Download presentation
Presentation is loading. Please wait.
1
Groups in the Electronic Directory:
Requirements: Provision group memberships into our electronic directory where they can be used by applications such as Oracle Calendar and our own CUWebAuth Preserve Group Membership read access No requirement to make the names of the groups anonymously available from the electronic directory We looked at making all groups have anonymously available membership, but there were some good examples of groups that had a good reason to keep their membership lists restricted to only a few people/applications.
2
. . . Groups Directory . . . . . . dc = authz, dc = cornell, dc = edu
objectclass = cornelledugroup attribute = cornellgroupreadpriv objectclass = edumember attribute = hasmember objec…. . ou = groups . . cn = cit.adsm.backline cornelledugroupreadpriv:backlineAppBindDN cn = cit.adsm cornelledugroupreadpriv:GrouperAll . . . . . .
3
ACIs on Groups Directory
Allow read access to hasMember for anyone if cornelledugroupreadpriv=GrouperAll Allow read access to hasMember for bindDNs which have authenticated to the directory and are also in the cornelledugroupreadpriv attribute for the group Allow read and write access to hasMember for the bindDN of the Grouper LDAP Provisioning Connector And other special cases… A value of GrouperAll means anyone can look at the group membership
4
Example: Setting up a Group
User “jv11” creates a group called “cit.staff” with anonymous membership read turned off (Grouper UI) She adds members to the group (Grouper UI) She also gives the application ID called “myAppBindDN” membership read privileges (Grouper UI) The LDAP Provisioning connector writes the group “cit.staff” to the groups directory, and populates hasMember A future version of the LDAP Provisioning Connector (or a homemade script) populates the cornelledugroupreadpriv attribute for the cit.staff group in the directory
5
Example: an application wants to read the “hasMember” attribute for a group called “cit.staff”
Application binds to the directory as cn=myAppBinddn, ou=serviceids, dc=authz, dc=cornell, dc=edu Application asks for “hasMember” attribute of group “cit.staff” Directory returns “hasMember” is returned IF Cornelledugroupreadpriv=GrouperAll for “cit.staff” (false) OR Cornelledugroupreadpriv=myAppBinddn for “cit.staff” (true)
6
Kerberos Authentication?
Our applications use Kerberos authentication, not LDAP With our SunONE directory, we can set up Kerberos5 authentication for the application DNs
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.