|
|
|
|
This can be done using slapo-chain. The slave will proxy the changes to the master on behalf of the requesting DN. Here is a sample setup: In the slave's slapd.conf, you need a chain overlay in the global section:
overlay chain
chain-uri ldaps://master.example.net
chain-idassert-bind bindmethod=sasl
saslmech=EXTERNAL
binddn="cn=bugworkaround"
mode=self
chain-idassert-authzFrom "*"
chain-return-error TRUE
In this setup, TLS is used for communication between slave and master, hence the On the master, the following is needed:
authz-policy to
authz-regexp cn=slave1.example.net
cn=slave1.example.net,ou=pseudo-user,dc=example,dc=net
authz-regexp cn=slave2.example.net
cn=slave2.example.net,ou=pseudo-user,dc=example,dc=net
access to attrs=authzTo
by * read stop
The ACL clause is very important on the security front. If random user are allowed to change their authzTo attribute, then they can perfom a change on behalf on ay other user. In the DIT, you need the following for each slave: dn: cn=slave1.example.net,ou=pseudo-user,dc=example,dc=net objectClass: organizationalRole cn: slave1.example.net ou: pseudo-user authzTo: * manu@netbsd.org | |
| [Append to This Answer] |
| Previous: |
|
| Next: |
|
| ||||||||