Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
O
OpenLDAP
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Requirements
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Locked files
Build
Pipelines
Jobs
Pipeline schedules
Test cases
Artifacts
Deploy
Releases
Package registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Code review analytics
Issue analytics
Insights
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Jaak Ristioja
OpenLDAP
Commits
e0a359ef
Commit
e0a359ef
authored
22 years ago
by
Howard Chu
Browse files
Options
Downloads
Patches
Plain Diff
Changed "saslRegexp" to "sasl-regexp". (Both are valid, but this is
more consistent with the other sasl directives.)
parent
cbba11d7
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
doc/guide/admin/sasl.sdf
+13
-13
13 additions, 13 deletions
doc/guide/admin/sasl.sdf
with
13 additions
and
13 deletions
doc/guide/admin/sasl.sdf
+
13
−
13
View file @
e0a359ef
...
...
@@ -233,15 +233,15 @@ their {{authentication DN}}.
The LDAP administrator will need to tell the slapd server how to
map an authentication request DN to a user's authentication DN.
This is done by adding one or more {{EX:sasl
R
egexp}} directives to
This is done by adding one or more {{EX:sasl
-r
egexp}} directives to
the {{slapd.conf}}(5) file. This directive takes two arguments:
> sasl
R
egexp <search pattern> <replacement pattern>
> sasl
-r
egexp <search pattern> <replacement pattern>
The authentication request DN is compared to the search pattern
using the regular expression functions {{regcomp}}() and {{regexec}}(),
and if it matches, it is rewritten as the replacement pattern. If
there are multiple {{EX:sasl
R
egexp}} directives, only the first
there are multiple {{EX:sasl
-r
egexp}} directives, only the first
whose search pattern matches the authentication identity is used.
The string that is output from the replacement pattern should be
the authentication DN of the user, in a legitimate LDAP DN format.
...
...
@@ -271,16 +271,16 @@ and the user's actual LDAP entry is
> uid=adamson,ou=person,dc=example,dc=com
The {{EX:sasl
R
egexp}} directive in {{slapd.conf}}(5) could be
The {{EX:sasl
-r
egexp}} directive in {{slapd.conf}}(5) could be
written
> sasl
R
egexp
> sasl
-r
egexp
> uid=(.*),cn=example.com,cn=kerberos_v4,cn=auth
> uid=$1,ou=person,dc=example,dc=com
An even more lenient rule could be written as
> sasl
R
egexp
> sasl
-r
egexp
> uid=(.*),.*cn=auth
> uid=$1,ou=person,dc=example,dc=com
...
...
@@ -291,7 +291,7 @@ several strict directives than one lenient directive which has
security holes. If there is only one authentication mechanism in
place at your site, and zero or one realms in use, you might be
able to map between authentication identities and LDAP DN's with
a single {{EX:sasl
R
egexp}} directive.
a single {{EX:sasl
-r
egexp}} directive.
Some sites may have people's DN's spread to multiple areas of the
LDAP tree, such as if there were an ou=accounting tree and an
...
...
@@ -308,14 +308,14 @@ like
In this case, the information in the authentication identity can
only be used to search for the user's DN, not derive it directly.
For both of these situations, and others, the replacement pattern
in the {{EX:sasl
R
egexp}} directives will need to produce an LDAP
in the {{EX:sasl
-r
egexp}} directives will need to produce an LDAP
URL, described in the next section.
H3: Performing searches for a person's DN
When there is not enough information in the authentication identity
to derive a person's authentication DN directly, the {{EX:sasl
R
egexp}}
to derive a person's authentication DN directly, the {{EX:sasl
-r
egexp}}
directives in the {{slapd.conf}}(5) file will need to produce an
LDAP URL. This URL will then be used to perform an internal search
of the LDAP database to find the person's authentication DN.
...
...
@@ -337,10 +337,10 @@ string.
Suppose that the person in the example from above did in fact have
an authentication username of "adamson" and that information was
kept in the attribute "uid" in their LDAP entry. The {{EX:sasl
R
egexp}}
kept in the attribute "uid" in their LDAP entry. The {{EX:sasl
-r
egexp}}
directive might be written as
> sasl
R
egexp
> sasl
-r
egexp
> uid=(.*),cn=example.com,cn=kerberos_v4,cn=auth
> ldap://localhost/ou=person,dc=example,dc=com??sub?uid=$1
...
...
@@ -455,7 +455,7 @@ an {{authorization request DN}} of the form
> uid=<username>,cn=<realm>,cn=<mechanism>,cn=auth
That authorization request DN is then run through the same
{{EX:sasl
R
egexp}} process to convert it into a legitimate authorization
{{EX:sasl
-r
egexp}} process to convert it into a legitimate authorization
DN from the database. If it cannot be converted due to a failed
search from an LDAP URL, the authorization request fails with
"inappropriate access". Otherwise, the DN string is now a legitimate
...
...
@@ -493,7 +493,7 @@ only specify that a request be allowed; there are no negative rules
telling what authorizations to deny.
The value(s) in the two attributes are of the same form as the
output of the replacement pattern of a {{EX:sasl
R
egexp}} directive:
output of the replacement pattern of a {{EX:sasl
-r
egexp}} directive:
either a DN or an LDAP URL. For example, if a {{EX:saslAuthzTo}}
value is a DN, that DN is one the authenticated user can authorize
to. On the other hand, if the {{EX:saslAuthzTo}} value is an LDAP
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment