Appendix D. ACL Reference
494
Each ACI has to apply to specific users or groups. This is set using a couple of common flags, usually
user=
or
group=
, though there are other options, like
ipaddress=
which defines client-based
access rather than entry-based access. If there is more than one entry, then the names are separated
by a double pipe (||). For example,
group="group1" || "group2"
.
Each area of the
resourceACLS
attribute value is defined in
Table D.1, “Sections of the ACL Attribute
Value”
.
Value
Description
class_name
The plug-in class to which the ACI is applied.
all operations
The list of every operation covered in the ACI definition. There can be multiple
operations in a single ACI and multiple ACIs in a single
resourceACLS
attribute.
allow|deny
Whether the action is being allowed for the target user or group or denied to the
target user or group.
(
operations
)
The operations being allowed or denied.
type=target
The target to identify who this applies to. This is commonly a user (such
as
user=
"name"
) or a group (
group=
"group"
). If there is more than one
entry, then the names are separated by a double pipe (||). For example,
group="group1" || "group2"
.
description
A description of what the ACL is doing.
Table D.1. Sections of the ACL Attribute Value
D.2. Common ACLs
This section covers the default access control configuration that is common for all four subsystem
types. These access control rules manage access to basic and common configuration settings, such
as logging and adding users and groups.
IMPORTANT
These ACLs are common in that the same ACLs are occur in each subsystem instance's
acl.ldif
file. These are not
shared
ACLs in the sense that the configuration files
or settings are held in common by all subsystem instances. As with all other instance
configuration, these ACLs are maintained independently of other subsystem instances, in
the instance-specific
acl.ldif
file.
D.2.1. certServer.acl.configuration
Controls operations to the ACL configuration. The default configuration is:
allow (read) group="Administrators" || group="Certificate Manager Agents" ||
group="Registration Manager Agents" || group="Data Recovery Manager Agents" || group="Online
Certificate Status Manager Agents" || group="Auditors";allow (modify) group="Administrators"
Operations
Description
Allow/Deny
Access
Targeted
Users/
Groups
read
View ACL resources and list ACL resources, ACL listing evaluators, and ACL evaluator types.
Allow
Administrators
Summary of Contents for CERTIFICATE SYSTEM 8.0 - ADMINISTRATION
Page 42: ...20 ...
Page 43: ...Part I Setting up Certificate Services ...
Page 44: ......
Page 190: ...168 ...
Page 208: ...186 ...
Page 223: ...Part II Additional Configuration to Manage CA Services ...
Page 224: ......
Page 256: ...234 ...
Page 270: ...248 ...
Page 280: ...258 ...
Page 292: ...270 ...
Page 293: ...Part III Managing the Subsystem Instances ...
Page 294: ......
Page 408: ...386 ...
Page 438: ...416 ...
Page 439: ...Part IV References ...
Page 440: ......
Page 503: ...Netscape Defined Certificate Extensions Reference 481 OID 2 16 840 1 113730 13 ...
Page 504: ...482 ...
Page 556: ...534 ...
Page 564: ...542 ...