
Defining Permissions
155
• Grant write permission on the attribute type used in the new RDN.
• Grant write permission on the attribute type used in the old RDN, if you want to grant the right to
delete the old RDN.
• Grant write permission on the value of attribute type used in the new RDN. This right is granted by
default but could be restricted using the
targattrfilters
keyword.
• Comparing the value of an attribute:
• Grant compare permission on the attribute type.
• Searching for entries:
• Grant search permission on each attribute type used in the search filter.
• Grant read permission on attribute types used in the entry.
The permissions granted on individual attributes or entries can affect a broad range of actions; for
example, there are several different permissions users must have to search the directory like the
following
ldapsearch
operation:
ldapsearch -h
host
-s
base
-b "uid=bkolics,dc=example,dc=com" objectclass=* mail
The following ACI is used to determine whether user
bkolics
can be granted access:
aci: (targetattr = "mail")(version 3.0; acl "self access to
mail"; allow (read, search) userdn = "ldap:///self";)
The search result list is empty because this ACI does not grant access to the
objectclass
attribute.
If you want the search operation described above to be successful, modify the ACI to allow read and
search access for the
and
objectclass
attributes.
aci: (targetattr = "mail || objectclass")(version 3.0; acl "self
access to mail"; allow (read, search) userdn = "ldap:///self";)
6.3.3.4. Permissions Syntax
In an ACI statement, the syntax for permissions is
allow|deny (
rights
)
.
rights
is a list of 1 to 8
comma-separated keywords enclosed within parentheses. Valid keywords are
read
,
write
,
add
,
delete
,
search
,
compare
,
selfwrite
,
proxy
, or
all
.
In the following example, read, search, and compare access is allowed, provided the bind rule is
evaluated to be true:
aci: (target="ldap:///dc=example,dc=com") (version 3.0;acl "example";
allow (read, search, compare)
bind_rule
;)
6.3.3.5. Access Control and the modrdn Operation
To explicitly deny
modrdn
rights using ACIs, target the relevant entries but omit the
targetattr
keyword. For example, to prevent the
cn=helpDeskGroup,ou=groups,o=example.com
group
Summary of Contents for DIRECTORY SERVER 8.0
Page 18: ...xviii ...
Page 29: ...Configuring the Directory Manager 11 6 Enter the new password and confirm it 7 Click Save ...
Page 30: ...12 ...
Page 112: ...94 ...
Page 128: ...110 ...
Page 190: ...Chapter 6 Managing Access Control 172 4 Click New to open the Access Control Editor ...
Page 224: ...206 ...
Page 324: ...306 ...
Page 334: ...316 ...
Page 358: ...340 ...
Page 410: ...392 ...
Page 420: ...402 ...
Page 444: ...426 ...
Page 454: ...436 ...
Page 464: ...446 ...
Page 484: ...466 ...
Page 512: ...494 ...
Page 522: ...504 ...