords, each of the above operational attributes must have
|
||||||
|
# an option to specify which pwdAttribute it applies to. The password
|
||||||
|
# policy option is defined as the following:
|
||||||
|
#
|
||||||
|
# pwd-<passwordAttribute>
|
||||||
|
#
|
||||||
|
# where passwordAttribute a string following the OID syntax
|
||||||
|
# (1.3.6.1.4.1.1466.115.121.1.38). The attribute type descriptor
|
||||||
|
# (short name) MUST be used.
|
||||||
|
#
|
||||||
|
# For example, if the pwdPolicy object has for pwdAttribute
|
||||||
|
# "userPassword" then the pwdChangedTime operational attribute, in a
|
||||||
|
# user entry, will be:
|
||||||
|
#
|
||||||
|
# pwdChangedTime;pwd-userPassword: 20000103121520Z
|
||||||
|
#
|
||||||
|
# This attribute option follows sub-typing semantics. If a client
|
||||||
|
# requests a password policy state attribute to be returned in a search
|
||||||
|
# operation, and does not specify an option, all subtypes of that
|
||||||
|
# policy state attribute are returned.
|
||||||
|
#
|
||||||
|
#5.3.2 pwdChangedTime
|
||||||
|
#
|
||||||
|
# This attribute specifies the last time the entry's password was
|
||||||
|
# changed. This is used by the password expiration policy. If this
|
||||||
|
# attribute does not exist, the password will never expire.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.8.1.16
|
||||||
|
# NAME 'pwdChangedTime'
|
||||||
|
# DESC 'The time the password was last changed'
|
||||||
|
# EQUALITY generalizedTimeMatch
|
||||||
|
# ORDERING generalizedTimeOrderingMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
|
||||||
|
# SINGLE-VALUE
|
||||||
|
# USAGE directoryOperation )
|
||||||
|
#
|
||||||
|
#5.3.3 pwdAccountLockedTime
|
||||||
|
#
|
||||||
|
# This attribute holds the time that the user's account was locked. A
|
||||||
|
# locked account means that the password may no longer be used to
|
||||||
|
# authenticate. A 000001010000Z value means that the account has been
|
||||||
|
# locked permanently, and that only a password administrator can unlock
|
||||||
|
# the account.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.8.1.17
|
||||||
|
# NAME 'pwdAccountLockedTime'
|
||||||
|
# DESC 'The time an user account was locked'
|
||||||
|
# EQUALITY generalizedTimeMatch
|
||||||
|
# ORDERING generalizedTimeOrderingMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
|
||||||
|
# SINGLE-VALUE
|
||||||
|
# USAGE directoryOperation )
|
||||||
|
#
|
||||||
|
#5.3.4 pwdFailureTime
|
||||||
|
#
|
||||||
|
# This attribute holds the timestamps of the consecutive authentication
|
||||||
|
# failures.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.8.1.19
|
||||||
|
# NAME 'pwdFailureTime'
|
||||||
|
# DESC 'The timestamps of the last consecutive authentication
|
||||||
|
# failures'
|
||||||
|
# EQUALITY generalizedTimeMatch
|
||||||
|
# ORDERING generalizedTimeOrderingMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
|
||||||
|
# USAGE directoryOperation )
|
||||||
|
#
|
||||||
|
#5.3.5 pwdHistory
|
||||||
|
#
|
||||||
|
# This attribute holds a history of previously used passwords. Values
|
||||||
|
# of this attribute are transmitted in string format as given by the
|
||||||
|
# following ABNF:
|
||||||
|
#
|
||||||
|
# pwdHistory = time "#" syntaxOID "#" length "#" data
|
||||||
|
#
|
||||||
|
# time = <generalizedTimeString as specified in 6.14
|
||||||
|
# of [RFC2252]>
|
||||||
|
#
|
||||||
|
# syntaxOID = numericoid ; the string representation of the
|
||||||
|
# ; dotted-decimal OID that defines the
|
||||||
|
# ; syntax used to store the password.
|
||||||
|
# ; numericoid is described in 4.1
|
||||||
|
# ; of [RFC2252].
|
||||||
|
#
|
||||||
|
# length = numericstring ; the number of octets in data.
|
||||||
|
# ; numericstring is described in 4.1
|
||||||
|
# ; of [RFC2252].
|
||||||
|
#
|
||||||
|
# data = <octets representing the password in the format
|
||||||
|
# specified by syntaxOID>.
|
||||||
|
#
|
||||||
|
# This format allows the server to store, and transmit a history of
|
||||||
|
# passwords that have been used. In order for equality matching to
|
||||||
|
# function properly, the time field needs to adhere to a consistent
|
||||||
|
# format. For this purpose, the time field MUST be in GMT format.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.8.1.20
|
||||||
|
# NAME 'pwdHistory'
|
||||||
|
# DESC 'The history of user s passwords'
|
||||||
|
# EQUALITY octetStringMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.40
|
||||||
|
# USAGE directoryOperation )
|
||||||
|
#
|
||||||
|
#5.3.6 pwdGraceUseTime
|
||||||
|
#
|
||||||
|
# This attribute holds the timestamps of grace authentications after a
|
||||||
|
# password has expired.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.8.1.21
|
||||||
|
# NAME 'pwdGraceUseTime'
|
||||||
|
# DESC 'The timestamps of the grace authentication after the
|
||||||
|
# password has expired'
|
||||||
|
# EQUALITY generalizedTimeMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
|
||||||
|
#
|
||||||
|
#5.3.7 pwdReset
|
||||||
|
#
|
||||||
|
# This attribute holds a flag to indicate (when TRUE) that the password
|
||||||
|
# has been updated by the password administrator and must be changed by
|
||||||
|
# the user on first authentication.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.8.1.22
|
||||||
|
# NAME 'pwdReset'
|
||||||
|
# DESC 'The indication that the password has been reset'
|
||||||
|
# EQUALITY booleanMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.7
|
||||||
|
# SINGLE-VALUE
|
||||||
|
# USAGE directoryOperation )
|
||||||
|
#
|
||||||
|
#5.3.8 pwdPolicySubentry
|
||||||
|
#
|
||||||
|
# This attribute points to the pwdPolicy subentry in effect for this
|
||||||
|
# object.
|
||||||
|
#
|
||||||
|
# ( 1.3.6.1.4.1.42.2.27.8.1.23
|
||||||
|
# NAME 'pwdPolicySubentry'
|
||||||
|
# DESC 'The pwdPolicy subentry in effect for this object'
|
||||||
|
# EQUALITY distinguishedNameMatch
|
||||||
|
# SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
|
||||||
|
# SINGLE-VALUE
|
||||||
|
# USAGE directoryOperation )
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#Disclaimer of Validity
|
||||||
|
#
|
||||||
|
# This document and the information contained herein are provided on an
|
||||||
|
# "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
|
||||||
|
# OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
|
||||||
|
# ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
|
||||||
|
# INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
|
||||||
|
# INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
|
||||||
|
# WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
||||||
|
#
|
||||||
|
#
|
||||||
|
#Copyright Statement
|
||||||
|
#
|
||||||
|
# Copyright (C) The Internet Society (2004). This document is subject
|
||||||
|
# to the rights, licenses and restrictions contained in BCP 78, and
|
||||||
|
# except as set forth therein, the authors retain all their rights.
|
||||||
|
|
||||||
71
docker/ldap/data/etc/slapd.conf
Normal file
71
docker/ldap/data/etc/slapd.conf
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
#
|
||||||
|
# See slapd.conf(5) for details on configuration options.
|
||||||
|
# This file should NOT be world readable.
|
||||||
|
#
|
||||||
|
include /etc/openldap/schema/core.schema
|
||||||
|
|
||||||
|
# Define global ACLs to disable default read access.
|
||||||
|
|
||||||
|
# Do not enable referrals until AFTER you have a working directory
|
||||||
|
# service AND an understanding of referrals.
|
||||||
|
#referral ldap://root.openldap.org
|
||||||
|
|
||||||
|
# If you change this, adjust pidfile path also in runscript!
|
||||||
|
pidfile /tmp/slapd.pid
|
||||||
|
argsfile /tmp/slapd.args
|
||||||
|
|
||||||
|
# Load dynamic backend modules:
|
||||||
|
modulepath /usr/lib/openldap
|
||||||
|
moduleload back_mdb.so
|
||||||
|
# moduleload back_hdb.so
|
||||||
|
# moduleload back_bbd.so
|
||||||
|
# moduleload back_ldap.so
|
||||||
|
|
||||||
|
# Sample security restrictions
|
||||||
|
# Require integrity protection (prevent hijacking)
|
||||||
|
# Require 112-bit (3DES or better) encryption for updates
|
||||||
|
# Require 63-bit encryption for simple bind
|
||||||
|
# security ssf=1 update_ssf=112 simple_bind=64
|
||||||
|
|
||||||
|
# Sample access control policy:
|
||||||
|
# Root DSE: allow anyone to read it
|
||||||
|
# Subschema (sub)entry DSE: allow anyone to read it
|
||||||
|
# Other DSEs:
|
||||||
|
# Allow self write access
|
||||||
|
# Allow authenticated users read access
|
||||||
|
# Allow anonymous users to authenticate
|
||||||
|
# Directives needed to implement policy:
|
||||||
|
# access to dn.base="" by * read
|
||||||
|
# access to dn.base="cn=Subschema" by * read
|
||||||
|
# access to *
|
||||||
|
# by self write
|
||||||
|
# by users read
|
||||||
|
# by anonymous auth
|
||||||
|
#
|
||||||
|
# if no access controls are present, the default policy
|
||||||
|
# allows anyone and everyone to read anything but restricts
|
||||||
|
# updates to rootdn. (e.g., "access to * by * read")
|
||||||
|
#
|
||||||
|
# rootdn can always read and write EVERYTHING!
|
||||||
|
|
||||||
|
#######################################################################
|
||||||
|
# MDB database definitions
|
||||||
|
#######################################################################
|
||||||
|
|
||||||
|
database mdb
|
||||||
|
maxsize 1073741824
|
||||||
|
suffix "dc=my-domain,dc=com"
|
||||||
|
rootdn "cn=Manager,dc=my-domain,dc=com"
|
||||||
|
|
||||||
|
# Cleartext passwords, especially for the rootdn, should
|
||||||
|
# be avoid. See slappasswd(8) and slapd.conf(5) for details.
|
||||||
|
# Use of strong authentication encouraged.
|
||||||
|
rootpw secret
|
||||||
|
|
||||||
|
# The database directory MUST exist prior to running slapd AND
|
||||||
|
# should only be accessible by the slapd and slap tools.
|
||||||
|
# Mode 700 recommended.
|
||||||
|
directory /var/lib/openldap/openldap-data
|
||||||
|
|
||||||
|
# Indices to maintain
|
||||||
|
index objectClass eq
|
||||||
100
docker/ldap/data/etc/slapd.ldif
Normal file
100
docker/ldap/data/etc/slapd.ldif
Normal file
@ -0,0 +1,100 @@
|
|||||||
|
#
|
||||||
|
# See slapd-config(5) for details on configuration options.
|
||||||
|
# This file should NOT be world readable.
|
||||||
|
#
|
||||||
|
dn: cn=config
|
||||||
|
objectClass: olcGlobal
|
||||||
|
cn: config
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Define global ACLs to disable default read access.
|
||||||
|
#
|
||||||
|
# If you change this, set pidfile variable in /etc/conf.d/slapd!
|
||||||
|
olcPidFile: /run/openldap/slapd.pid
|
||||||
|
olcArgsFile: /run/openldap/slapd.args
|
||||||
|
#
|
||||||
|
# Do not enable referrals until AFTER you have a working directory
|
||||||
|
# service AND an understanding of referrals.
|
||||||
|
#olcReferral: ldap://root.openldap.org
|
||||||
|
#
|
||||||
|
# Sample security restrictions
|
||||||
|
# Require integrity protection (prevent hijacking)
|
||||||
|
# Require 112-bit (3DES or better) encryption for updates
|
||||||
|
# Require 64-bit encryption for simple bind
|
||||||
|
#olcSecurity: ssf=1 update_ssf=112 simple_bind=64
|
||||||
|
|
||||||
|
|
||||||
|
#
|
||||||
|
# Load dynamic backend modules:
|
||||||
|
#
|
||||||
|
dn: cn=module,cn=config
|
||||||
|
objectClass: olcModuleList
|
||||||
|
cn: module
|
||||||
|
olcModulepath: /usr/lib/openldap
|
||||||
|
#olcModuleload: back_bdb.so
|
||||||
|
#olcModuleload: back_hdb.so
|
||||||
|
#olcModuleload: back_ldap.so
|
||||||
|
olcModuleload: back_mdb.so
|
||||||
|
#olcModuleload: back_passwd.so
|
||||||
|
#olcModuleload: back_shell.so
|
||||||
|
|
||||||
|
|
||||||
|
dn: cn=schema,cn=config
|
||||||
|
objectClass: olcSchemaConfig
|
||||||
|
cn: schema
|
||||||
|
|
||||||
|
include: file:///etc/openldap/schema/core.ldif
|
||||||
|
|
||||||
|
# Frontend settings
|
||||||
|
#
|
||||||
|
dn: olcDatabase=frontend,cn=config
|
||||||
|
objectClass: olcDatabaseConfig
|
||||||
|
objectClass: olcFrontendConfig
|
||||||
|
olcDatabase: frontend
|
||||||
|
#
|
||||||
|
# Sample global access control policy:
|
||||||
|
# Root DSE: allow anyone to read it
|
||||||
|
# Subschema (sub)entry DSE: allow anyone to read it
|
||||||
|
# Other DSEs:
|
||||||
|
# Allow self write access
|
||||||
|
# Allow authenticated users read access
|
||||||
|
# Allow anonymous users to authenticate
|
||||||
|
#
|
||||||
|
#olcAccess: to dn.base="" by * read
|
||||||
|
#olcAccess: to dn.base="cn=Subschema" by * read
|
||||||
|
#olcAccess: to *
|
||||||
|
# by self write
|
||||||
|
# by users read
|
||||||
|
# by anonymous auth
|
||||||
|
#
|
||||||
|
# if no access controls are present, the default policy
|
||||||
|
# allows anyone and everyone to read anything but restricts
|
||||||
|
# updates to rootdn. (e.g., "access to * by * read")
|
||||||
|
#
|
||||||
|
# rootdn can always read and write EVERYTHING!
|
||||||
|
#
|
||||||
|
|
||||||
|
|
||||||
|
#######################################################################
|
||||||
|
# LMDB database definitions
|
||||||
|
#######################################################################
|
||||||
|
#
|
||||||
|
dn: olcDatabase=mdb,cn=config
|
||||||
|
objectClass: olcDatabaseConfig
|
||||||
|
objectClass: olcMdbConfig
|
||||||
|
olcDatabase: mdb
|
||||||
|
olcSuffix: dc=my-domain,dc=com
|
||||||
|
olcRootDN: cn=Manager,dc=my-domain,dc=com
|
||||||
|
|
||||||
|
# Cleartext passwords, especially for the rootdn, should
|
||||||
|
# be avoided. See slappasswd(8) and slapd-config(5) for details.
|
||||||
|
# Use of strong authentication encouraged.
|
||||||
|
olcRootPW: secret
|
||||||
|
|
||||||
|
# The database directory MUST exist prior to running slapd AND
|
||||||
|
# should only be accessible by the slapd and slap tools.
|
||||||
|
# Mode 700 recommended.
|
||||||
|
olcDbDirectory: /var/lib/openldap/openldap-data
|
||||||
|
|
||||||
|
# Indices to maintain
|
||||||
|
olcDbIndex: objectClass eq
|
||||||
37
docker/ldap/docker-compose.yml
Normal file
37
docker/ldap/docker-compose.yml
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
version: "3"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
frontend_net:
|
||||||
|
external: false
|
||||||
|
ldap_net:
|
||||||
|
external: false
|
||||||
|
|
||||||
|
services:
|
||||||
|
ldap:
|
||||||
|
image: docker.clkl.de/ldap/ldap:0.1
|
||||||
|
build:
|
||||||
|
context: .
|
||||||
|
dockerfile: Dockerfile.ldap
|
||||||
|
env_file: ldap.env
|
||||||
|
volumes:
|
||||||
|
# - ./data/etc/:/etc/openldap/
|
||||||
|
- ./data/var/:/var/lib/openldap/
|
||||||
|
ports:
|
||||||
|
- 1389:389
|
||||||
|
networks:
|
||||||
|
- ldap_net
|
||||||
|
|
||||||
|
admin:
|
||||||
|
image: docker.clkl.de/ldap/admin:0.1
|
||||||
|
build:
|
||||||
|
context: .
|
||||||
|
dockerfile: Dockerfile.admin
|
||||||
|
ports:
|
||||||
|
- 8080:80
|
||||||
|
networks:
|
||||||
|
# - frontend_net
|
||||||
|
- ldap_net
|
||||||
|
# labels:
|
||||||
|
# - "traefik.enable=true"
|
||||||
|
# - "traefik.frontend.rule=Host:ldap.stuve-bamberg.de,ldap.stuve.cafe.wie-ei.de"
|
||||||
|
# - "traefik.docker.network=frontend_net"
|
||||||
5
docker/ldap/entrypoint.sh
Executable file
5
docker/ldap/entrypoint.sh
Executable file
@ -0,0 +1,5 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
chown ldap:ldap -R /var/lib/openldap
|
||||||
|
slapadd -l /etc/openldap/start.ldif
|
||||||
|
slapd -u ldap -g ldap -d 32768
|
||||||
|
|
||||||
7
docker/ldap/ldap.env
Normal file
7
docker/ldap/ldap.env
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
#SLAPD_PASSWORD=very_secure_pw
|
||||||
|
SLAPD_PASSWORD=lkdälflvjkäpwidsäpjoöka-ladsÖaslkjxd
|
||||||
|
SLAPD_DOMAIN=example.websites
|
||||||
|
SLAPD_ORGANIZATION= LDAP
|
||||||
|
SLAPD_CONFIG_PASSWORD=config_pw
|
||||||
|
SLAPD_ADDITIONAL_SCHEMAS=
|
||||||
|
SLAPD_ADDITIONAL_MODULES=
|
||||||
83
docker/ldap/slapd.conf
Normal file
83
docker/ldap/slapd.conf
Normal file
@ -0,0 +1,83 @@
|
|||||||
|
#
|
||||||
|
# See slapd.conf(5) for details on configuration options.
|
||||||
|
# This file should NOT be world readable.
|
||||||
|
#
|
||||||
|
include /etc/openldap/schema/core.schema
|
||||||
|
include /etc/openldap/schema/cosine.schema
|
||||||
|
include /etc/openldap/schema/inetorgperson.schema
|
||||||
|
include /etc/openldap/schema/ppolicy.schema
|
||||||
|
|
||||||
|
# Define global ACLs to disable default read access.
|
||||||
|
|
||||||
|
# Do not enable referrals until AFTER you have a working directory
|
||||||
|
# service AND an understanding of referrals.
|
||||||
|
#referral ldap://root.openldap.org
|
||||||
|
moduleload ppolicy.so
|
||||||
|
|
||||||
|
# If you change this, adjust pidfile path also in runscript!
|
||||||
|
pidfile /tmp/slapd.pid
|
||||||
|
argsfile /tmp/slapd.args
|
||||||
|
|
||||||
|
# Load dynamic backend modules:
|
||||||
|
modulepath /usr/lib/openldap
|
||||||
|
moduleload back_mdb.so
|
||||||
|
# moduleload back_hdb.so
|
||||||
|
# moduleload back_bbd.so
|
||||||
|
# moduleload back_ldap.so
|
||||||
|
|
||||||
|
# Sample security restrictions
|
||||||
|
# Require integrity protection (prevent hijacking)
|
||||||
|
# Require 112-bit (3DES or better) encryption for updates
|
||||||
|
# Require 63-bit encryption for simple bind
|
||||||
|
# security ssf=1 update_ssf=112 simple_bind=64
|
||||||
|
|
||||||
|
# Sample access control policy:
|
||||||
|
# Root DSE: allow anyone to read it
|
||||||
|
# Subschema (sub)entry DSE: allow anyone to read it
|
||||||
|
# Other DSEs:
|
||||||
|
# Allow self write access
|
||||||
|
# Allow authenticated users read access
|
||||||
|
# Allow anonymous users to authenticate
|
||||||
|
# Directives needed to implement policy:
|
||||||
|
# access to dn.base="" by * read
|
||||||
|
# access to dn.base="cn=Subschema" by * read
|
||||||
|
# access to *
|
||||||
|
# by self write
|
||||||
|
# by users read
|
||||||
|
# by anonymous auth
|
||||||
|
#
|
||||||
|
# if no access controls are present, the default policy
|
||||||
|
# allows anyone and everyone to read anything but restricts
|
||||||
|
# updates to rootdn. (e.g., "access to * by * read")
|
||||||
|
#
|
||||||
|
# rootdn can always read and write EVERYTHING!
|
||||||
|
|
||||||
|
#######################################################################
|
||||||
|
# MDB database definitions
|
||||||
|
#######################################################################
|
||||||
|
|
||||||
|
database mdb
|
||||||
|
maxsize 1073741824
|
||||||
|
suffix "dc=test,dc=de"
|
||||||
|
rootdn "cn=admin,dc=test,dc=de"
|
||||||
|
|
||||||
|
# Cleartext passwords, especially for the rootdn, should
|
||||||
|
# be avoid. See slappasswd(8) and slapd.conf(5) for details.
|
||||||
|
# Use of strong authentication encouraged.
|
||||||
|
rootpw secret
|
||||||
|
|
||||||
|
# The database directory MUST exist prior to running slapd AND
|
||||||
|
# should only be accessible by the slapd and slap tools.
|
||||||
|
# Mode 700 recommended.
|
||||||
|
directory /var/lib/openldap/openldap-data
|
||||||
|
|
||||||
|
# Indices to maintain
|
||||||
|
index objectClass eq
|
||||||
|
|
||||||
|
overlay ppolicy
|
||||||
|
#ppolicy_default "cn=default,ou=policies,dc=stuve,dc=de"
|
||||||
|
#ppolicy_use_lockout
|
||||||
|
ppolicy_hash_cleartext
|
||||||
|
|
||||||
|
password-hash {CRYPT}
|
||||||
|
password-crypt-salt-format "$6$%.12s"
|
||||||
768
docker/ldap/start.ldif
Normal file
768
docker/ldap/start.ldif
Normal file
@ -0,0 +1,768 @@
|
|||||||
|
dn: dc=stuve,dc=de
|
||||||
|
o: StuVe
|
||||||
|
objectClass: dcobject
|
||||||
|
objectClass: organization
|
||||||
|
structuralObjectClass: organization
|
||||||
|
dc: stuve
|
||||||
|
entryUUID: 14194a21-e532-4caa-8b53-97ce5be9bd3c
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308150713Z
|
||||||
|
entryCSN: 20190308150713.245843Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308150713Z
|
||||||
|
|
||||||
|
dn: ou=fachschaften,dc=stuve,dc=de
|
||||||
|
ou: fachschaften
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: d4c71b54-7ddd-4b93-bcd3-4c8c9a7f9db8
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308150747Z
|
||||||
|
entryCSN: 20190308150747.512079Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308150747Z
|
||||||
|
|
||||||
|
dn: ou=wiai,ou=fachschaften,dc=stuve,dc=de
|
||||||
|
ou: wiai
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 3ab9cb8b-8291-4613-a2d3-173e06b4ea61
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308150804Z
|
||||||
|
entryCSN: 20190308150804.534766Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308150804Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=wiai,ou=fachschaften,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: dcbc3ff1-5f6d-4d49-ae4a-92686ac9b6a4
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308150816Z
|
||||||
|
entryCSN: 20190308150816.277395Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308150816Z
|
||||||
|
|
||||||
|
dn: ou=referate,dc=stuve,dc=de
|
||||||
|
ou: referate
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: f940f71c-1c01-4656-8c9e-bff6b3dd3cdc
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308150935Z
|
||||||
|
entryCSN: 20190308150935.818082Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308150935Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=wiai,ou=fachschaften,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: c255b242-546d-4ee6-99a8-147546b5b5bb
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308150948Z
|
||||||
|
entryCSN: 20190308150948.835880Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308150948Z
|
||||||
|
|
||||||
|
dn: ou=guk,ou=fachschaften,dc=stuve,dc=de
|
||||||
|
ou: guk
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: c403c0f8-0c29-44f2-8bae-027684b7ff4e
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151017Z
|
||||||
|
entryCSN: 20190308151017.676050Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151017Z
|
||||||
|
|
||||||
|
dn: ou=sowi,ou=fachschaften,dc=stuve,dc=de
|
||||||
|
ou: sowi
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: bfd7d45a-d775-4bf7-8e60-53bc6dc4c71c
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151027Z
|
||||||
|
entryCSN: 20190308151027.773442Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151027Z
|
||||||
|
|
||||||
|
dn: ou=huwi,ou=fachschaften,dc=stuve,dc=de
|
||||||
|
ou: huwi
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: d52bf673-afdf-4907-8f26-97e1d9d47dc2
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151036Z
|
||||||
|
entryCSN: 20190308151036.562150Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151036Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=guk,ou=fachschaften,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: b07f0967-7ff3-4908-bbf5-c5b50c83b381
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151043Z
|
||||||
|
entryCSN: 20190308151043.785787Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151043Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=guk,ou=fachschaften,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 3e25517e-c96a-432b-8d9e-41e982489527
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151053Z
|
||||||
|
entryCSN: 20190308151053.951913Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151053Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=huwi,ou=fachschaften,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 9ab93c6e-dba9-4fee-ab0b-cee0d71d22eb
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151103Z
|
||||||
|
entryCSN: 20190308151103.393832Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151103Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=huwi,ou=fachschaften,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 0ba8cd04-a16e-4b71-8a06-012acca6e616
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151111Z
|
||||||
|
entryCSN: 20190308151111.466968Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151111Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=sowi,ou=fachschaften,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 01ba0ffa-c27e-4d34-b095-e11fea2c0ec3
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151120Z
|
||||||
|
entryCSN: 20190308151120.191746Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151120Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=sowi,ou=fachschaften,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: d7acd87f-233a-4f62-9167-58f5521f088d
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151202Z
|
||||||
|
entryCSN: 20190308151202.926995Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151202Z
|
||||||
|
|
||||||
|
dn: ou=konvent,dc=stuve,dc=de
|
||||||
|
ou: konvent
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 18a48b86-9eae-47c9-b011-25e80ecd158f
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151216Z
|
||||||
|
entryCSN: 20190308151216.820348Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151216Z
|
||||||
|
|
||||||
|
dn: ou=buero,dc=stuve,dc=de
|
||||||
|
ou: buero
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 087cbe57-4bba-4e55-a284-d1f484615a4a
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151225Z
|
||||||
|
entryCSN: 20190308151225.311827Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151225Z
|
||||||
|
|
||||||
|
dn: ou=antifa,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: antifa
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 08ecc41d-9e51-4657-8851-6c8a5f8f23e3
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151248Z
|
||||||
|
entryCSN: 20190308151248.255968Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151248Z
|
||||||
|
|
||||||
|
dn: ou=eltern,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: eltern
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: e003255b-5454-4cf7-8053-962c2601769d
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151317Z
|
||||||
|
entryCSN: 20190308151317.211262Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151317Z
|
||||||
|
|
||||||
|
dn: ou=finanzen,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: finanzen
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 2b74f5de-ab8a-4608-a99e-5a149ea36570
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151329Z
|
||||||
|
entryCSN: 20190308151329.584592Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151329Z
|
||||||
|
|
||||||
|
dn: ou=fub,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: fub
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 11971fc5-b3e4-49c8-bae9-b604e858f305
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151343Z
|
||||||
|
entryCSN: 20190308151343.025690Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151343Z
|
||||||
|
|
||||||
|
dn: ou=gleichst,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: gleichst
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 3f6d727d-4bdc-4c62-96c7-7c2d3dedd051
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151408Z
|
||||||
|
entryCSN: 20190308151408.707255Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151408Z
|
||||||
|
|
||||||
|
dn: ou=hiwi,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: hiwi
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 258e1d59-8c5e-45fa-96a5-fc40f1906023
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151523Z
|
||||||
|
entryCSN: 20190308151523.534591Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151523Z
|
||||||
|
|
||||||
|
dn: ou=hopo,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: hopo
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 14149b67-9dc7-4027-85d7-8e326d41bc10
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151545Z
|
||||||
|
entryCSN: 20190308151545.619621Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151545Z
|
||||||
|
|
||||||
|
dn: ou=internat,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: internat
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 80ee661c-936d-4f21-a6ca-82e8682cf2f7
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151553Z
|
||||||
|
entryCSN: 20190308151553.966086Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151553Z
|
||||||
|
|
||||||
|
dn: ou=kontakt,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: kontakt
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: dae7e75f-884d-47c3-9903-0c7f7431b996
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151603Z
|
||||||
|
entryCSN: 20190308151603.674307Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151603Z
|
||||||
|
|
||||||
|
dn: ou=leb,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: leb
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 79bd4174-9c03-40ff-a715-6c479e82848d
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151612Z
|
||||||
|
entryCSN: 20190308151612.619451Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151612Z
|
||||||
|
|
||||||
|
dn: ou=oefik,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: oefik
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 51d3d7fb-0add-4376-8e3f-0ac9a82c43d2
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151620Z
|
||||||
|
entryCSN: 20190308151620.873396Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151620Z
|
||||||
|
|
||||||
|
dn: ou=oeko,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: oeko
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: c17aa2eb-7d2c-454c-9daa-7513d65ecb7f
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151629Z
|
||||||
|
entryCSN: 20190308151629.454122Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151629Z
|
||||||
|
|
||||||
|
dn: ou=qsl,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: qsl
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 2901402e-8900-4eb6-af90-99bc014c2f6c
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151639Z
|
||||||
|
entryCSN: 20190308151639.476959Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151639Z
|
||||||
|
|
||||||
|
dn: ou=sport,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: sport
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: e4ea07c7-fa41-47a0-8c90-3e199b87730b
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151655Z
|
||||||
|
entryCSN: 20190308151655.017391Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151655Z
|
||||||
|
|
||||||
|
dn: ou=studl,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: studl
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 28208579-d686-4920-8564-3c4242581fb0
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308151702Z
|
||||||
|
entryCSN: 20190308151702.837221Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308151702Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=antifa,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 4436030d-cd29-4452-8d0e-fd527a653d0e
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165509Z
|
||||||
|
entryCSN: 20190308165509.918365Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165509Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=antifa,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: e7f177ce-68de-4d8e-b333-4fc78d5df9cf
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165540Z
|
||||||
|
entryCSN: 20190308165540.404573Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165540Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=eltern,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 65951277-d266-471b-ac6b-1c94169d5173
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165548Z
|
||||||
|
entryCSN: 20190308165548.902620Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165548Z
|
||||||
|
|
||||||
|
dn: ou=persons,ou=eltern,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: persons
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: bd5e244f-b32c-4b89-951a-3c7cbd02141b
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165557Z
|
||||||
|
entryCSN: 20190308165557.792690Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165557Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=finanzen,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 7825f154-25d4-4a1b-92ea-428e975a0d39
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165605Z
|
||||||
|
entryCSN: 20190308165605.974851Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165605Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=finanzen,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 8c9f6c42-3c6b-44bd-b651-79ef268e7e70
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165615Z
|
||||||
|
entryCSN: 20190308165615.289893Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165615Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=fub,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 576b724d-31f7-4c01-857c-f3f7538052d2
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165645Z
|
||||||
|
entryCSN: 20190308165645.905381Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165645Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=fub,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: b33444bb-2781-4a67-8775-5b1fe6653701
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165655Z
|
||||||
|
entryCSN: 20190308165655.596151Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165655Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=gleichst,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: d3083a8d-fa6c-48da-baee-278bbaaf09ed
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165704Z
|
||||||
|
entryCSN: 20190308165704.933643Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165704Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=gleichst,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 03a1e7a1-8734-4cc1-a044-5a63319911e0
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165715Z
|
||||||
|
entryCSN: 20190308165715.226073Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165715Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=hiwi,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 1fc3149f-1699-4cb8-99c9-2bd216e968c3
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165723Z
|
||||||
|
entryCSN: 20190308165723.722063Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165723Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=hiwi,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 1183abd5-7673-4e98-9dee-dc6d5f9e53de
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165736Z
|
||||||
|
entryCSN: 20190308165736.451955Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165736Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=hopo,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 331f9a4e-fdd1-4803-b0af-2c931cc02079
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165745Z
|
||||||
|
entryCSN: 20190308165745.603364Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165745Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=hopo,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 73818bc6-e8f8-4068-875e-bf6737eeef7d
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165753Z
|
||||||
|
entryCSN: 20190308165753.578618Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165753Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=internat,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 0d7f5fff-a7f2-477a-abf8-95c4177062a9
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165801Z
|
||||||
|
entryCSN: 20190308165801.363911Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165801Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=internat,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: ddcb256a-a5a7-41b1-9df1-c340558cfec0
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165809Z
|
||||||
|
entryCSN: 20190308165809.274806Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165809Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=kontakt,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: b31a1dce-7dee-44bd-969a-29e89e0f35e7
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308165932Z
|
||||||
|
entryCSN: 20190308165932.661973Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308165932Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=kontakt,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: ec6c1e78-300e-4e9f-b20b-b256b35e6a3d
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308170030Z
|
||||||
|
entryCSN: 20190308170030.076485Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308170030Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=leb,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: d87b886d-e1d4-4954-802f-dba22e1ef2bd
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308170051Z
|
||||||
|
entryCSN: 20190308170051.084923Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308170051Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=leb,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: d60f44d2-e9c4-4a61-8d25-f3afa3bfec5e
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308170100Z
|
||||||
|
entryCSN: 20190308170100.839596Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308170100Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=oefik,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 53991485-9729-4e06-99b4-12492ebb8090
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308170203Z
|
||||||
|
entryCSN: 20190308170203.472134Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308170203Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=oefik,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 7e2f4bf6-bbac-4970-9bfc-79e5f79f0a76
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308170214Z
|
||||||
|
entryCSN: 20190308170214.062681Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308170214Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=oeko,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: b3ec51b6-a508-47cf-b9f0-8f5efa14fa7a
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308170231Z
|
||||||
|
entryCSN: 20190308170231.475822Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308170231Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=oeko,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 3ac56231-39fd-4cfe-a8ea-4f51f3c072dd
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308170240Z
|
||||||
|
entryCSN: 20190308170240.119534Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308170240Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=qsl,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: b636dfc4-b34f-424b-8df5-678a020fbc20
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308170249Z
|
||||||
|
entryCSN: 20190308170249.734177Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308170249Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=qsl,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: e62037ec-1f26-4eea-bdaf-e9a13a78ffed
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308170314Z
|
||||||
|
entryCSN: 20190308170314.404681Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308170314Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=sport,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 96d9a626-b7ef-4945-87d5-913a96c7b414
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308170323Z
|
||||||
|
entryCSN: 20190308170323.112989Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308170323Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=sport,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: c6f11a84-7dd1-4cdc-8aca-55fc7f2e8f92
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308170330Z
|
||||||
|
entryCSN: 20190308170330.492133Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308170330Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=studl,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 0673abdb-9a3c-4922-80a9-b8db496670c9
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308170338Z
|
||||||
|
entryCSN: 20190308170338.748664Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308170338Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=studl,ou=referate,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 5c65f108-b8fc-4689-ab5a-e69c165f85ff
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308170346Z
|
||||||
|
entryCSN: 20190308170346.590474Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308170346Z
|
||||||
|
|
||||||
|
dn: ou=people,ou=buero,dc=stuve,dc=de
|
||||||
|
ou: people
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 01412223-ac07-425d-97a1-de61333e07d4
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308194537Z
|
||||||
|
entryCSN: 20190308194537.277783Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308194537Z
|
||||||
|
|
||||||
|
dn: ou=groups,ou=buero,dc=stuve,dc=de
|
||||||
|
ou: groups
|
||||||
|
objectClass: organizationalUnit
|
||||||
|
objectClass: top
|
||||||
|
structuralObjectClass: organizationalUnit
|
||||||
|
entryUUID: 1f54e8b9-c636-4543-a4b1-1d93f4bb5e44
|
||||||
|
creatorsName: cn=admin,dc=stuve,dc=de
|
||||||
|
createTimestamp: 20190308194604Z
|
||||||
|
entryCSN: 20190308194604.769724Z#000000#000#000000
|
||||||
|
modifiersName: cn=admin,dc=stuve,dc=de
|
||||||
|
modifyTimestamp: 20190308194604Z
|
||||||
Reference in New Issue
Block a user