Hi,
In an effort to tighten search and read permissions on our internal
directory server, we've limited accounts to read certain attributes of
"self". They have search on the entire tree, but otherwise no read
perms. This is all well and good for clients that utilize the memberOf
attribute of self, but not so good for applications that utilize
memberUid, or insist on searching for groupOfUniqueNames or
groupOfNames then enumerating them programmatically to determine which
groups the user belongs to after binding as the user.
So. I've been reading docs and haven't been able to find anything, but I
was wanting to do something like this;
dn: ou=groups,dc=example,dc=com
aci: (targetattr = "*")
(targetfilter = "(&(objectClass=groupOfUniqueNames)(uniqueMember={{rdn
of self}})")
(version 3.0; acl "Allow authenticated users to read own group
membership"; allow (read,compare,search)
(userdn="ldap:///all");)
where the target filter limits results to only those that match
uniqueMember={{rdn of self}}
Is this possible?
Thanks,
Grant