[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: ACM permission



> I think you will need at least a Filter Matching permission for attributes
> as well.  A classical way to break security in a directory is to search for
> entries with userPassword=*joan* (or whatever...).
> 
> Should there be a permission for Compare operations as well?  Denying
> compare on operational information could be used to keep curious users from
> poking at the ACIs themselves.

You could cover all this with the attribute level read. I kow this is
not as
fine grained as the permissions in the current draft, but it is alot
less
complex to admin. So in the cases you have mentioned:

deny:r#OID.userPassword,OID.subtreeACI,OID.entryACI#authnLevel:none:public:

Mark