Limiting Directory Manager (nsslapd-rootdn) by source host (e.g. 127.0.0.1)?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi!

The Direcroty Manager account (the one whose DN is specified in dse.ldif as nsslapd-rootdn) is a dangerously privileged account.

Access control does not apply to this user and compromising its DN and password gives full control over the directory server.

Therefore, it would be desirable to limit this user's bind access based on some additional criteria, in addition to the knowledge of the password.

Limits based on the source host (e.g. localhost) and time of day (e.g. only work hours) would be very useful.

Is there a way to limit Directory Manager binds based on those criteria in Fedora Directory Server?


Note that in OpenLDAP this is possible using the following ACL:

access to dn.base="cn=Manager,o=Example"
 by peername.regex=127\.0\.0\.1 auth
 by users none
 by anonymous none

This ACL however requires creating a concrete LDAP entry that corresponds to rootdn, setting a userPassword in taht entry, and leaving the rootpw in OpenLDAP configuration undefined. This way the concrete userPassword is used when binding and is subject to that ACL which only allows access from connections that origin from 127.0.0.1.

More details in this post on OpenLDAP mailing list:
http://www.openldap.org/lists/openldap-software/200711/msg00342.html

--
Best Regards,
   Aleksander Adamowski
       GG#: 274614
ICQ UIN: 19780575 http://olo.org.pl

--
Fedora-directory-users mailing list
Fedora-directory-users@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-users

[Index of Archives]     [Fedora Directory Users]     [Fedora Directory Devel]     [Fedora Announce]     [Fedora Legacy Announce]     [Kernel]     [Fedora Legacy]     [Share Photos]     [Fedora Desktop]     [PAM]     [Red Hat Watch]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite News]

  Powered by Linux