well, yes, I have seen that but I had hoped to have a different way (maybe via some UCS / UMC frontend tool) which does not involve editing ACL manually directly …
Anyway, here is what I did
# cat /etc/univention/templates/files/etc/ldap/slapd.conf.d/69univention-custom-ldap-acls
# . /usr/share/univention-lib/ldap.sh
# ucs_registerLDAPExtension --packagename=myacl --packageversion=1 --acl 69univention-custom-ldap-acls
..
Waiting for activation of the extension object 69univention-custom-ldap-acls: .........OK
where the custom ACL file looks like this (ignore first ACL used for other stuff here …):
access to attrs=gecos,secretary
by self write
by * none
access to attrs=userPassword
by dn="uid=queryimap,cn=users,dc=my,dc=company,dc=com" read
by anonymous auth
by self write
by * none break
would you say that it is correct? I am in referring in particular to the fact that in slapd.conf there are already ACLs concerning that attribute (userPassword) and my worry is that my ACL would interfere/break the default / already existing one as distributed in UCS.