OUD 11g/12c - How to Use Virtual Attributes to Assign Root Privileges to Members of a Group
(Doc ID 2358005.1)
Last updated on MAY 22, 2023
Applies to:
Oracle Unified Directory - Version 11.1.2.3.161018 and laterInformation in this document applies to any platform.
Goal
Most LDAP directory servers typically have a single superuser, which is much like the root account in traditional UNIX systems.
This account can bypass access controls and other restrictions that might be enforced for regular users. In Oracle Unified Directory you can define multiple root users, and there is a privilege subsystem that makes it possible to control capabilities at a more fine-grained level.
For more info: Managing Users and Groups - About Root Users
The goal of this document is to demonstrate how to grant root level privileges to members of a group using virtual attributes.
The ability to set admin privileges must be applied to specific user accounts and not directly to groups.
The following example gets around this by creating a new virtual attribute that will populate "ds-privilege-name: unindexed-search" for each user that is a member of a group.
The operational performance of users that are indirectly assigned elevated privileges can be impacted by the degree of the number and size of groups
involved in privilege assignments. The best practice approach for optimal performance is to assign privileges directly to user objects.
Solution
To view full details, sign in with your My Oracle Support account. |
|
Don't have a My Oracle Support account? Click to get started! |
In this Document
Goal |
Solution |