
Defining User Access - userdn Keyword
159
NOTE
Do not specify a hostname or port number within the LDAP URL. LDAP URLs always
apply to the local server.
For more information about LDAP URLs, see
Appendix C, LDAP URLs
.
6.4.2.6. Wildcards
You can also specify a set of users by using the wildcard character (*). For example, specifying a user
DN of
uid=u*,dc=example,dc=com
indicates that only users with a bind DN beginning with the
letter
u
are allowed or denied access based on the permissions you set.
From the Directory Server Console, you set user access from the
Access Control Editor
. For more
information, see
Section 6.5, “Creating ACIs from the Console”
.
6.4.2.7. Examples
Scenario
Example
Description
Userdn keyword containing an LDAP URL
userdn = "ldap:///uid=*,dc=example,dc=com";
The bind rule is evaluated to be true if the user binds to
the directory using any distinguished name of the specified
pattern. For example, both of the following bind DNs would be
evaluated to be true:
uid=ssarette,dc=example,dc=com
uid=tjaz,ou=Accounting,dc=example,dc=com
This bind DN would be evaluated to be false:
cn=Babs Jensen,dc=example,dc=com
Userdn keyword containing logical OR of LDAP URLs
userdn="ldap:///uid=bj,dc=example,dc=com ||
ldap:///uid=kc,dc=example,dc=com";
The bind rule is evaluated to be true if the client binds as either
of the two supplied distinguished names.
Userdn keyword excluding a specific LDAP URL
userdn != "ldap:///
uid=*,ou=Accounting,dc=example,dc=com";
The bind rule is evaluated to be true if the client is not binding
as a UID-based distinguished name in the accounting subtree.
This bind rule only makes sense if the targeted entry is not
under the accounting branch of the directory tree.
Userdn keyword containing self keyword
userdn = "ldap:///self";
The bind rule is evaluated to be true if the user is accessing
the entry represented by the DN with which the user bound to
the directory. That is, if the user has bound as
uid=ssarette
,
dc=example,dc=com
and the user is attempting an operation
on the
uid=ssarette,dc=example,dc=com
entry, then the
bind rule is true.
If you want to grant all users in the
example.com
tree write
access to their
userPassword
attribute, you would create the
following ACI on the
dc=example,dc=com
node.
aci: (targetattr = "userPassword") (version 3.0; acl "write-self";
allow (write) userdn = "ldap:///self";)
Userdn keyword containing the all keyword
userdn = "ldap:///all";
The bind rule is evaluated to be true for any valid bind DN. To
be true, a valid distinguished name must be presented by the
user for a successful bind operation.
Summary of Contents for DIRECTORY SERVER 8.0
Page 18: ...xviii ...
Page 29: ...Configuring the Directory Manager 11 6 Enter the new password and confirm it 7 Click Save ...
Page 30: ...12 ...
Page 112: ...94 ...
Page 128: ...110 ...
Page 190: ...Chapter 6 Managing Access Control 172 4 Click New to open the Access Control Editor ...
Page 224: ...206 ...
Page 324: ...306 ...
Page 334: ...316 ...
Page 358: ...340 ...
Page 410: ...392 ...
Page 420: ...402 ...
Page 444: ...426 ...
Page 454: ...436 ...
Page 464: ...446 ...
Page 484: ...466 ...
Page 512: ...494 ...
Page 522: ...504 ...