--- /dev/null
+// Copyright (c) 2005 DMTF. All rights reserved.
+// <change cr="ArchCR00066.004" type="add">Add UmlPackagePath
+// qualifier values to CIM Schema.</change>
+// ==================================================================
+// CIM_X509CredentialFilterEntry
+// ==================================================================
+ [Version ( "2.8.0" ),
+ UMLPackagePath ( "CIM::Network::Filtering" ),
+ Description (
+ "An X509CredentialFilterEntry allows filtering on the "
+ "attributes of an X.509 certificate. Each instance includes a "
+ "value for MatchFieldName that specifies the particular X.509 "
+ "attribute that is being matched." ),
+ MappingStrings { "IPSP Policy Model.IETF|CredentialFilterEntry" }]
+class CIM_X509CredentialFilterEntry : CIM_FilterEntryBase {
+
+ [Required, Description (
+ "MatchFieldName specifies the X.509 attribute to match "
+ "against MatchFieldValue. Note that this enumeration is "
+ "modified from the IETF\'s IPSP Policy Model to "
+ "explicitly list the \'standard\' X.509 attributes." ),
+ ValueMap { "1", "2", "3", "4", "5", "6", "7", "8", "9", "10",
+ "..", "0x8000.." },
+ Values { "Other", "Version", "Serial Number",
+ "Signature Algorithm Identifier", "Issuer Name",
+ "Validity Period", "Subject Name",
+ "Subject Public Key Info", "Key Usage", "Alternate Name",
+ "DMTF Reserved", "Vendor Reserved" },
+ MappingStrings {
+ "IPSP Policy Model.IETF|CredentialFilterEntry.MatchFieldName" },
+ ModelCorrespondence {
+ "CIM_X509CredentialFilterEntry.MatchFieldValue" }]
+ string MatchFieldName;
+
+ [Required, Description (
+ "MatchFieldValue specifies the value to compare with the "
+ "credential attribute (defined in MatchFieldName), to "
+ "determine if the credential matches this filter entry. "
+ "An implementation must convert this string to a DER- "
+ "encoded string before matching against the values "
+ "extracted from credentials at runtime. \n"
+ "\n"
+ "Note that a wildcard mechanism may be used when "
+ "MatchFieldName specifies a general character string (for "
+ "example, if MatchFieldName=7, \'Subject Name\'). "
+ "MatchFieldValue may contain a wildcard character, \'*\', "
+ "in the pattern match specification. For example, for "
+ "\'Subject Name\', a MatchFieldValue of "
+ "\'cn=*,ou=engineering,o=foo,c=be\' will successfully "
+ "match a certificate whose subject attribute is "
+ "\'cn=JaneDoe,ou=engineering,o=foo,c=be\'. A wildcard can "
+ "be used to represent 0 or more characters as would be "
+ "displayed to the user (i.e., a wildcard pattern match "
+ "operates on displayable character boundaries)." ),
+ MappingStrings {
+ "IPSP Policy Model.IETF|CredentialFilterEntry.MatchFieldName" },
+ ModelCorrespondence {
+ "CIM_X509CredentialFilterEntry.MatchFieldName" }]
+ string MatchFieldValue;
+
+
+};