ACI subjects match characteristics of the client connection to the server. Use subjects to restrict whether the ACI applies depending on who connected, and when, where, and how they connected.
authmethod = "none|simple|ssl|sasl,mech"authmethod != "none|simple|ssl|saslmech"-
Here you use
noneto mean do not check,simplefor simple authentication,sslfor certificate-based authentication over LDAPS,saslfor SASL wheremechmechis DIGEST-MD5, EXTERNAL, or GSSAPI. dayofweek = ",day[,day…]"dayofweek != "day[,day…]"-
Replace
daywith one ofsun,mon,tue,wed,thu,fri,sat. dns = ",hostname"dns != "hostname"-
You can use asterisks, *, to replace name components, such as
dns = "*.myCompany.com". groupdn = "ldap:///,DN[|| ldap:///DN…]"groupdn != "ldap:///DN[|| ldap:///DN…]"-
Replace
DNwith the distinguished name of a group to permit or restrict access for members. ip = ",addresses"ip != "addresses"-
Here
addressescan be specified for IPv4 or IPv6. IPv6 addresses are specified in brackets asldap://[where /address]/subnet-prefixsubnet-prefixis optional. You can specify individual IPv4 addresses, addresses with asterisks (*) to replace subnets and host numbers, CIDR notation, and forms such as192.168.0.*+255.255.255.0to specify subnet masks. ssf = ",strength"ssf != ",strength"ssf > ",strength"ssf >= ",strength"ssf < ",strength"ssf <= "strength"-
Here the security strength factor pertains to the cipher key strength for connections using DIGEST-MD5, GSSAPI, SSL, or TLS. For example, to require that the connection must have at least 128 bits of encryption, specify
ssf >= 128. timeofday = ",hhmm"timeofday != ",hhmm"timeofday > ",hhmm"timeofday >= ",hhmm"timeofday < ",hhmm"timeofday <= "hhmm"-
Here
hhmmis expressed as on a 24-hour clock. For example, 1:15 PM is written1315. userattr = ",attr#value"userattr != ",attr#value"userattr =,ldap-url#LDAPURL"userattr !=,ldap-url#LDAPURL"userattr = "[parent[,child-level]. ]attr#GROUPDN|USERDN"userattr != "[parent[child-level]. ]attr#GROUPDN|USERDN"-
The
userattrsubject specifies an attribute that must match on both the bind entry and the target of the ACI.To match when the attribute on the bind DN entry corresponds directly to the attribute on the target entry, replace
attrwith the attribute type, andvaluewith the attribute value.To match when the target entry is identified by an LDAP URL, and the bind DN is in the subtree of the DN of the LDAP URL, use
ldap-url#LDAPURL.To match when the bind DN corresponds to a member of the group identified by the
attrvalue on the target entry, useattr#GROUPDN.To match when the bind DN corresponds to the
attrvalue on the target entry, useattr#USERDN.The optional inheritance specification,
parent[, lets you specify how many levels below the target entry inherit the ACI. Herechild-level].child-levelis a number from 0 to 9, with 0 indicating the target entry only. Separate multiplechild-leveldigits with commas (,). userdn = ",ldap-url++[||ldap-url++…]"userdn != "ldap-url++[||ldap-url++…]"-
To match the bind DN, replace
ldap-url++with either a valid LDAP URL such asldap:///uid=bjensen,ou=People,dc=example,dc=com,ldap:///dc=example,dc=com??sub?(uid=bjensen), or a special LDAP URL-like keyword from the following list.ldap:///all-
Match authenticated users.
ldap:///anyone-
Match anonymous and authenticated users.
ldap:///parent-
Match when the bind DN is a parent of the ACI target.
ldap:///self-
Match when the bind DN entry corresponds to ACI target.

