Hi William,

thanks a lot for clearing.

Am 13.11.2017 um 00:42 schrieb William Brown:
> On Sun, 2017-11-12 at 23:06 +0100, Jan Kowalsky wrote:

>> On some comments I read that it's generally discouraged to use aci's
>> with a "not" logic like:
>>
>>  ip != 10.0.0.*
>>
>> or something like this.
>>
> 
> The != is only an issue for targetattr, because if you do:
> 
> targetattr != sn
> 
> Then this includes all system attributes like nsACcountlock and
> resource limit types etc. 
> 
> IP addr != is fine :) 

>> As long as I understood, I have to define aci's for every base dn
>> separately if I running multiple databases. Is there any way to
>> define
>> this for the whole server?
> 
> If you have the databases nested IE:
> 
> dc=example,dc=com
> ou=foo,dc=example,dc=com
> 
> And in the mapping tree these are marked as "parent", then the aci of
> dc=example,dc=com should apply to ou=foo too. 

ok. So for me it doesn't work. The databases are completely separeted.

> Generally, I would look at:
> 
> https://research.google.com/pubs/pub43231.html
> 
> IP address based security is not a good control: You should be using
> other factors and information to provide access I think. You could
> limit admins to using TLS user certs for identity rather than
> passwords, using minssf rules, longer password policy, etc.

The ip based access control in my setting is only to give a additionally
control beside the firewall. The Directory should not to be accessible
from public internet at all. But for the case there is any error on
firewalling I want to protect the whole directory. Other access rights
are more granular.

Regards
Jan
_______________________________________________
389-users mailing list -- 389-users@lists.fedoraproject.org
To unsubscribe send an email to 389-users-le...@lists.fedoraproject.org

Reply via email to