Default ACIs
145
However, you can match values stored in the target entry with values stored in the entry of the bind
user; for example, using the
userattr
keyword. Access is evaluated normally even if the bind user
does not have an entry on the server that holds the ACI.
For more information on how to chain access control evaluation, see
Section 3.3.5, “Database Links
and Access Control Evaluation”
.
• Attributes generated by class of service (CoS) cannot be used in all ACI keywords. Specifically, you
should not use attributes generated by CoS with the following keywords:
• targetfilter (
Section 6.3.2.4, “Targeting Entries or Attributes Using LDAP Filters”
)
• targattrfilters (
Section 6.3.2.2, “Targeting Attributes”
)
• userattr (
Section 6.4.5.1, “Using the userattr Keyword”
)
If you create target filters or bind rules that depend on the value of attributes generated by CoS, the
access control rule will not work. For more information on CoS, see
Chapter 5, Managing Entries
with Roles, Classes of Service, and Views
.
• Access control rules are always evaluated on the local server. Therefore, it is not necessary to
specify the hostname or port number of the server in LDAP URLs used in ACI keywords. If you
do, the LDAP URL is not taken into account at all. For more information on LDAP URLs, see
Appendix C, LDAP URLs
.
6.2. Default ACIs
When the Administration Server is set up, the following default ACIs apply to the directory information
stored in the
userRoot
database:
• Users can modify a list of common attributes in their own entries, including the
,
telephoneNumber
,
userPassword
, and
seeAlso
attributes. Operational and most of the
security attributes, such as
aci
,
nsroledn
, and
passwordExpirationTime
, cannot be modified
by users.
• Users have anonymous access to the directory for search, compare, and read operations.
• The administrator (by default
uid=admin,ou=Administrators,
ou=TopologyManagement,o=NetscapeRoot
) has all rights except proxy rights.
• All members of the
Configuration Administrators
group have all rights except proxy rights.
• All members of the
Directory Administrators
group have all rights except proxy rights.
•
Server Instance Entry
(SIE) group.
The
NetscapeRoot
subtree has its own set of default ACIs:
• All members of the
Configuration Administrators
group have all rights on the
NetscapeRoot
subtree except proxy rights.
• Users have anonymous access to the
NetscapeRoot
subtree for search and read operations.
• All authenticated users have search, compare, and read rights to configuration attributes that
identify the Administration Server.
Содержание DIRECTORY SERVER 8.0
Страница 18: ...xviii ...
Страница 29: ...Configuring the Directory Manager 11 6 Enter the new password and confirm it 7 Click Save ...
Страница 30: ...12 ...
Страница 112: ...94 ...
Страница 128: ...110 ...
Страница 190: ...Chapter 6 Managing Access Control 172 4 Click New to open the Access Control Editor ...
Страница 224: ...206 ...
Страница 324: ...306 ...
Страница 334: ...316 ...
Страница 358: ...340 ...
Страница 410: ...392 ...
Страница 420: ...402 ...
Страница 444: ...426 ...
Страница 454: ...436 ...
Страница 464: ...446 ...
Страница 484: ...466 ...
Страница 512: ...494 ...
Страница 522: ...504 ...