Changes between Version 8 and Version 9 of ALL__accounts_roles
- Timestamp:
- 05/22/15 16:03:06 (10 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
ALL__accounts_roles
v8 v9 10 10 === iPlanet Accounts === 11 11 12 13 ==== EDIR Web Gateway ==== 14 The following credentials utilized by EDIR web gateway for "anonymous" access 15 * uid=edirgw03,ou=resource,dc=alaska,dc=edu 16 17 The following credentials are utilized by EDIR web gateway to access privileged information not expected to be visible to "anonymous" access but need for functions like the "This is me! Log In" link. 18 * uid=edirpriv03,ou=resource,dc=alaska,dc=edu 19 20 ==== AUTHSERV Web Gateway ==== 21 The following credentials are utilized by the AUTHSERV web gateway 22 * uid=authserv03,ou=resource,dc=alaska,dc=edu 23 24 The following credentials are utilized by AUTHSERV web gateway to access privileged information 25 * uid=authpriv03,ou=resource,dc=alaska,dc=edu 26 27 ==== UPDATE ==== 28 The following credentials are utilized by UPDATE interface for batch processing 12 29 * uid=edirbatch03,ou=resource,dc=alaska,dc=edu 13 credentials utilized by UPDATE interface for batch processing 14 15 * uid=edirgw03,ou=resource,dc=alaska,dc=edu 16 credentials utilized by EDIR web gateway for "anonymous" access 17 18 * uid=edirpriv03,ou=resource,dc=alaska,dc=edu 19 credentials utilized by EDIR web gateway to access privileged information 20 not expected to be visible to "anonymous" access but need for functions 21 like the "This is me! Log In" link. 22 23 * uid=authserv03,ou=resource,dc=alaska,dc=edu 24 credentials utilized by the AUTHSERV web gateway 25 26 * uid=authpriv03,ou=resource,dc=alaska,dc=edu 27 credentials utilized by AUTHSERV web gateway to access privileged information 28 30 31 The following credentials are utilized by UPDATE back end to access privileged information and perform privileged tasks 29 32 * uid=updategw03,ou=resource,dc=alaska,dc=edu 30 credentials utilized by UPDATE back end to access privileged information 31 and perform privileged tasks 32 33 Note: Most likely, AUTHSERV needs only one set of credentials. 33 34 35 ''Note:'' Most likely, AUTHSERV needs only one set of credentials. 34 36 35 37 === iPlanet Roles === 36 38 ==== Anonymous Access ==== 39 The following roles are associated with ACIs allowing gateway access to non-privileged information 37 40 * cn=directoryGatewayRole,ou=people,dc=alaska,dc=edu 38 41 * cn=directoryGatewayRole,ou=resource,dc=alaska,dc=edu 39 roles associated with ACIs allowing gateway access to non-privileged information 40 42 43 ==== Privileged Gateway Access ==== 44 The following roles are associated with ACIs allowing gateway access to privileged information 41 45 * cn=directoryPrivilegedRole,ou=people,dc=alaska,dc=edu 42 46 * cn=directoryPrivilegedRole,ou=resource,dc=alaska,dc=edu 43 roles associated with ACIs allowing gateway access to privileged information 44 47 48 ==== Non-Privileged Gateway Access ==== 49 The following roles are associated with ACIs allowing gateway access to non-privileged information 45 50 * cn=authserviceRole,ou=people,dc=alaska,dc=edu 46 51 * cn=authserviceRole,ou=resource,dc=alaska,dc=edu 47 roles associated with ACIs allowing gateway access to non-privileged information 48 52 53 ==== Privileged AUTHSERV Access ==== 54 The following roles are associated with ACIs allowing authserv access to privileged information 49 55 * cn=authservicePrivilegedRole,ou=resource,dc=alaska,dc=edu 50 56 * cn=authservicePrivilegedRole,ou=people,dc=alaska,dc=edu 51 roles associated with ACIs allowing gateway access to privileged information 52 57 58 ==== UPDATE ==== 59 The following role is associated with ACIs allowing the update back end access to privileged information 53 60 * (future) cn=superUserRole,ou=resource,dc=alaska,dc=edu 54 role associated with ACIs allowing the update back end access to privileged information55 61 56 62 === iPlanet ACIs === 57 63 ==== Non-Privileged Gateway Role ==== 64 The following ACIs provide the non-privileged gateway role with read access to non-privileged information 58 65 * EDIRGWANYCOMPARE 59 66 * EDIRGWANYREAD 60 67 * EDIRGWEMPREAD 61 68 * EDIRGWSTUREAD 62 ACIs that provide the non-privileged gateway role with read access to non-privileged 63 information 64 69 70 ==== Privileged Gateway Roles ==== 71 The following ACIs that provide the privileged gateway role the ability to ask true/false questions about attributes that are not otherwise visible 65 72 * EDIRGWCOMPARE 66 73 * EDIRGWEMPCOMPARE 67 74 * EDIRGWSTUCOMPARE 68 ACIs that provide the privileged gateway role the ability to ask true/false69 questions about attributes that are not otherwise visible 75 76 The following ACIs that provide the privileged gateway role with read access to privileged information 70 77 71 78 * EDIRGWPRIVREAD 72 ACIs that provide the privileged gateway role with read access to privileged 73 information 79 80 ==== Non-Privileged Authservice Role ==== 81 The following ACIs that provide the non-privileged authserv role with read access to non-privileged information 74 82 75 83 * AUTHSERVICEREAD 76 ACIs that provide the non-privileged authservice role with read access to non-privileged 77 information 84 85 ==== Privileged Authservice Roles ==== 86 The following ACIs that provide the privileged authserv role the ability to ask true/false questions about attributes that are not otherwise visible 78 87 79 88 * AUTHSERVICEPRIVCOMPARE 80 ACIs that provide the privileged gateway role the ability to ask true/false 81 questions about attributes that are not otherwise visible 82 89 90 The following ACIs that provide the privileged authserv role with read access to privileged information 83 91 * AUTHSERVICEPRIVREAD 84 ACIs that provide the privileged authservice role with read access to privileged information 85 86 (future) SUADDDEL 87 (future) SUDENYREADSEARCHCOMPARE 88 (future) SUDENYWRITE 89 (future) SUREADWRITE 90 ACIs that provide (or deny) the privileged superuser role with read/write access 91 to privileged information 92 93 92 93 ==== Privileged Superuser Role ==== 94 Not Implemented: The following ACIs would have provided (or denied) the privileged superuser role with read/write access to privileged information 95 * SUADDDEL 96 * SUDENYREADSEARCHCOMPARE 97 * SUDENYWRITE 98 * SUREADWRITE 94 99 95 100 == UNIX GROUPS AND MEMBER ACCOUNTS == … … 240 245 '''Note:''' Historically, all grants on OPS$SXLDAP objects are made to the 241 246 EDIR_GATEWAY via the SQL source scripts for creating the objects. We haven't 242 been utilizing the role. See eklutnat:~sxldap/local/ldap/registry/*.sql 247 been utilizing the role. See eklutnat:~sxldap/local/ldap/registry/*.sql[[br]] 243 248 244 249