Table of Contents
8. Access Control
8.5.1. Groups of Groups..................................................................................................................74
8.5.2. Group ACLs without DN syntax...........................................................................................75
8.5.3. Following references.............................................................................................................77
9. Limits.............................................................................................................................................................77
9.1. Introduction.....................................................................................................................................77
9.2. Soft and Hard limits........................................................................................................................77
9.3. Global Limits..................................................................................................................................78
9.4. Per-Database Limits........................................................................................................................78
9.4.1. Specify who the limits apply to.............................................................................................78
9.4.2. Specify time limits.................................................................................................................79
9.4.3. Specifying size limits............................................................................................................79
9.4.4. Size limits and Paged Results................................................................................................79
9.5. Example Limit Configurations.......................................................................................................79
9.5.1. Simple Global Limits............................................................................................................80
9.5.2. Global Hard and Soft Limits.................................................................................................80
9.5.3. Giving specific users larger limits.........................................................................................80
9.5.4. Limiting who can do paged searches....................................................................................80
9.6. Further Information.........................................................................................................................81
10. Database Creation and Maintenance Tools..............................................................................................81
10.1. Creating a database over LDAP....................................................................................................82
10.2. Creating a database off-line..........................................................................................................83
10.2.1. The slapadd program...........................................................................................................84
10.2.2. The slapindex program........................................................................................................84
10.2.3. The slapcat program............................................................................................................84
10.3. The LDIF text entry format...........................................................................................................87
11. Backends......................................................................................................................................................87
11.1. Berkeley DB Backends.................................................................................................................87
11.1.1. Overview.............................................................................................................................87
11.1.2. back-bdb/back-hdb Configuration.......................................................................................87
11.1.3. Further Information.............................................................................................................87
11.2. LDAP............................................................................................................................................87
11.2.1. Overview.............................................................................................................................88
11.2.2. back-ldap Configuration......................................................................................................88
11.2.3. Further Information.............................................................................................................89
11.3. LDIF..............................................................................................................................................89
11.3.1. Overview.............................................................................................................................89
11.3.2. back-ldif Configuration.......................................................................................................90
11.3.3. Further Information.............................................................................................................90
11.4. Metadirectory................................................................................................................................90
11.4.1. Overview.............................................................................................................................90
11.4.2. back-meta Configuration.....................................................................................................90
11.4.3. Further Information.............................................................................................................90
11.5. Monitor.........................................................................................................................................90
11.5.1. Overview.............................................................................................................................91
OpenLDAP Software 2.4 Administrator's Guide
iii