DekGenius.com
[ Team LiB ] Previous Section Next Section

E.2 Who?

Table E-2 presents a summary of access rule entities.

Table E-2. Summary of access rule entities

Who?

Description

*

Everyone (including anonymous connections)

anonymous

Non-authenticated connections

users

Authenticated connections

self

The user represented by the DN of the target entry

dn[dnstyle]=regex

The user represented by the specified DN.

dnattr=attribute_name

The user represented by the DN stored in the specified attribute in the target entry

group[/obj[/attr]][.style]=pattern

The members of the group represented by pattern

peername[.style]=pattern

sockname[.style]=pattern

domain[.style[,modifier]]=pattern

sockurl[.style]=pattern

Host-/filesystem-based access mechanisms

ssf=n

transport_ssf=n

tls_ssf=n

sasl_ssf=n

Defined minimum security levels for access to be granted

    [ Team LiB ] Previous Section Next Section