A permission can be set to allow anyone binding as Babs Jensen to write to Babs Jensen's telephone number. The bind rule in this permission is the part that states "if you bind as Babs Jensen." The target is Babs Jensen's phone number, and the permission is write access.

8.7.1.1 Targets

Decide which entry is targeted by every ACI created in the directory. Targeting a directory branch point entry includes that branch point and all its child entries in the scope of the permission. If a target entry is not explicitly defined for the ACI, then the ACI is targeted to the directory entry that contains the ACI statement. Further, the default set of attributes targeted by the ACI is any attribute available in the targeted entry's object class structure.

For every ACI, only one entry or only those entries that match a single LDAP search filter can be targeted.

In addition to targeting entries, it is possible to target attributes on the entry; this applies the permission to only a subset of attribute values. Target sets of attributes by explicitly naming those attributes that are targeted or by explicitly naming the attributes that are not targeted by the ACI. Excluding attributes in the target sets a permission for all but a few attributes allowed by an object class structure.

8.7.1.2 Permissions

Permissions can either allow or deny access. In general, avoid denying permissions (for the reasons explained in “Allowing or denying access”). Permissions can be any operation performed on the directory service:

Permission

Description

Read

Indicates whether directory data may be read.

Write

Indicates whether directory data may be changed or created. This permission also

 

allows directory data to be deleted but not the entry itself. To delete an entire entry,

 

the user must have delete permissions.

Search

Indicates whether the directory data can be searched. This differs from the read

 

permission in that read allows directory data to be viewed if it is returned as part of

 

a search operation.

 

For example, if searching for common names is allowed as well as read permission

 

for a person's room number, then the room number can be returned as part of the

 

common name search, but the room number itself cannot be used as the subject of a

 

search. Use this combination to prevent people from searching the directory to see

 

who sits in a particular room.

Compare

Indicates whether the data may be used in comparison operations. The compare

 

permission implies the ability to search, but actual directory information is not returned

 

as a result of the search. Instead, a simple Boolean value is returned which indicates

 

whether the compared values match. This is used to match userPassword attribute

 

values during directory authentication.

Self-write

Used only for group management. This permission enables a user to add to or delete

 

themselves from a group.

Add

Indicates whether child entries can be created. This permission enables a user to create

 

child entries beneath the targeted entry.

Delete

Indicates whether an entry can be deleted. This permission enables a user to delete

 

the targeted entry.

Proxy

Indicates that the user can use any other DN, except Directory Manager, to access the

 

directory with the rights of this DN.

118 Designing a secure directory

Page 118
Image 118
HP UX Direry Server manual Targets, Permissions

UX Direry Server specifications

HP UX Directory Server is a robust and scalable solution designed for managing directory information within enterprise networks. Developed by Hewlett-Packard (HP), this server offers an extensive set of features tailored to meet the needs of organizations that require an efficient way to store, manage, and retrieve identity and access data.

One of the key features of HP UX Directory Server is its ability to handle large directories with significant volumes of data. Built on a highly optimized architecture, it provides excellent performance and can support millions of entries without sacrificing speed or reliability. This capability makes it an ideal choice for large-scale deployments in enterprises that require high availability and responsiveness.

In addition to its scalability, HP UX Directory Server supports a wide range of protocols, including LDAP (Lightweight Directory Access Protocol), which ensures seamless integration with diverse applications and systems across various platforms. The server maintains standards compliance, which facilitates interoperability and simplifies administration tasks.

Security is a top priority for HP UX Directory Server, offering an array of features to protect sensitive information. It supports secure data transmission via TLS/SSL protocols, ensuring encrypted communication between clients and servers. Advanced access controls allow administrators to define fine-grained permissions, helping to safeguard directory data against unauthorized access.

Another salient feature of HP UX Directory Server is its replication capabilities. The server can replicate directory data across multiple instances, ensuring data consistency and availability in distributed environments. This feature is essential for businesses operating across different geographical locations or requiring failover solutions for disaster recovery.

HP UX Directory Server also comes equipped with tools for data management, including an intuitive administration console for configuring and monitoring the server. Additionally, it offers customizable schema capabilities, enabling organizations to tailor the directory structure to fit their specific needs.

Integration with existing identity management solutions is streamlined through connectors and APIs, allowing organizations to extend their directory services and enhance user experience.

In summary, HP UX Directory Server is a powerful directory management solution that combines scalability, security, and integration flexibility. Its support for industry standards, advanced replication, and comprehensive administrative tools makes it an essential asset for organizations seeking to manage identity and access efficiently. By leveraging this technology, businesses can improve their operational efficiency and ensure a secure and organized approach to directory management.