HP-UX Directory Server Administrator Guide HP-UX Directory Server Version 8.1 (5900-3332, November 2013)

ACI "Write Subscribers"...............................................................................................275
Restricting access to key roles............................................................................................276
ACI "Roles"................................................................................................................276
Granting a group full access to a suffix...............................................................................277
ACI "HR"...................................................................................................................277
Granting rights to add and delete group entries...................................................................278
ACI "Create Group"....................................................................................................278
ACI "Delete Group"....................................................................................................279
Granting conditional access to a group or role....................................................................279
ACI "HostedCompany1"..............................................................................................280
Denying access...............................................................................................................281
ACI "Billing Info Read"................................................................................................281
ACI "Billing Info Deny"................................................................................................282
Setting a target using filtering............................................................................................282
Allowing users to add or remove themselves from a group.....................................................283
ACI "Group Members"................................................................................................283
Defining permissions for DNs that contain a comma.............................................................284
Proxied authorization ACI example.....................................................................................284
Advanced access control: Using macro ACIs............................................................................285
Macro ACI example.........................................................................................................285
Macro ACI syntax............................................................................................................287
Macro matching for ($dn)............................................................................................287
Macro matching for [$dn]............................................................................................288
Macro matching for ($attr.attrName).............................................................................288
Access control and replication................................................................................................289
Compatibility with earlier releases..........................................................................................289
7 Managing User Authentication.................................................................290
Managing the password policy..............................................................................................290
Configuring the password policy........................................................................................290
Configuring a global password policy using the console..................................................291
Configuring a subtree/user password policy using the console..........................................292
Configuring a global password policy using the command line.........................................293
Configuring subtree/user password policy using the command line....................................295
Setting user passwords.....................................................................................................297
Password change extended operation.................................................................................297
Configuring the account lockout policy...............................................................................298
Configuring the account lockout policy using the console..................................................299
Configuring the account lockout policy using the command line........................................299
Managing the password policy in a replicated environment...................................................299
Synchronizing passwords..................................................................................................300
Inactivating users and roles....................................................................................................301
Inactivating user and roles using the console.......................................................................301
Inactivating user and roles using the command line..............................................................301
Activating user and roles using the console..........................................................................302
Activating user and roles using the command line................................................................302
Setting Resource Limits Based on the bind DN..........................................................................303
Setting resource limits using the console..............................................................................303
Setting resource limits using the command line.....................................................................303
Setting Resource Limits for Anonymous Binds.......................................................................304
Using pass-through authentication...........................................................................................304
How Directory Server uses PTA..........................................................................................304
PTA plug-in syntax............................................................................................................305
Configuring the PTA plug-in...............................................................................................307
Configuring the servers to use a secure connection..........................................................307
Contents 9