On Wed, Jul 31, 2013 at 06:11:02PM +0000, Jancewicz, Russell wrote:

> Should I create a single entry per account I want to give access, granting 
> all attributes they would need read/write access to with a particular filter?

No - you will end up having to change the ACLs every time you add a user.

> Or would I be better off grouping access granting to members of the groups 
> and adding individual rules for special edge cases?

Much better, but try to avoid those edge cases too!

> Or are both these ideas off base and something else would be preferred?
> 
> Currently I am granting access by groups with access to collections of 
> attributes, however as I am discovering that some accounts need access to 
> those attributes with different filters my rules are continually shifting and 
>  growing.

Try to cut the complexity of ACLs as far as possible. ACLs are
effectively programs and they take a lot of testing when they are
modified.

I always try to turn the day-to-day changes into group-membership changes
as then the routine mods are just 'data' rather than 'program'.

One approach you might look at is to use two layers of groups: one to
categorise users by role (printer admin, user-support, accounts) and one
to give access to specific resources (password-writer,
home-address-reader, mail-address-reader). You can then make the role
groups members of the appropriate resource groups, which is a more
understandable way to express policy than typical ACLs.

More ideas here:

        http://www.skills-1st.co.uk/papers/ldap-acls-jan-2009/

Andrew
-- 
-----------------------------------------------------------------------
|                 From Andrew Findlay, Skills 1st Ltd                 |
| Consultant in large-scale systems, networks, and directory services |
|     http://www.skills-1st.co.uk/                +44 1628 782565     |
-----------------------------------------------------------------------

Reply via email to