27.12.2013 Views

SAS® Integration Technologies: Administrator's Guide (LDAP Version)

SAS® Integration Technologies: Administrator's Guide (LDAP Version)

SAS® Integration Technologies: Administrator's Guide (LDAP Version)

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Sun ONE and Netscape Directory Server Access Control<br />

Overview<br />

When <strong>LDAP</strong> was first developed, it was only a protocol for accessing data in an X500 directory server. Therefore,<br />

many specifics of how the server itself was supposed to work were left out. Even when the new standard was written<br />

for <strong>LDAP</strong> version 3 (RFC2251), some important issues were left out simply because the people involved had already<br />

picked an implementation, and didn't want a new standard to force them to redesign and reimplement large portions of<br />

their servers. Access control was one of those important issues. That is why when discussing access control, it is<br />

important to remember that each vendor has a different mechanism, and very little is portable from one server to<br />

another.<br />

Access control starts with authentication. There are several mechanisms to accomplish the authentication, but all must<br />

eventually resolve to a distinguished name (DN) that exists in the directory. This distinguished name is then used to<br />

determine the access that is granted to a user. The process of associating a distinguished name with a user is called<br />

binding. A user can bind to a server using the DN and a password, or they can bind anonymously, providing no<br />

credentials.<br />

Authentication is accomplished using access control information (ACI) rules. An ACI rule specifies the <strong>LDAP</strong> object<br />

to which the rule applies, whether the rule allows the specified permission or denies it, the users who are permitted or<br />

denied access, and what type of permission is being allowed or denied. For information on using the <strong>Integration</strong><br />

<strong>Technologies</strong> Administrator to specify ACI rules, see Setting Access Permissions for an Object and Specifying Bind<br />

Rules.<br />

The Sun ONE and Netscape mechanism for administering access controls is flexible and powerful, but can also be<br />

complex. Some basics may make things clearer.<br />

• By default, no access is allowed to the directory except to the directory manager. The directory manager<br />

bypasses all access control checks, and is used to administer the directory. A new directory with no access<br />

control information is unreadable by any user except the directory manager. This type of control is different<br />

from an explicit deny, which will be discussed later in this document.<br />

• All access control information propagates down from its target to all the children under that target.<br />

• All access control is cumulative.<br />

• You cannot limit the scope of access control information.<br />

• If conflicting access control information exists, deny always overrides allow. In other words, if there are<br />

access control lists that allow a user access, and another access control instruction that denies access, the deny<br />

will always be preferred.<br />

Sun ONE and Netscape Syntax<br />

(target="ldap:///dn")(targetattr="attrname")<br />

[(targetfilter="rfc2254−style filter")]<br />

( version 3.0; acl "name"; (allow | deny)<br />

(read, write, search, compare, selfwrite, add, delete )<br />

(userdn | groupdn)="ldap:///dn";)<br />

Details about each element in the syntax are as follows:<br />

Sun ONE and Netscape Directory Server Access Control Overview 228

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!