diff options
| author | Russ Allbery <rra@stanford.edu> | 2007-08-28 06:41:17 +0000 | 
|---|---|---|
| committer | Russ Allbery <rra@stanford.edu> | 2007-08-28 06:41:17 +0000 | 
| commit | 7eee5068d26582c394b3f2c80c0a44877af2c84e (patch) | |
| tree | 732236005ef654b0195ab32f06acc3ee46f92ce5 /docs/design-acl | |
| parent | 714333ba995e526ebeb8e7a3b88b9f0f55b313bd (diff) | |
Remove krb5-group, which I won't be implementing.  Clarify the netdb ACL
type since I found a good way of integrating it well with the rest of
the ACL system.
Diffstat (limited to 'docs/design-acl')
| -rw-r--r-- | docs/design-acl | 23 | 
1 files changed, 3 insertions, 20 deletions
| diff --git a/docs/design-acl b/docs/design-acl index cb07247..f8daad4 100644 --- a/docs/design-acl +++ b/docs/design-acl @@ -55,14 +55,6 @@ ACL Schemes      The <identifier> is a fully-qualified Kerberos principal.  Access is      granted if the principal of the client matches <identifier>. -  krb5-group - -    <identifier> is the name of a group that contains a list of Kerberos -    principals.  (Storage of this group is left to the discretion of the -    backend, but will probably either be a MySQL table or a file on disk.) -    Access is granted if the principal of the client matches one of the -    principals contained in the group. -    ldap-entitlement      <identifier> is an entitlement.  If the entitlement attribute of the @@ -71,18 +63,9 @@ ACL Schemes    netdb -    This ACL type is a special case that right now can't be used through -    the normal ACL mechanism because access depends on the name of the -    object being accessed through logic peculiar to the backend.  It is -    included here as a placeholder, but will normally only be used via the -    backend-specific fallback used when the ACL is not present. - -    Access is granted if the action performed is one of the normal owner -    actions, the object being accessed corresponds to a system key, and -    the user is an administrator of that system in NetDB (Stanford's -    system management database). - -    For this ACL, <identifier> is empty. +    <identifier> is the name of a system.  Access is granted if the user +    is listed as an administrator, user, or admin team member of the host +    in NetDB (Stanford's system management database).    pts | 
