You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
ACL implementations are efficient for individuals and even groups because of the way the databases are keyed. For configuration, the information is stored in LDAP, however.
LDAP information is located with the resources that they protect. The following handling information details how to identify an object in ACLs,
So, the LDAP is edited in terms of objects, with ACL information attached. The Resource ACL however, is indexed by the addresses on the list (and resource identification). For the Communication ACL a similar thing applies, just with different object data (based on objectClass: uidObject and not objectClass: resourceInstanceObject or objectClass: resourceClassObject).
Another difference is the location where this management data is edited (the Service DIT) and where it is used (anywhere a service is running). LDAP is used to pass the information; SyncRepl is the mechanism used for instant updates.
So: The wish is to use SteamWorks Pulley to extract this information from LDAP and store it into a service-local database for use with the ACL logic.
The text was updated successfully, but these errors were encountered:
This is a complete class, and might for instance represent access to a domain's user base, for which no individual instances are necessary. If this is the case then, again, ACL information would be attached for objectClass: accessControlledObject
For the Communication ACL, the format would be as setup for IdentityHub. There, the DN already holds the desired information:
The shells are meant to provide interactive examples, notably arpa2acl, arpa2reservoir and arpa2id. The LDAP schemes can be found there too, as part of their server setup.
ACL implementations are efficient for individuals and even groups because of the way the databases are keyed. For configuration, the information is stored in LDAP, however.
LDAP information is located with the resources that they protect. The following handling information details how to identify an object in ACLs,
and the same object also reveals ACL information,
So, the LDAP is edited in terms of objects, with ACL information attached. The Resource ACL however, is indexed by the addresses on the list (and resource identification). For the Communication ACL a similar thing applies, just with different object data (based on
objectClass: uidObject
and notobjectClass: resourceInstanceObject
orobjectClass: resourceClassObject
).Another difference is the location where this management data is edited (the Service DIT) and where it is used (anywhere a service is running). LDAP is used to pass the information; SyncRepl is the mechanism used for instant updates.
So: The wish is to use SteamWorks Pulley to extract this information from LDAP and store it into a service-local database for use with the ACL logic.
The text was updated successfully, but these errors were encountered: