Managing access control
Red Hat Directory Server 12
Configuring permissions by using access control instructions
Abstract
Learn how to define which user can perform specific actions on suffixes and entries in Red Hat Directory Server. These tasks are controlled by access control instructions (ACI). Learn about the different ACI types, ACI use cases, bind rules, and methods for checking access rights on entries.