Key changelog features
As of 3.2, the PingDirectory server supports two new changelog backend properties that allow access control filtering and sensitive attribute evaluation for targeted entries.
External client applications can change the contents of attributes seen in the targeted entry based on the access control rules applied to the associated base DN.
| Attribute | Description |
|---|---|
|
Indicates whether the contents of changelog entry attributes, such as |
|
Indicates whether to include additional information about any attributes that might have been removed because of access control filtering. This property only applies to content removed as a result of processing performed by the
|
Enabling access control filtering in the LDAP changelog
Use the dsconfig tool to enable the properties to the changelog backend to set up access control to the LDAP changelog.
About this task
Only admin users with the bypass-acl privilege can read the changelog.
Steps
-
To allow LDAP clients to undergo access control filtering using standard LDAP searches of the
cn=changelogbackend, enable theapply-access-control-to-changelog-entry-contentsproperty.Access control filtering is applied regardless of the value of the
apply-access-controls-to-changelog-entry-contentssetting when the changelog backend is servicing requests from a PingDirectory server that has thefilter-changes-by-userSync Pipe property set.Example:
$ bin/dsconfig set-backend-prop --backend-name "changelog" \ --set "apply-access-controls-to-changelog-entry-contents:true" -
To include a count of users that have been removed through access control filtering, set the
report-excluded-changelog-attributesproperty.The count appears in the
ds-changelog-num-excluded-user-attributesattribute for users and in theds-changelog-num-excluded-operational-attributesattribute for operational attributes.Example:
$ bin/dsconfig set-backend-prop --backend-name "changelog" \ --set "report-excluded-changelog-attributes:attribute-counts"