summaryrefslogtreecommitdiff
path: root/docs/design-acl
diff options
context:
space:
mode:
Diffstat (limited to 'docs/design-acl')
-rw-r--r--docs/design-acl24
1 files changed, 16 insertions, 8 deletions
diff --git a/docs/design-acl b/docs/design-acl
index d2ddb32..dde3395 100644
--- a/docs/design-acl
+++ b/docs/design-acl
@@ -55,19 +55,27 @@ ACL Schemes
The <identifier> is a fully-qualified Kerberos principal. Access is
granted if the principal of the client matches <identifier>.
- ldap-entitlement
-
- <identifier> is an entitlement. If the entitlement attribute of the
- LDAP entry corresponding to the given principal contains the
- entitlement specified in <identifier>, access is granted.
-
netdb
<identifier> is the name of a system. Access is granted if the user
is listed as an administrator, user, or admin team member of the host
in NetDB (Stanford's system management database).
+ netdb-root
+
+ This is almost identical to netdb except that the user must be in the
+ form of a root instance (<user>/root) and the "/root" portion is
+ stripped before checking the NetDB roles.
+
+ ldap-entitlement
+
+ (Not yet implemented.) <identifier> is an entitlement. If the
+ entitlement attribute of the LDAP entry corresponding to the given
+ principal contains the entitlement specified in <identifier>, access
+ is granted.
+
pts
- <identifier> is the name of an AFS PTS group. Access is granted if
- the principal of the user is a member of that AFS PTS group.
+ (Not yet implemented.) <identifier> is the name of an AFS PTS group.
+ Access is granted if the principal of the user is a member of that AFS
+ PTS group.