1 .TH SLAPO-DDS 5 "2008/07/16" "OpenLDAP 2.4.11"
2 .\" Copyright 2005-2008 The OpenLDAP Foundation, All Rights Reserved.
3 .\" Copying restrictions apply. See the COPYRIGHT file.
4 .\" $OpenLDAP: pkg/ldap/doc/man/man5/slapo-dds.5,v 1.1.2.4 2008/02/11 23:26:40 kurt Exp $
6 slapo-dds \- Dynamic Directory Services overlay to slapd
8 /etc/openldap/slapd.conf
14 implements dynamic objects as per RFC 2589.
18 Dynamic Directory Services.
19 It allows to define dynamic objects, characterized by the
23 Dynamic objects have a limited lifetime, determined by a time-to-live
24 (TTL) that can be refreshed by means of a specific
27 This operation allows to set the Client Refresh Period (CRP),
28 namely the period between refreshes that is required to preserve the
29 dynamic object from expiration.
30 The expiration time is computed by adding the requested TTL to the
32 When dynamic objects reach the end of their lifetime without being
33 further refreshed, they are automatically deleted.
34 There is no guarantee of immediate deletion, so clients should not count
37 Dynamic objects can have subordinates, provided these also are dynamic
39 RFC 2589 does not specify what the behavior of a dynamic directory
40 service should be when a dynamic object with (dynamic) subordinates
42 In this implementation, the lifetime of dynamic objects with subordinates
43 is prolonged until all the dynamic subordinates expire.
50 overlay to the current database:
58 overlay may be used with any backend that implements the
65 Since its use may result in many internal entry lookups, adds
66 and deletes, it should be best used in conjunction with backends
67 that have reasonably good write performances.
70 The config directives that are specific to the
72 overlay are prefixed by
74 to avoid potential conflicts with directives specific to the underlying
75 database or to other stacked overlays.
78 .B dds\-max\-ttl <ttl>
79 Specifies the max TTL value.
80 This is also the default TTL newly created
81 dynamic objects receive, unless
84 When the client with a refresh extended operation requests a TTL higher
85 than it, sizeLimitExceeded is returned.
86 This value must be between 86400 (1 day, the default) and 31557600
87 (1 year plus 6 hours, as per RFC 2589).
90 .B dds\-min\-ttl <ttl>
91 Specifies the min TTL value; clients requesting a lower TTL by means
92 of the refresh extended operation actually obtain this value as CRP.
93 If set to 0 (the default), no lower limit is set.
96 .B dds\-default\-ttl <ttl>
97 Specifies the default TTL value that newly created dynamic objects get.
98 If set to 0 (the default), the
103 .B dds\-interval <ttl>
104 Specifies the interval between expiration checks; defaults to 1 hour.
107 .B dds\-tolerance <ttl>
108 Specifies an extra time that is added to the timer that actually wakes up
109 the thread that will delete an expired dynamic object.
110 So the nominal lifetime of the entry is that specified in the
112 attribute, but its lifetime will actually be
113 .BR "entryTtl + tolerance" .
114 Note that there is no guarantee that the lifetime of a dynamic object
117 the requested TTL; due to implementation details, it may be longer, which
118 is allowed by RFC 2589.
119 By default, tolerance is 0.
122 .B dds\-max\-dynamicObjects <num>
123 Specifies the maximum number of dynamic objects that can simultaneously exist
124 within a naming context.
125 This allows to limit the amount of resources (mostly in terms of
126 run-queue size) that are used by dynamic objects.
127 By default, no limit is set.
130 .B dds-state {TRUE|false}
131 Specifies if the Dynamic Directory Services feature is enabled or not.
132 By default it is; however, a proxy does not need to keep track of dynamic
133 objects itself, it only needs to inform the frontend that support for
134 dynamic objects is available.
139 overlay restricts the refresh operation by requiring
145 for details about the
150 is an operational, NO-USER-MODIFICATION attribute, no direct write access
154 overlay turns refresh extended operation into an internal modification to
161 RFC 2589 recommends that anonymous clients should not be allowed to refresh
163 This can be implemented by appropriately crafting access control to obtain
166 Example: restrict refresh to authenticated clients
170 access to attrs=entryTtl
176 Example: restrict refresh to the creator of the dynamic object
180 access to attrs=entryTtl
181 by dnattr=creatorsName manage
186 Another suggested usage of dynamic objects is to implement dynamic meetings;
187 in this case, all the participants to the meeting are allowed to refresh
188 the meeting object, but only the creator can delete it (otherwise it will
189 be deleted when the TTL expires)
191 Example: assuming \fIparticipant\fP is a valid DN-valued attribute,
192 allow users to start a meeting and to join it; restrict refresh
193 to the participants; restrict delete to the creator
197 access to dn.base="cn=Meetings"
201 access to dn.onelevel="cn=Meetings"
203 by dnattr=creatorsName write
206 access to dn.onelevel="cn=Meetings"
208 by dnattr=creatorsName write
212 access to dn.onelevel="cn=Meetings"
214 by dnattr=participant manage
221 This implementation of RFC 2589 provides a restricted interpretation of how
222 dynamic objects replicate. Only the master takes care of handling dynamic
223 object expiration, while replicas simply see the dynamic object as a plain
226 When replicating these objects, one needs to explicitly exclude the
231 This implementation of RFC 2589 introduces a new operational attribute,
232 .BR entryExpireTimestamp ,
233 that contains the expiration timestamp. This must be excluded from
236 The quick and dirty solution is to set
238 in the syncrepl configuration
239 and, optionally, exclude the operational attributes from replication, using
244 exattrs=entryTtl,entryExpireTimestamp
248 In any case the overlay must be either statically built in or run-time loaded
249 by the consumer, so that it is aware of the
250 .B entryExpireTimestamp
251 operational attribute; however, it must not be configured in the shadow
253 Currently, there is no means to remove the
255 class from the entry; this may be seen as a feature, since it allows to see
256 the dynamic properties of the object.
260 /etc/openldap/slapd.conf
261 default slapd configuration file
266 Implemented by Pierangelo Masarati.