конфигурация доступа для slapd, автономного демона LDAP  (access configuration for slapd, the stand-alone LDAP daemon)
  
THE <ACCESS> FIELD
The optional field <access> ::= [[real]self]{<level>|<priv>}
       determines the access level or the specific access privileges the
       who field will have.  Its component are defined as
            <level> ::= none|disclose|auth|compare|search|read|{write|add|delete}|manage
            <priv> ::= {=|+|-}{0|d|x|c|s|r|{w|a|z}|m}+
       The modifier self allows special operations like having a certain
       access level or privilege only in case the operation involves the
       name of the user that's requesting the access.  It implies the
       user that requests access is authorized.  The modifier realself
       refers to the authenticated DN as opposed to the authorized DN of
       the self modifier.  An example is the selfwrite access to the
       member attribute of a group, which allows one to add/delete its
       own DN from the member list of a group, while being not allowed
       to affect other members.
       The level access model relies on an incremental interpretation of
       the access privileges.  The possible levels are none, disclose,
       auth, compare, search, read, write, and manage.  Each access
       level implies all the preceding ones, thus manage grants all
       access including administrative access. This access allows some
       modifications which would otherwise be prohibited by the LDAP
       data model or the directory schema, e.g. changing the structural
       objectclass of an entry, or modifying an operational attribute
       that is defined as not user modifiable.  The write access is
       actually the combination of add and delete, which respectively
       restrict the write privilege to add or delete the specified
       <what>.
       The none access level disallows all access including disclosure
       on error.
       The disclose access level allows disclosure of information on
       error.
       The auth access level means that one is allowed access to an
       attribute to perform authentication/authorization operations
       (e.g.  bind) with no other access.  This is useful to grant
       unauthenticated clients the least possible access level to
       critical resources, like passwords.
       The priv access model relies on the explicit setting of access
       privileges for each clause.  The = sign resets previously defined
       accesses; as a consequence, the final access privileges will be
       only those defined by the clause.  The + and - signs add/remove
       access privileges to the existing ones.  The privileges are m for
       manage, w for write, a for add, z for delete, r for read, s for
       search, c for compare, x for authentication, and d for disclose.
       More than one of the above privileges can be added in one
       statement.  0 indicates no privileges and is used only by itself
       (e.g., +0).  Note that +az is equivalent to +w.
       If no access is given, it defaults to +0.