Global Access Control Policy

Provides coarse grained access control for all operations, regardless of whether they are destined for local or proxy backends. Global access control policies are applied in addition to ACIs and privileges.

For a read request (search, compare) to be accepted there must exist a policy granting the read permission to the targeted entry, as well as any attributes included in attribute assertions. Search result entries will also be filtered using the same criteria. Similarly, update requests (add, delete, modify, modify DN) are accepted if there exists a policy granting the write permission to the targeted entry(s), as well as any attributes included with the request. Finally, extended operations and controls are accepted as long as there exists an applicable policy allowing the extended operation or control, irrespective of the targeted entry. By default a policy will match all entries, all types of connection, and all users. The scope may be restricted by specifying any of the request-target-dn-*, user-dn-*, and connection-* properties.

Dependencies

The following objects have Global Access Control Policies:

Properties

Use the --advanced option to access advanced properties.

Basic Properties

allowed-attribute

SynopsisAllows clients to read or write the specified attributes, along with their sub-types.
DescriptionAttributes that are subtypes of listed attributes are implicitly included. In addition, the list of attributes may include the wild-card '*', which represents all user attributes, or the wild-card '+', which represents all operational attributes, or the name of an object class prefixed with '@' to include all attributes defined by the object class.
Default ValueNone
Allowed ValuesThe name of an attribute, an objectclass or a wild-card.
Multi-valuedYes
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo

allowed-attribute-exception

SynopsisSpecifies zero or more attributes which, together with their sub-types, should not be included in the list of allowed attributes.
DescriptionThis property is typically used when the list of attributes specified by the allowed-attribute property is too broad. It is especially useful when creating policies which grant access to all user attributes (*) except certain sensitive attributes, such as userPassword.
Default ValueNone
Allowed ValuesThe name of an attribute, an objectclass or a wild-card.
Multi-valuedYes
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo

allowed-control

SynopsisAllows clients to use the specified LDAP controls.
Default ValueNone
Allowed ValuesThe name or OID of a control, or a wild-card to allow all controls.
Multi-valuedYes
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo

allowed-extended-operation

SynopsisAllows clients to use the specified LDAP extended operations.
Default ValueNone
Allowed ValuesThe name or OID of an extended operation, or a wild-card to allow all extensions.
Multi-valuedYes
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo

authentication-required

SynopsisRestricts the scope of the policy so that it only applies to authenticated users.
Default Valuefalse
Allowed Valuestrue
false
Multi-valuedNo
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo

connection-client-address-equal-to

SynopsisRestricts the scope of the policy so that it only applies to connections which match at least one of the specified client host names or address masks.
DescriptionValid values include a host name, a fully qualified domain name, a domain name, an IP address, or a sub-network with sub-network mask.
Default ValueNone
Allowed ValuesAn IP address mask.
Multi-valuedYes
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo

connection-client-address-not-equal-to

SynopsisRestricts the scope of the policy so that it only applies to connections which match none of the specified client host names or address masks.
DescriptionValid values include a host name, a fully qualified domain name, a domain name, an IP address, or a sub-network with sub-network mask.
Default ValueNone
Allowed ValuesAn IP address mask.
Multi-valuedYes
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo

connection-minimum-ssf

SynopsisRestricts the scope of the policy so that it only applies to connections having the specified minimum security strength factor.
DescriptionThe security strength factor (ssf) pertains to the cipher key strength for connections using DIGEST-MD5, GSSAPI, SSL, or TLS. For example, to require that the connection must have a cipher strength of at least 256 bits, specify a value of 256.
Default Value0
Allowed ValuesAn integer. Lower limit: 0.
Multi-valuedNo
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo

connection-port-equal-to

SynopsisRestricts the scope of the policy so that it only applies to connections to any of the specified ports, for example 1389.
Default ValueNone
Allowed ValuesAn integer. Lower limit: 1. Upper limit: 65535.
Multi-valuedYes
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo

connection-protocol-equal-to

SynopsisRestricts the scope of the policy so that it only applies to connections which match any of the specified protocols.
Default ValueNone
Allowed ValuesThe protocol name, such as LDAP, LDAPS, JMX, HTTP, or HTTPS.
Multi-valuedYes
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo

permission

SynopsisSpecifies the type of access allowed by this policy.
Default ValueNo access.
Allowed Values

read: Read access

write: Write access

Multi-valuedYes
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo

request-target-dn-equal-to

SynopsisRestricts the scope of the policy so that it only applies to requests which target entries matching at least one of the specified DN patterns.
DescriptionValid DN filters are strings composed of zero or more wildcards and RDN components. A double wildcard ** replaces one or more RDN components (as in uid=dmiller,**,dc=example,dc=com). A simple wildcard * replaces either a whole RDN, or a whole type, or a value substring (as in uid=bj*,ou=people,dc=example,dc=com).
Default ValueNone
Allowed ValuesA DN pattern.
Multi-valuedYes
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo

request-target-dn-equal-to-user-dn

SynopsisRestricts the scope of the policy so that it only applies to requests sent by authenticated users where the request's target DN is the same as the DN of the authorized user.
Default Valuefalse
Allowed Valuestrue
false
Multi-valuedNo
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo

request-target-dn-not-equal-to

SynopsisRestricts the scope of the policy so that it only applies to requests which target entries matching none of the specified DN patterns.
DescriptionValid DN filters are strings composed of zero or more wildcards and RDN components. A double wildcard ** replaces one or more RDN components (as in uid=dmiller,**,dc=example,dc=com). A simple wildcard * replaces either a whole RDN, or a whole type, or a value substring (as in uid=bj*,ou=people,dc=example,dc=com).
Default ValueNone
Allowed ValuesA DN pattern.
Multi-valuedYes
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo

user-dn-equal-to

SynopsisRestricts the scope of the policy so that it only applies to authenticated users whose authorization DN matches at least one of the specified DN patterns.
DescriptionValid DN filters are strings composed of zero or more wildcards and RDN components. A double wildcard ** replaces one or more RDN components (as in uid=dmiller,**,dc=example,dc=com). A simple wildcard * replaces either a whole RDN, or a whole type, or a value substring (as in uid=bj*,ou=people,dc=example,dc=com).
Default ValueNone
Allowed ValuesA DN pattern.
Multi-valuedYes
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo

user-dn-not-equal-to

SynopsisRestricts the scope of the policy so that it only applies to authenticated users whose authorization DN matches none of the specified DN patterns.
DescriptionValid DN filters are strings composed of zero or more wildcards and RDN components. A double wildcard ** replaces one or more RDN components (as in uid=dmiller,**,dc=example,dc=com). A simple wildcard * replaces either a whole RDN, or a whole type, or a value substring (as in uid=bj*,ou=people,dc=example,dc=com).
Default ValueNone
Allowed ValuesA DN pattern.
Multi-valuedYes
RequiredNo
Admin Action RequiredNone
AdvancedNo
Read-OnlyNo