[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: ACM permission
> I think you will need at least a Filter Matching permission for attributes
> as well. A classical way to break security in a directory is to search for
> entries with userPassword=*joan* (or whatever...).
>
> Should there be a permission for Compare operations as well? Denying
> compare on operational information could be used to keep curious users from
> poking at the ACIs themselves.
You could cover all this with the attribute level read. I kow this is
not as
fine grained as the permissions in the current draft, but it is alot
less
complex to admin. So in the cases you have mentioned:
deny:r#OID.userPassword,OID.subtreeACI,OID.entryACI#authnLevel:none:public:
Mark