From: Quanah Gibson-Mount Date: Fri, 6 Apr 2007 06:00:41 +0000 (+0000) Subject: More attr/attrs cleanup X-Git-Tag: OPENLDAP_REL_ENG_2_3_35~12 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=bf5e746ad16e2e16ef7b26a3963c0b3a2daa0a16;p=thirdparty%2Fopenldap.git More attr/attrs cleanup --- diff --git a/doc/guide/admin/slapdconfig.sdf b/doc/guide/admin/slapdconfig.sdf index 90bbf0cd80..d00f75b9a7 100644 --- a/doc/guide/admin/slapdconfig.sdf +++ b/doc/guide/admin/slapdconfig.sdf @@ -963,7 +963,7 @@ the access directives and the {{EX:by }} clauses. It also shows the use of an attribute selector to grant access to a specific attribute and various {{EX:}} selectors. -> access to dn.subtree="dc=example,dc=com" attr=homePhone +> access to dn.subtree="dc=example,dc=com" attrs=homePhone > by self write > by dn.children="dc=example,dc=com" search > by peername.regex=IP:10\..+ read @@ -989,7 +989,7 @@ create a group and allow people to add and remove only their own DN from the member attribute, you could accomplish it with an access directive like this: -> access to attr=member,entry +> access to attrs=member,entry > by dnattr=member selfwrite The dnattr {{EX:}} selector says that the access applies to @@ -1057,7 +1057,7 @@ E: 20. index uid pres,eq E: 21. index cn,sn,uid pres,eq,approx,sub E: 22. index objectClass eq E: 23. # database access control definitions -E: 24. access to attr=userPassword +E: 24. access to attrs=userPassword E: 25. by self write E: 26. by anonymous auth E: 27. by dn.base="cn=Admin,dc=example,dc=com" write