Openldap administration

:relaxed: @nas Great work! It does not modify any configuration file managed by templates. Thus it’s OK for me.


@feenix: the root user has full privileges on the LDAP tree through the ldapi:// socket. This is the CentOS default. Just remember to use -Y EXTERNAL option on ldap* commands. For instance

ldapsearch -Y EXTERNAL -b cn=config
ldapdelete -Y EXTERNAL 'uid=yourmachine$' # <- does it work?

Unfortunately some services (like samba or libuser) don’t like ldapi:// and require an account. And ACLs. To inspect LDAP ACLs use the commands from

http://docs.nethserver.org/projects/nethserver-devel/en/latest/directory.html#inspect-openldap-acls


:pray: be careful when accessing LDAP. It is the Unix and Samba accounts backend. It contains very sensitive informations. It’s more than /etc/passwd. It’s like /etc/shadow.

  • Don’t expose it to remote access.
  • Don’t change ACLs!