E.2 Who?

Table E-2 presents a summary of access rule entities.

Table E-2. Summary of access rule entities

Who?

Description

*

Everyone (including anonymous connections)

anonymous

Non-authenticated connections

users

Authenticated connections

self

The user represented by the DN of the target entry

dn[dnstyle]=regex

The user represented by the specified DN.

dnattr=attribute_name

The user represented by the DN stored in the specified attribute in the target entry

group[/obj[/attr]][.style]=pattern

The members of the group represented by pattern

peername[.style]=pattern

sockname[.style]=pattern

domain[.style[,modifier]]=pattern

sockurl[.style]=pattern

Host-/filesystem-based access mechanisms

ssf=n

transport_ssf=n

tls_ssf=n

sasl_ssf=n

Defined minimum security levels for access to be granted



LDAP System Administration
LDAP System Administration
ISBN: 1565924916
EAN: 2147483647
Year: 2006
Pages: 129
Authors: Gerald Carter

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net