In the last chapter we saw OpenLDAP's overlay technology, and we implemented a few simple overlays. In this chapter we have seen how LDAP schemas work. Now we are going to take a look at a few overlays that require custom schemas.
The two overlays that we will examine are the
accesslog overlay and the
ppolicy (Password Policy) overlay.
Because they require their own schemas, and because each provides a robust feature set, these two overlays have a more complicated configuration. However, since the basic concepts are familiar already, we will move quickly.
The Access Logging overlay (
accesslog) extends the logging abilities of the SLAPD server. First, it makes it possible ...