mirror of
https://git.openldap.org/openldap/openldap.git
synced 2026-02-18 18:18:06 -05:00
More attr/attrs cleanup
This commit is contained in:
parent
763118d69b
commit
bf5e746ad1
1 changed files with 3 additions and 3 deletions
|
|
@ -963,7 +963,7 @@ the access directives and the {{EX:by <who>}} clauses. It also
|
|||
shows the use of an attribute selector to grant access to a specific
|
||||
attribute and various {{EX:<who>}} selectors.
|
||||
|
||||
> access to dn.subtree="dc=example,dc=com" attr=homePhone
|
||||
> access to dn.subtree="dc=example,dc=com" attrs=homePhone
|
||||
> by self write
|
||||
> by dn.children="dc=example,dc=com" search
|
||||
> by peername.regex=IP:10\..+ read
|
||||
|
|
@ -989,7 +989,7 @@ create a group and allow people to add and remove only
|
|||
their own DN from the member attribute, you could accomplish
|
||||
it with an access directive like this:
|
||||
|
||||
> access to attr=member,entry
|
||||
> access to attrs=member,entry
|
||||
> by dnattr=member selfwrite
|
||||
|
||||
The dnattr {{EX:<who>}} selector says that the access applies to
|
||||
|
|
@ -1057,7 +1057,7 @@ E: 20. index uid pres,eq
|
|||
E: 21. index cn,sn,uid pres,eq,approx,sub
|
||||
E: 22. index objectClass eq
|
||||
E: 23. # database access control definitions
|
||||
E: 24. access to attr=userPassword
|
||||
E: 24. access to attrs=userPassword
|
||||
E: 25. by self write
|
||||
E: 26. by anonymous auth
|
||||
E: 27. by dn.base="cn=Admin,dc=example,dc=com" write
|
||||
|
|
|
|||
Loading…
Reference in a new issue