# Employee LDAP Access Control
#
dn: dc=domain,dc=org
changetype: modify
replace: aci
#
aci: (target = "ldap:///ou=employees,dc=domain,dc=org")
(targetattr = "userpassword")
(version 3.0; acl "limited user self write";
allow (write) userdn = "ldap:///self";)
#
aci: (target = "ldap:///dc=domain,dc=org" )
(targetfilter = "(|(objectclass=orgAssociate)(objectclass=orgEmployee)(objectclass=domain)
(objectclass=organizationalunit)(objectclass=groupofnames)(objectclass=groupofuniquenames))")
(targetattr = "attr1 || attr2 || ... || attr40")
(version 3.0; acl "general access, replaces anonymous access";
allow (read, search, compare)
(userdn = "ldap:///self") or
(groupdn = "ldap:///cn=orgGroup1,ou=groups,dc=domain,dc=org") or
(groupdn = "ldap:///cn=orgGroup2,ou=groups,dc=domain,dc=org") or
(groupdn = "ldap:///cn=orgGroup3,ou=groups,dc=domain,dc=org") or
(groupdn = "ldap:///cn=orgGroup4,ou=groups,dc=domain,dc=org") or
(groupdn = "ldap:///cn=orgGroup5,ou=groups,dc=domain,dc=org")
;)
#
aci: (target = "ldap:///dc=domain,dc=org" )
(targetfilter = "(|(objectclass=orgExternalEmployee)(objectclass=domain)
(objectclass=organizationalunit)(objectclass=groupofnames)(objectclass=groupofuniquenames))")
(targetattr = "attr1 || attr2 || ... || attr40 ")
(version 3.0; acl "general access, replaces anonymous access";
allow (read, search, compare)
(userdn = "ldap:///self") or
(groupdn = "ldap:///cn=orgGroup2,ou=groups,dc=domain,dc=org") or
(groupdn = "ldap:///cn=OrgGroup3,ou=groups,dc=domain,dc=org") or
(groupdn = "ldap:///cn=orgGroup4,ou=groups,dc=domain,dc=org") or
(groupdn = "ldap:///cn=orgGroup5,ou=groups,dc=domain,dc=org")
;)
#
aci: (target = "ldap:///dc=domain,dc=org")
(targetfilter = "(|(objectclass=orgExternalEmployee)(objectclass=domain)
(objectclass=organizationalunit)(objectclass=groupofnames)(objectclass=orgServiceAccount)(objectclass=orgOrgAccount))")
(targetattr = "attr1 || attr2 || ... || attr40")
(version 3.0; acl "general access plus service and organizational accounts";
allow (read, search, compare)
(userdn = "ldap:///self") or
(groupdn = "ldap:///cn=OrgGroup3,ou=groups,dc=domain,dc=org") or
(groupdn = "ldap:///cn=orgGroup4,ou=groups,dc=domain,dc=org") or
(groupdn = "ldap:///cn=orgGroup5,ou=groups,dc=domain,dc=org")
;)
#
aci: (target = "ldap:///dc=domain,dc=org")(targetattr = "attr1 ||
attr2 || ... || attr30")
(version 3.0; acl "limited read access to non-public attributes for delegated admins";
allow (read, search, compare)
(groupdn = "ldap:///cn=orgGroup4,ou=groups,dc=domain,dc=org") or
(groupdn = "ldap:///cn=orgGroup5,ou=groups,dc=domain,dc=org")
;)
#
aci: (target = "ldap:///dc=domain,dc=org")
(targetattr = "attr1 || attr2 || ... || attr28")
(version 3.0; acl "limited write access for delegated admins";
allow (write) groupdn = "ldap:///cn=orgGroup5,ou=groups,dc=domain,dc=org";)
#
aci: (target = "ldap:///dc=domain,dc=org")
(targetattr = "*")(version 3.0; acl "full access for delegated admins";
allow (all) groupdn = "ldap:///cn=orgGroup6,ou=groups,dc=domain,dc=org";)
#
aci: (target = "ldap:///dc=domain,dc=org")
(targetfilter="(memberof=cn=orgGroup6,ou=Groups,dc=domain,dc=org)")
(targetattr="userpassword")
(version 3.0; acl "deny non-admin user write access to admin users' passwords";
deny (all) groupdn != "ldap:///cn=orgGroup6,ou=groups,dc=domain,dc=org"
;)
#
aci: (target = "ldap:///dc=domain,dc=org")
(targetattr = "attr1 || attr2 || ... || attr19")
(version 3.0; acl "access to posixaccount attributes for proxyagent";
allow (read,search,compare) userdn = "ldap:///uid=binddn1,ou=svc_accts,dc=domain,dc=org";)
thanks,
-morgan
--
389 users mailing list
389-users@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/389-users