aboutsummaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorRuss Allbery <eagle@eyrie.org>2016-01-03 14:58:20 -0800
committerRuss Allbery <eagle@eyrie.org>2016-01-03 14:58:20 -0800
commitdaca82f520f51834812fab7cf15411ae54f46d8f (patch)
treec7826a15d5015127e2ca23619c29ea82720eb34c /docs
parent4a777845b06b62a6deb1df5e69cc9b21226c3c2f (diff)
Document the new ACL schemes in docs/design-acl
Change-Id: Idd2e1038fc02dd51aab9a9ffdd5b3400db2b106f
Diffstat (limited to 'docs')
-rw-r--r--docs/design-acl28
1 files changed, 20 insertions, 8 deletions
diff --git a/docs/design-acl b/docs/design-acl
index 424b3c6..32ac508 100644
--- a/docs/design-acl
+++ b/docs/design-acl
@@ -13,7 +13,7 @@ Introduction
Syntax
An ACL entry in the wallet consists of two pieces of data, a <scheme>
- and an <instance>. <scheme> is one or more characters in the set
+ and an <identifier>. <scheme> is one or more characters in the set
[a-z0-9-] that identifies the ACL backend to use when interpreting
this ACL. <identifier> is zero or more characters including all
printable ASCII characters except whitespace. Only the implementation
@@ -55,6 +55,24 @@ ACL Schemes
The <identifier> is a fully-qualified Kerberos principal. Access is
granted if the principal of the client matches <identifier>.
+ ldap-attr
+
+ <identifier> is an an attribute followed by an equal sign and a value.
+ If the LDAP entry corresponding to the given principal contains the
+ attribute and value specified by <identifier>, access is granted.
+
+ ldap-attr-root
+
+ This is almost identical to netdb except that the user must be in the
+ form of a root instance (<user>/root) and the "/root" portion is
+ stripped before checking the NetDB roles.
+
+ nested
+
+ <identifier> is the name of another ACL, and access is granted if it
+ is granted by that ACL. This can be used to organize multiple ACLs
+ into a group and apply their union to an object.
+
netdb
<identifier> is the name of a system. Access is granted if the user
@@ -67,13 +85,6 @@ ACL Schemes
form of a root instance (<user>/root) and the "/root" portion is
stripped before checking the NetDB roles.
- ldap-entitlement
-
- (Not yet implemented.) <identifier> is an entitlement. If the
- entitlement attribute of the LDAP entry corresponding to the given
- principal contains the entitlement specified in <identifier>, access
- is granted.
-
pts
(Not yet implemented.) <identifier> is the name of an AFS PTS group.
@@ -82,6 +93,7 @@ ACL Schemes
License
+ Copyright 2016 Russ Allbery <eagle@eyrie.org>
Copyright 2006, 2007, 2008, 2013
The Board of Trustees of the Leland Stanford Junior University