protocol feature or not , just never occured to me. I suppose because itCan't have it both ways. The DIT's there for storing stuff inand getting at it. Mine, yours, theirs.
polutes the Users DIT.
Do you have access control regimes for these entries as well?Yes. (and an access control regime for the regime :)
Do you include these entries in LDAP replication processes? what aboutNot at present.
the scope of transaction resource locking and timing out. Does theWe don't expose transactions over the protocol.In our implementation this part of the DIT is stored
"features" entries fit under country, org, OU, OP, OR or anywhere?It goes under the root in our implementation.Once replication comes into play, I expect
I suppose that if the LDAP protocol extensions need to be controlled byNo. <Insert standard story on access control here>
proprietary DIT structures and user access control mechanisms - does
that mean that the LDAP extensions are by definition "proprietary"..
To get more serious for an instant: the neat
thing about representing the ability to use a
particular feature, in terms of the ability to access
a particular corresponding DIT entry, is that
it's independent of the access control mechanism,
and to a great extent the access control model
employed. You only need answer the question
"can this entity access that entry".