z/OS IBM Tivoli Directory Server Administration and Use for z/OS
|
Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
aclEntry attribute z/OS IBM Tivoli Directory Server Administration and Use for z/OS SC23-6788-00 |
|||||||||||||||||
|
aclEntry is a multi-valued attribute that contains information
pertaining to the access allowed to the entry and each of its attributes.
aclEntry lists the following types of information:
SyntaxFollowing is the aclEntry attribute value syntax:
The subject_DN is any valid DN that represents the object (entry) to which privileges are being granted. The DN ends when the first granted rights keyword is detected. The granted_rights is specified as follows where object_rights_list is one or more elements of the set [a|d], and attr_rights_list is one or more elements of the set [r|w|s|c]. See ACL filters for more information about the filter and operation values. Multiple specifications for the same access class or attribute
type within the same aclEntry attribute value are merged into
a single specification. For example:
results this merged access list
Scope of protectionThe scope of the protection is based on the following types of privilege attributes:
Access control groups can be either static, dynamic, or nested groups. The following object classes are evaluated as group entries for the LDBM, TDBM, and CDBM backends: ibm-staticGroup, groupOfNames, groupOfUniqueNames, accessRole, accessGroup, ibm-dynamicGroup, groupOfUrls, and ibm-nestedGroup. See Static, dynamic, and nested groups for additional information about static, dynamic, and nested groups. When specifying a user or group distinguished name in an aclEntry attribute value, the access-id, group, or role portions of the value are optional and are accepted for compatibility with older levels of the LDAP server. If replicating to non-z/OS IBM® TDS, one of these prefixes are required. The distinguished name that is used does not need to be the name of any entry in the directory. The distinguished name is the name that represents the user that has authenticated to the directory server or the group that the user is a member of. The access control implementation supports several "pseudo-DNs".
These are used to reference large numbers of subject DNs which, at
bind time, share a common characteristic in relation to either the
operation being performed or the target object on which the operation
is being performed. Currently, three pseudo DNs are defined:
The group:cn=anybody refers
to all subjects, including those that are unauthenticated (considered
anonymous users). All users belong to this group automatically.
The group:cn=authenticated refers to any DN that
is authenticated to the directory. The method of authentication is
not considered when using distinguished names in the aclEntry attribute
value.The access-id:cn=this refers to the bind DN that matches the target object's DN on which the operation is performed. If the server compatibility is 6 or greater, a search filter can be specified after the aclFilter component in an aclEntry attribute value. When the search filter evaluates to true, it reduces, augments, or replaces the set of permissions specified. See ACL filters for more information about the search filters that are allowed to be specified. Examples: In this example, the DN type is access-id and the DN itself is cn=personA, ou=deptXYZ, o=IBM, c=US:
In this example, the DN type is group and the DN itself is cn=deptXYZRegs, o=IBM, c=US:
This is an example of how to use a RACF® identity established with SDBM in an ACL:
Attribute access classesAttributes requiring similar permission for access are grouped together in classes. Attributes are assigned to an attribute access class within the schema definitions. The IBMAttributeTypes attribute in the LDAP server schema entry holds the attribute types access class. The three attribute access classes are:
Each of these attribute access classes is discrete. If a user has write permission to sensitive attributes, then the user does not automatically have write permission to normal attributes. This permission must be explicitly defined. The default attribute access class for an attribute is normal. By default, all users have read access to normal attributes. There are two additional attribute access classes used internally by LDAP for system attributes. These attribute access classes are restricted and system. You can specify these access classes when granting permissions in ACLs. For example, the name of a person is typically defined in the normal class. Perhaps a social security number is considered sensitive, and any password information for the user is considered critical. Following are some example definitions excerpted from the LDAP server schema. Note that the attribute userPassword is defined with access class critical.
It is possible to specify access controls on individual attributes. However, when defining schema an access class is always defined for the attribute type. If not specified, that attribute type is defined to belong to the normal class. Note: The restricted attributes are: aclEntry, aclPropagate, entryOwner,
and ownerPropagate. In order to update access control information,
you must have permissions to read and write these attributes. The system attributes
include aclSource and ownerSource and other
attributes for which the server controls the values. In order to
update access control information, you must have permission to read
and write these attributes. If the system keyword is not specified
in an aclEntry attribute value, the system access is set to
'system:rsc'.
Access permissionsFollowing is the set of access permissions.
Following are some examples of valid aclEntry values:
See Access determination for information about how the aclEntry values are used to determine access. The aclEntry attribute value is defined as a directory string. When the aclFilter scope is not specified, a search using the aclEntry attribute matches against the distinguished name in the value. An aclEntry value in this format is normalized following the matching rules for a distinguished name. Two aclEntry attributes in this format are considered to be the same if they have the same distinguished name. When the aclFilter scope is specified, a search using the aclEntry attribute matches against the scope, filter, and operation in the search filter. An aclEntry in this format is normalized by normalizing the scope, filter, and the operation. Two aclEntry attributes in this format are considered to be the same if they have the same filter and operation. 1
where, aclEntry_value :- [access-id:|group:|role:]subject_DN[granted_rights] or, aclEntry_value :- aclFilter:filter:operation[granted_rights]
|
Copyright IBM Corporation 1990, 2014 |