Skip to content

Commit

Permalink
Addresses #397, #398, #399, #404
Browse files Browse the repository at this point in the history
  • Loading branch information
Jesse Coretta authored and Jesse Coretta committed Sep 17, 2024
1 parent 2956242 commit 8460317
Show file tree
Hide file tree
Showing 4 changed files with 545 additions and 9 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -687,7 +687,7 @@ void toStringContent(final StringBuilder buffer) {

final String firstClass = iterator.next();
if (iterator.hasNext()) {
buffer.append(" AUX (");
buffer.append(" AUX ( ");
buffer.append(firstClass);

while (iterator.hasNext()) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -457,7 +457,7 @@ Certificate reply was installed in keystore</screen>
The password for the key store and the private key is stored in clear text
in the file <filename>/path/to/opendj/config/keystore.pin</filename>.</para>

<para>If you want to secure communications, but did not chose to configure
<para>If you want to secure communications, but chose not to configure
LDAP Secure Access at setup time, this procedure can help. The following
steps explain how to create and install a key pair with a self-signed
certificate in preparation to configure LDAPS or HTTPS. First you create a
Expand Down Expand Up @@ -699,8 +699,8 @@ $ dsconfig

<para>Using the OpenDJ directory server global configuration properties, you
can add global restrictions on how clients access the server. These settings
are per server, and so much be set independently on each server in replication
topology.</para>
are server-specific, and must be set independently on each server participating
within the replication topology.</para>

<para>These global settings are fairly coarse-grained. For a full discussion
of the rich set of administrative privileges and fine-grained access control
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -264,6 +264,22 @@ aci: (target="ldap:///dc=example,dc=com") (targetattr =
</listitem>
</varlistentry>
</variablelist>
<note>
<para>Different LDAP server implementations that support Netscape's ACI syntax
may support different multi-valued quotation styles or policies. Specifically,
this can relate to <replaceable>attr-list</replaceable> and <replaceable>OID</replaceable>
values.</para>
<para>OpenDJ ONLY offers support for the so-called "All-Encompassing" quotation
style, as is demonstrated throughout this guide. For instance:</para>
<literal>(targetattr = "<replaceable>attr1 || attr2 || attr3</replaceable>")</literal>
<para>Other implementations may also support the so-called "Individual" quotation
style, which is expressed as:</para>
<literal>(targetattr = <replaceable>"attr1" || "attr2" || "attr3"</replaceable>)</literal>
<para>Users migrating to OpenDJ from an implementation that not only supports the
"Individual" quotation style, but is actively using it, will need to take care to
sanitize any inbound ACIs bearing this style of quotation, else errors will occur
during integration.</para>
</note>
</section>

<section xml:id="aci-permissions">
Expand Down Expand Up @@ -1007,11 +1023,17 @@ The LDAP password modify operation was successful</screen>
<para>Collective attributes provide a standard mechanism for defining
attributes that appear on all the entries in a particular subtree. OpenDJ
extends collective attributes to give you fine-grained control over the
which entries in the subtree are targetted. Also, OpenDJ lets you use
virtual attributes, such as <literal>isMemberOf</literal> to construct the
filter for targetting entries to which the collective attributes apply. This
allows you, for example, to define administrative privileges that apply to
all users who belong to an administrator group.</para>
which entries in the subtree are targeted.</para>

<para>Also, by also extending the RFC 3672 <literal>SpecificationFilter</literal>
component, users may leverage virtual attributes, such as <literal>isMemberOf</literal>,
to construct a search filter for targeting entries to which the collective
attributes apply. This allows you, for example, to define administrative
privileges that apply to all users who belong to an administrator group.</para>

<para>In addition to this feature, the traditional <literal>Refinement</literal>
<literal>ASN.1 CHOICE</literal> component -- also defined within RFC 3672 -- is
supported for use as a <literal>SpecificationFilter</literal> statement as well.</para>

<step>
<para>Create an LDAP subentry that specifies the collective attributes.</para>
Expand Down
Loading

0 comments on commit 8460317

Please sign in to comment.