[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: "DIT content rule" usage patterns?
- To: Michael Ströder <michael@stroeder.com>, Andrew Findlay <andrew.findlay@skills-1st.co.uk>
- Subject: Re: "DIT content rule" usage patterns?
- From: Marco Pizzoli <marco.pizzoli@gmail.com>
- Date: Fri, 29 Apr 2011 09:39:53 +0200
- Cc: "openldap-technical@openldap.org" <openldap-technical@openldap.org>
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:content-transfer-encoding; bh=DoBplA0oeW8NahMdxy4524HD19pmqbMNqLzVGa27BYQ=; b=G+wRmyrLqNNmgNNUA+vkumh+u2EwHnxD0eXP2Pcv+kbxFiXEPPoSsTj6nsw3pJ3wRJ KXKLcJiOVoIXatXWDpP1X3o9xok4PMUbLYZFGnJ9zNuJgjZI/IRrU8F5Grp9zNWeKuAH n7TGLA+zN/hGu6p1jCGm1wiwsILTwAg+prKO8=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding; b=E/x+WR6BXLFosWowhHI3yYg6kvfPJXFLmxYktYg98B4h5F+H6mN7rymiLNZwwMtItb 9H1EqAYyV2vMylCdQago96Svq8bqDx327roNQj81M9c9tvCeqxqdJsd2UleGwVUs9aNt lBw1OpT+EcgjSwaKFi3CxECpsLJemR81lvby8=
- In-reply-to: <4DB98AC2.9000106@stroeder.com>
- References: <BANLkTim4zQnUk9D+AGpKv_CsDvBufhnmxw@mail.gmail.com> <4DB98AC2.9000106@stroeder.com>
2011/4/28 Michael Ströder <michael@stroeder.com>:
> Marco Pizzoli wrote:
>> could someone point me to some resources, in particular usage
>> examples, about DIT content rules?
>
> Example:
>
> dITContentRule ( 2.16.840.1.113730.3.2.2
> NAME 'inetOrgPerson-dcr'
> NOT ( x121Address )
> AUX ( msPerson $ musician $ germanBankArrangement $
> posixAccount $ sambaSamAccount $ vPIMUser $ inetLocalMailRecipient $
> shadowAccount $ simpleSecurityObject $ pwdPolicy $ msPwdResetObject $
> eduPerson $ schacPersonalCharacteristics ) )
>
> Note that the OID is the OID of the accompanying structural object class.
>
> What exactly do you want to do? You should read RFC 4512 for the details.
>
> My web2ldap obeys DIT content rules and therefore I'm usually limiting the
> usable attributes in object classes with NOT to reduce the number of unneeded
> input fields. You can also use web2ldap's schema browser to dig into the
> schema of a server.
>
> Ciao, Michael.
>
Hy guys,
Thank you both for the help.
Andrew: great document!
Michael: thank you very much for the example. I had read the RFC but I
was still searching an usage example. Your web2ldap is on my todo
list.
Marco
--
_________________________________________
Non è forte chi non cade, ma chi cadendo ha la forza di rialzarsi.
Jim Morrison