14.02.2014 Views

ldapv3.pdf 7947KB Apr 17 2013 11:30:42 AM - mirror omadata

ldapv3.pdf 7947KB Apr 17 2013 11:30:42 AM - mirror omadata

ldapv3.pdf 7947KB Apr 17 2013 11:30:42 AM - mirror omadata

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Group Matching<br />

One of the most powerful methods for constructing access<br />

control rules is to grant privlages to a group to which dns<br />

can be dynamically added or removed. For example -<br />

access to attr=userpassword<br />

by group="cn=Administrators,dc=example,dc=com" write<br />

would grant write access to any connection<br />

authenticated to the DSA as a dn found in the<br />

cn=Administrators. cn=Administrators is<br />

expected to be of objectclass groupofnames<br />

with member attributes containing dns.<br />

dn:cn=adminstrators,dc=example,<br />

dc=com<br />

cn: adminstrators<br />

objectclass: groupofNames<br />

objectclass: top<br />

member: cn=fred<br />

blogs,dc=example,dc=com<br />

member: cn=somebody<br />

else,dc=example,dc=com<br />

If another objectclass/attribute is required they<br />

can be specified in the group clause, for<br />

example - by group/organizationalRole/roleOccupant=<br />

specifies an objectclass of organizationRole with attributes of<br />

roleOccupant containing dns.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!