BUG#: 8782
[tpot/pegasus/.git] / Schemas / CIM225 / DMTF / Network / CIM_X509CredentialFilterEntry.mof
diff --git a/Schemas/CIM225/DMTF/Network/CIM_X509CredentialFilterEntry.mof b/Schemas/CIM225/DMTF/Network/CIM_X509CredentialFilterEntry.mof
new file mode 100644 (file)
index 0000000..6ccc986
--- /dev/null
@@ -0,0 +1,62 @@
+// Copyright (c) 2005 DMTF.  All rights reserved.
+// <change cr="ArchCR00066.004" type="add">Add UmlPackagePath
+// qualifier values to CIM Schema.</change>
+// ==================================================================
+//  CIM_X509CredentialFilterEntry 
+// ==================================================================
+   [Version ( "2.8.0" ), 
+    UMLPackagePath ( "CIM::Network::Filtering" ), 
+    Description ( 
+       "An X509CredentialFilterEntry allows filtering on the "
+       "attributes of an X.509 certificate. Each instance includes a "
+       "value for MatchFieldName that specifies the particular X.509 "
+       "attribute that is being matched." ), 
+    MappingStrings { "IPSP Policy Model.IETF|CredentialFilterEntry" }]
+class CIM_X509CredentialFilterEntry : CIM_FilterEntryBase {
+
+      [Required, Description ( 
+          "MatchFieldName specifies the X.509 attribute to match "
+          "against MatchFieldValue. Note that this enumeration is "
+          "modified from the IETF\'s IPSP Policy Model to "
+          "explicitly list the \'standard\' X.509 attributes." ), 
+       ValueMap { "1", "2", "3", "4", "5", "6", "7", "8", "9", "10", 
+          "..", "0x8000.." }, 
+       Values { "Other", "Version", "Serial Number", 
+          "Signature Algorithm Identifier", "Issuer Name", 
+          "Validity Period", "Subject Name", 
+          "Subject Public Key Info", "Key Usage", "Alternate Name", 
+          "DMTF Reserved", "Vendor Reserved" }, 
+       MappingStrings { 
+          "IPSP Policy Model.IETF|CredentialFilterEntry.MatchFieldName" }, 
+       ModelCorrespondence { 
+          "CIM_X509CredentialFilterEntry.MatchFieldValue" }]
+   string MatchFieldName;
+
+      [Required, Description ( 
+          "MatchFieldValue specifies the value to compare with the "
+          "credential attribute (defined in MatchFieldName), to "
+          "determine if the credential matches this filter entry. "
+          "An implementation must convert this string to a DER- "
+          "encoded string before matching against the values "
+          "extracted from credentials at runtime. \n"
+          "\n"
+          "Note that a wildcard mechanism may be used when "
+          "MatchFieldName specifies a general character string (for "
+          "example, if MatchFieldName=7, \'Subject Name\'). "
+          "MatchFieldValue may contain a wildcard character, \'*\', "
+          "in the pattern match specification. For example, for "
+          "\'Subject Name\', a MatchFieldValue of "
+          "\'cn=*,ou=engineering,o=foo,c=be\' will successfully "
+          "match a certificate whose subject attribute is "
+          "\'cn=JaneDoe,ou=engineering,o=foo,c=be\'. A wildcard can "
+          "be used to represent 0 or more characters as would be "
+          "displayed to the user (i.e., a wildcard pattern match "
+          "operates on displayable character boundaries)." ), 
+       MappingStrings { 
+          "IPSP Policy Model.IETF|CredentialFilterEntry.MatchFieldName" }, 
+       ModelCorrespondence { 
+          "CIM_X509CredentialFilterEntry.MatchFieldName" }]
+   string MatchFieldValue;
+
+
+};