File: identifiers.rst.txt

package info (click to toggle)
cyrus-imapd 3.10.0~beta1-3
  • links: PTS, VCS
  • area: main
  • in suites: experimental
  • size: 86,332 kB
  • sloc: ansic: 284,810; perl: 135,824; javascript: 9,562; sh: 5,728; yacc: 2,565; cpp: 2,147; makefile: 2,133; lex: 662; xml: 621; awk: 303; python: 279; asm: 262
file content (105 lines) | stat: -rw-r--r-- 3,852 bytes parent folder | download | duplicates (14)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
.. _imap-admin-access-control-identifiers:


Access Control Identifier (ACI)
===============================

The Access Control Identifier (ACI) part of an ACL entry specifies the
user or group for which the entry applies.  Group identifiers are
distinguished be the prefix "group:".  For example, "group:accounting".

.. todo:: FIXME: Clarify what an ACL entry looks like first. Refer to
          how user login names are translated into their identifiers, and (in
          that section) refer to altnamespace, unixhierarchysep, default domain,
          virtdomains, sasl_auth_mech tips and tricks etc.

There are two special identifiers, "anonymous", and "anyone", which are
explained below. The meaning of other identifiers usually depends on
the authorization mechanism being used (selected by ``--with-auth`` at
compile time, defaulting to Unix).

``anonymous`` and ``anyone``
----------------------------

With any authorization mechanism, two special identifiers are defined.
The identifier ``anonymous`` refers to the anonymous, or unauthenticated
user. The identifier ``anyone`` refers to all users, including the
anonymous user.

Both ``anonymous`` and ``anyone`` may commonly be used with the **post**
right ``p`` to allow message insertion to mailboxes.


Kerberos vs. Unix Authorization
-------------------------------

The Cyrus IMAP server comes with four authorization mechanisms, one is
compatible with Unix-style (``/etc/passwd``) authorization, one for use
with Kerberos 4, one for use with Kerberos 5, and one for use with an
external authorization process (ptloader) which can interface with
other group databases (e.g. AFS PTS groups, LDAP Groups, etc).

.. note::
    **Authentication !== Authorization**

    Note that authorization is *not* the same thing as authentication.
    Authentication is the act of proving who you are. Authorization is
    the act of determining what rights you have. Authentication is
    discussed in the :ref:`imap-concepts-login-authentication` part of
    this document.

Unix Authorization
^^^^^^^^^^^^^^^^^^

In the Unix authorization mechanism, ACIs are either a valid userid or
the string ``group:`` followed by a group listed in ``/etc/group``.
Thus:

::

    root                Refers to the user root
    group:staff         Refers to the group staff


It is also possible to use unix groups with users authenticated through
a non-/etc/passwd backend. Note that using unix groups in this way
(without associated ``/etc/passwd`` entries) is not recommended.

..  note::
    Cyrus requires the getgrent(3) POSIX sysctl. As such, NSS needs to
    be configured to have the groups available, one of which includes
    "files", but could also include "ldap".

    NSS augmentations, such as ``nss_ldap``, ``pam_ldap`` or ``sssd``
    may be used to provide Cyrus access to group information via NSS.

Kerberos Authorization
^^^^^^^^^^^^^^^^^^^^^^

Using the Kerberos authorization mechanism, ACIs are of the form:

    *$principal*.*$instance*@*$realm*

If ``$instance`` is omitted, it defaults to the null string. If
``$realm`` is omitted, it defaults to the local realm.

The file ``/etc/krb.equiv`` contains mappings between Kerberos
principals. The file contains zero or more lines, each containing two
fields. Any identity matching the first field of a line is changed to
the second identity during canonicalization. For example, a line in
``/etc/krb.equiv`` of:

::

    bovik@REMOTE.COM bovik

will cause the identity ``bovik@REMOTE.COM`` to be treated as if it
were the local identity ``bovik``.

Alternative Authorization
^^^^^^^^^^^^^^^^^^^^^^^^^

A site may wish to write their own authorization mechanism, perhaps to
implement a local group mechanism. If it does so (by implementing an
``auth_[whatever]`` PTS module), it will dictate its own form and
meaning of identifiers.