Table E-2 presents a summary of access rule entities.
Who? |
Description |
---|---|
* |
Everyone (including anonymous connections) |
anonymous |
Non-authenticated connections |
users |
Authenticated connections |
self |
The user represented by the DN of the target entry |
dn[dnstyle]=regex |
The user represented by the specified DN. |
dnattr=attribute_name |
The user represented by the DN stored in the specified attribute in the target entry |
group[/obj[/attr]][.style]=pattern |
The members of the group represented by pattern |
peername[.style]=pattern sockname[.style]=pattern domain[.style[,modifier]]=pattern sockurl[.style]=pattern |
Host-/filesystem-based access mechanisms |
ssf=n transport_ssf=n tls_ssf=n sasl_ssf=n |
Defined minimum security levels for access to be granted |