Schemas: Accesslog and Password Policy Overlays

In the last chapter we saw OpenLDAP's overlay technology, and we implemented a few simple overlays. In this chapter we have seen how LDAP schemas work. Now we are going to take a look at a few overlays that require custom schemas.

The two overlays that we will examine are the accesslog overlay and the ppolicy (Password Policy) overlay.

Because they require their own schemas, and because each provides a robust feature set, these two overlays have a more complicated configuration. However, since the basic concepts are familiar already, we will move quickly.

Logging with the Accesslog Overlay

The Access Logging overlay (accesslog) extends the logging abilities of the SLAPD server. First, it makes it possible ...

Get Mastering OpenLDAP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.