Friday, April 17, 2020

[389-users] Restricting access to the LDAP server

-----BEGIN PGP SIGNATURE-----
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=MZgQ
-----END PGP SIGNATURE-----
Hi all,

while setting up my demo server I found that I am completely lacking knowledge
in that respect.

I found those two and will work through them.

https://directory.fedoraproject.org/docs/389ds/howto/howto-accesscontrol.html

https://access.redhat.com/documentation/en-us/red_hat_directory_server/9.0/html/administration_guide/managing_access_control

Are there any other good tutorials or best practices on how to secure a 389
server? Restrict the bind_DN that sssd uses? Restricting people to read all
contents of the LDAP tree?

Kind Regards,
Johannes

--
Johannes Kastl
Linux Consultant & Trainer
Tel.: +49 (0) 151 2372 5802
Mail: kastl@b1-systems.de

B1 Systems GmbH
Osterfeldstraße 7 / 85088 Vohburg
http://www.b1-systems.de
GF: Ralph Dehner
Unternehmenssitz: Vohburg / AG: Ingolstadt,HRB 3537

No comments:

Post a Comment