
Default ACIs
145
However, you can match values stored in the target entry with values stored in the entry of the bind
user; for example, using the
userattr
keyword. Access is evaluated normally even if the bind user
does not have an entry on the server that holds the ACI.
For more information on how to chain access control evaluation, see
Section 3.3.5, “Database Links
and Access Control Evaluation”
.
• Attributes generated by class of service (CoS) cannot be used in all ACI keywords. Specifically, you
should not use attributes generated by CoS with the following keywords:
• targetfilter (
Section 6.3.2.4, “Targeting Entries or Attributes Using LDAP Filters”
)
• targattrfilters (
Section 6.3.2.2, “Targeting Attributes”
)
• userattr (
Section 6.4.5.1, “Using the userattr Keyword”
)
If you create target filters or bind rules that depend on the value of attributes generated by CoS, the
access control rule will not work. For more information on CoS, see
Chapter 5, Managing Entries
with Roles, Classes of Service, and Views
.
• Access control rules are always evaluated on the local server. Therefore, it is not necessary to
specify the hostname or port number of the server in LDAP URLs used in ACI keywords. If you
do, the LDAP URL is not taken into account at all. For more information on LDAP URLs, see
Appendix C, LDAP URLs
.
6.2. Default ACIs
When the Administration Server is set up, the following default ACIs apply to the directory information
stored in the
userRoot
database:
• Users can modify a list of common attributes in their own entries, including the
,
telephoneNumber
,
userPassword
, and
seeAlso
attributes. Operational and most of the
security attributes, such as
aci
,
nsroledn
, and
passwordExpirationTime
, cannot be modified
by users.
• Users have anonymous access to the directory for search, compare, and read operations.
• The administrator (by default
uid=admin,ou=Administrators,
ou=TopologyManagement,o=NetscapeRoot
) has all rights except proxy rights.
• All members of the
Configuration Administrators
group have all rights except proxy rights.
• All members of the
Directory Administrators
group have all rights except proxy rights.
•
Server Instance Entry
(SIE) group.
The
NetscapeRoot
subtree has its own set of default ACIs:
• All members of the
Configuration Administrators
group have all rights on the
NetscapeRoot
subtree except proxy rights.
• Users have anonymous access to the
NetscapeRoot
subtree for search and read operations.
• All authenticated users have search, compare, and read rights to configuration attributes that
identify the Administration Server.
Summary of Contents for DIRECTORY SERVER 8.0
Page 18: ...xviii ...
Page 29: ...Configuring the Directory Manager 11 6 Enter the new password and confirm it 7 Click Save ...
Page 30: ...12 ...
Page 112: ...94 ...
Page 128: ...110 ...
Page 190: ...Chapter 6 Managing Access Control 172 4 Click New to open the Access Control Editor ...
Page 224: ...206 ...
Page 324: ...306 ...
Page 334: ...316 ...
Page 358: ...340 ...
Page 410: ...392 ...
Page 420: ...402 ...
Page 444: ...426 ...
Page 454: ...436 ...
Page 464: ...446 ...
Page 484: ...466 ...
Page 512: ...494 ...
Page 522: ...504 ...