Hmm, I am not to familiar with the acl's. I have solved 
it now by duplicating the by lines to the other section 
something like this


 {5} access to dn.subtree="ou=People,dc=example,dc=com" 
 attrs="entry,uid,cn,sn,mail,mailHost"
    by dn="cn=outsourced_ironport,dc=example,dc=com" read
    by dn="cn=outsourced_bla,dc=example,dc=com" read 
 {6} access to dn.subtree="ou=People,dc=example,dc=com" 
    by dn="cn=outsourced_bla,dc=example,dc=com" read 


But I am not to pleased with this solution either. I had to 
create a new account and save the password on a client, 
while user account dn's are available there, and they should
access these 'own' attributes.

https://www.mail-archive.com/[email protected]/msg25113.html



-----Original Message-----
To: openldap-technical
Subject: Re: Now combining acl attribute access with regular access 
fails

You are confusing “continue” with “break”.

> On Aug 31, 2020, at 9:22 AM, Marc Roos <[email protected]> 
wrote:
> 
> 
> Now I have that either works, but not both. Reversing these rules also 

> does not work (with keeping the continue at 5)
> 
> {5} access to dn.subtree="ou=People,dc=example,dc=com" 
>    by dn="cn=outsourced_bla,dc=example,dc=com" read 
>    by * continue
> {6} access to dn.subtree="ou=People,dc=example,dc=com" 
> attrs="entry,uid,cn,sn,mail,mailHost"
>    by dn="cn=outsourced_ironport,dc=example,dc=com" read
> 
> Any help possible?
> 


//
John Pfeifer
Division of Information Technology
University of Maryland, College Park

Reply via email to