
Bind Rules
224
Red Hat Directory Server Administrator’s Guide • May 2005
• Userdn keyword excluding a specific LDAP URL:
userdn != "ldap:///uid=*,ou=Accounting,dc=example,dc=com";
The bind rule is evaluated to be true if the client is not binding as a UID-based
distinguished name in the accounting subtree. This bind rule only makes
sense if the targeted entry is not under the accounting branch of the directory
tree.
• Userdn keyword containing self keyword:
userdn = "ldap:///self";
The bind rule is evaluated to be true if the user is accessing the entry
represented by the DN with which the user bound to the directory. That is, if
the user has bound as
uid=ssarette
,
dc=example,dc=com
and the user is
attempting an operation on the
uid=ssarette,dc=example,dc=com
entry,
then the bind rule is true.
If you want to grant all users in the
example.com
tree write access to their
userPassword
attribute, you would create the following ACI on the
dc=example,dc=com
node.
aci: (targetattr = "userPassword") (version 3.0; acl
"write-self"; allow (write) userdn = "ldap:///self";)
• Userdn keyword containing the all keyword:
userdn = "ldap:///all";
The bind rule is evaluated to be true for any valid bind DN. To be true, a valid
distinguished name and password must have been presented by the user
during the bind operation.
For example, if you want to grant read access to the entire tree to all
authenticated users, you would create the following ACI on the
dc=example,dc=com
node:
aci:(version 3.0; acl "all-read"; allow (read)
userdn="ldap:///all";)
• Userdn keyword containing the anyone keyword:
userdn = "ldap:///anyone";
The bind rule is evaluated to be true for anyone; use this keyword to provide
anonymous access to your directory.
For example, if you want to allow anonymous read and search access to the
entire
example.com
tree, you would create the following ACI on the
dc=example,dc=com
node:
Summary of Contents for DIRECTORY SERVER 7.1
Page 1: ...Administrator s Guide Red Hat Directory Server Version7 1 May 2005 Updated February 2009 ...
Page 20: ...20 Red Hat Directory Server Administrator s Guide May 2005 Glossary 619 Index 635 ...
Page 22: ...22 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 26: ...26 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 78: ...Maintaining Referential Integrity 78 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 200: ...Assigning Class of Service 200 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 488: ...488 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 528: ...PTA Plug in Syntax Examples 528 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 572: ...572 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 612: ...Examples of LDAP URLs 612 Red Hat Directory Server Administrator s Guide May 2005 ...
Page 634: ...634 Red Hat Directory Server Administrator s Guide May 2005 ...