[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: increasing complexity - draft-ietf-ldapext-acl-model-08.txt
Finally having my arm twisted to read the latest ACI
draft and seeing these comments shortly after, here
are my thoughts:
> - instead of defining permissions which parallel LDAP
> operations, define permissions based upon the type
> of access being made. That is, "write" permission
> would be needed by subject to update a particular
> target irregardless of what operation was used to
> to request the update.
I don't have a problem with this as I'm beginning to
be concerned that and administrator will be confused
with the ACI.
> - return to one ACI attribute and handle entry/subtree
> semantics via target scope in the value. This scope
> would be more easily extended to support non-entry
> and non-subtree scopes (such as one-level, children,
> etc.).
I'll have to think about this some more.
> - eliminate one of the syntax variants. I suggest using
> just a ASN.1 described syntax to be ";binary" transferred.
> (a string representation of this could be separately defined
> for presentation to users, if desired).
My reading of the document is that only string is MUST and
ASN.1 is MAY. I disagree that string should only be separately
defined as administrators will have much greater difficulty
understanding the ASN.1 rather than the string representation.
> - remove all mention of ldapACIsubentry from the I-D and
> generalize the out-of-scope statement to "prescriptive
> ACIs and scoping via subenties is beyond the scope of
> this document".
Again I have to think about this some more.
> - remove ipAddress and DNS subjects as they require special
> semantics (as well as for the security considerations
> separately noted).
While I'd like to, I believe that there are implementations
that are *already* using them. This makes such a removal
difficult.
> - remove authnLevel. Don't add integrity/confidentiality
> factors.
Having read the draft, either the authnLevel should be
removed or just auth mechanisms listed. The current proposed
bucketization of authnLevel is a receipe for interoperability
nightmares.
> - don't require recursive expansion of roles and groups
> (implementation complexity).
No. do require them as not expanding leads to administrative
complexity. There will be a *lot* more administrators using
this than developers writing code and I'd rather add the
complexity in the branch that will be less utilized (here
implementation rather than administration)
Ryan