O'Reilly logo

Mastering OpenLDAP by Matt Butcher

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Schemas: Accesslog and Password Policy Overlays

In the last chapter we saw OpenLDAP's overlay technology, and we implemented a few simple overlays. In this chapter we have seen how LDAP schemas work. Now we are going to take a look at a few overlays that require custom schemas.

The two overlays that we will examine are the accesslog overlay and the ppolicy (Password Policy) overlay.

Because they require their own schemas, and because each provides a robust feature set, these two overlays have a more complicated configuration. However, since the basic concepts are familiar already, we will move quickly.

Logging with the Accesslog Overlay

The Access Logging overlay (accesslog) extends the logging abilities of the SLAPD server. First, it makes it possible ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required