System Administration Guide: Naming and Directory Services (NIS+)

NIS+ Table, Column, and Entry Security

NIS+ tables allow you to specify access rights on the table three ways:

A field is the intersection between a column and an entry (row). All data values are entered in fields.

These column-level and entry-level access rights allow you to specify additional access to individual rows and columns that override table level restrictions, but column and entry level rights cannot be more restrictive than the table as a whole:

NIS+ Table, Column, Entry Example

Column- or entry level access rights can provide additional access in two ways: by extending the rights to additional principals or by providing additional rights to the same principals. Of course, both ways can be combined. Following are some examples.

Assume a table object granted read rights to the table's owner.

Table 15–1 NIS+ Table, Column, Entry Example 1

 

Nobody 

Owner 

Group 

World 

Table Access Rights: 

----

r---

----

----

This means that the table's owner could read the contents of the entire table but no one else could read anything. You could then specify that Entry-2 of the table grant read rights to the group class.

Table 15–2 NIS+ Table, Column, Entry Example 2

 

Nobody 

Owner 

Group 

World 

Table Access Rights: 

----

r---

----

----

Entry-2 Access Rights: 

----

----

r---

----

Although only the owner could read all the contents of the table, any member of the table's group could read the contents of that particular entry. Now, assume that a particular column granted read rights to the world class.

Table 15–3 NIS+ Table, Column, Entry Example 3

 

Nobody 

Owner 

Group 

World 

Table Access Rights: 

----

r---

----

----

Entry-2 Access Rights: 

----

----

r---

----

Column-1 Access Rights: 

----

----

----

r---

Members of the world class could now read that column for all entries in the table. Members of the group class could read everything in Column-1 (because members of the group class are also members of the world class) and also all columns of Entry-2. Neither the world nor the group classes could read any cells marked *NP* (for Nor Permitted).

Table 15–4 NIS+ Table, Column, Entry Example 4

 

Col 1 

Col 2 

Col 2 

Entry-1 

contents 

*NP*

*NP*

Entry-2 

contents 

contents 

contents 

Entry-3 

contents 

*NP*

*NP*

Entry-4 

contents 

*NP*

*NP*

Entry-5 

contents 

*NP*

*NP*

NIS+ Rights at Different Levels

This section describes how the four different access rights (read, create, modify, and destroy) work at the four different access levels (directory, table, column, and entry).

The objects that these various rights and levels act on are summarized in Table 15–5.

Table 15–5 NIS+ Access Rights and Levels and the Objects They Act Upon

 

Directory 

Table 

Column 

Entry 

Read 

List directory contents 

View table contents 

View column contents 

View entry (row) contents 

Create 

Create new directory or table objects 

Add new entries (rows) 

Enter new data values in a column 

Enter new data values in an entry (row) 

Modify 

Move objects and change object names 

Change data values anywhere in table 

Change data values in a column 

Change data values in an entry (row) 

Destroy 

Delete directory objects such as tables 

Delete entries (rows) 

Delete data values in a column 

Delete data values in an entry (row) 

NIS+ Read Rights

NIS+ Create Rights

NIS+ Modify Rights

NIS+ Destroy Rights