From 48b1e8f46c35519cb83c332660e266f6392f65b6 Mon Sep 17 00:00:00 2001 From: Russ Allbery Date: Wed, 13 Feb 2008 01:43:54 +0000 Subject: Update the design documentation to reflect the current protocol and implementation. --- docs/design-acl | 24 ++++++++++++++++-------- 1 file changed, 16 insertions(+), 8 deletions(-) (limited to 'docs/design-acl') diff --git a/docs/design-acl b/docs/design-acl index d2ddb32..dde3395 100644 --- a/docs/design-acl +++ b/docs/design-acl @@ -55,19 +55,27 @@ ACL Schemes The is a fully-qualified Kerberos principal. Access is granted if the principal of the client matches . - ldap-entitlement - - is an entitlement. If the entitlement attribute of the - LDAP entry corresponding to the given principal contains the - entitlement specified in , access is granted. - netdb is the name of a system. Access is granted if the user is listed as an administrator, user, or admin team member of the host in NetDB (Stanford's system management database). + netdb-root + + This is almost identical to netdb except that the user must be in the + form of a root instance (/root) and the "/root" portion is + stripped before checking the NetDB roles. + + ldap-entitlement + + (Not yet implemented.) is an entitlement. If the + entitlement attribute of the LDAP entry corresponding to the given + principal contains the entitlement specified in , access + is granted. + pts - is the name of an AFS PTS group. Access is granted if - the principal of the user is a member of that AFS PTS group. + (Not yet implemented.) is the name of an AFS PTS group. + Access is granted if the principal of the user is a member of that AFS + PTS group. -- cgit v1.2.3