+

Search Tips   |   Advanced Search

AuthorizationGroupCommands

Use the Jython or Jacl scripting languages to configure security with the wsadmin tool. The commands in the AuthorizationGroupCommands group can be used to manage authorization groups.

When using Jython string syntax, if any of the parameter values contain spaces, enclose the string containing spaces with double quotation marks and brackets to avoid truncating the spaces. For example, the value of the parameter accessids contains spaces. Enclose the string containing spaces with double quotation marks and brackets to avoid truncating spaces in admin-authz.xml.

The AuthorizationGroupCommands commands include:


addResourceToAuthorizationGroup

Add a resource instance to an existing authorization group. A resource instance cannot belong to more than one authorization group.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:


createAuthorizationGroup

Create a new authorization group. When we create a new authorization group, no members are associated with it. Also, no user to administrative role mapping for the authorization table is associated with the authorization group.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:


deleteAuthorizationGroup

Delete an existing authorization group. When we delete an authorization group, the authorization table that corresponds is also deleted.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:


listAuthorizationGroups

List existing authorization groups.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:


listAuthorizationGroupsForGroupID

List all of the authorization groups to which a given user group has access. This command lists the authorization groups and the granted roles for each authorization group. The group ID can be a short name or a fully qualified domain name if the LDAP user registry is being used. This command lists cell as a group if the user has cell level access.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:


listAuthorizationGroupsForUserID

List all of the authorization groups to which a given user has access. This command lists the authorization groups and the granted roles for each authorization group. The user ID and the group ID can be a short name or a fully qualified domain name if the LDAP user registry is being used. This command lists cell as a group if the user has cell level access.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:


listAuthorizationGroupsOfResource

List authorization groups for a given resource. If the value of the traverseContainedObjects parameter is false, only the authorization group of the resource is returned. If the value of the traverseContainedObjects parameter is true, it returns the authorization group of the resource and the authorization groups of all the parent resources in the containment tree.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:


listResourcesOfAuthorizationGroup

List all of the resources within the given authorization group.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:


listResourcesForGroupID

List all the objects that a given group has access to. This command lists the resources and the granted roles for each resource. The resources that this command returns include the resources from the authorization groups to which the user group is granted roles and the resources that are descendants of the resources with in authorization groups to which the user group is granted access to any role. The group ID can be a short name or fully qualified domain name if a LDAP user registry is used.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:


listResourcesForUserID

List all the objects that a given user has access to. This command lists the resources and the granted roles for each resource. The resources that this command returns include the resources from the authorization groups to which the user is granted roles and the resources that are descendants of the resources with in authorization groups to which the user is granted access to any role. The user ID can be a short name or fully qualified domain name if a LDAP user registry is used.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:

Example output:


mapGroupsToAdminRole

Map group IDs to one or more administrative roles in an authorization group. The name of the authorization group that we provide determines which authorization table is used. If we do not specify an authorization group name, the mapping is done to the cell level authorization table. The group ID can be a short name or a fully qualified domain name if the LDAP user registry is used.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:


mapGroupsToAuditRole

Map group IDs to one or more audit roles in an authorization group. The name of the authorization group that we provide determines which authorization table is used. If we do not specify an authorization group name, the mapping is done to the cell level authorization table. The group ID can be a short name or a fully qualified domain name if the LDAP user registry is used.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:


mapUsersToAdminRole

Map user IDs to one or more administrative roles in the authorization group. The name of the authorization group that we provide determines the authorization table. If we do not specify the name of the authorization group, the mapping is done to the cell level authorization table. The user ID can be a short name or fully qualified domain name in case LDAP user registry is used.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:


removeGroupsFromAdminRole

Remove previously mapped group IDs from administrative roles in the authorization group. The name of the authorization group that we provide determines which authorization table is involved. If we do not specify an authorization group name, the group IDs are removed from the cell level authorization table. The group ID can be a short name or fully qualified domain name if a LDAP user registry is used.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:


removeResourceFromAuthorizationGroup

Remove resources from an existing authorization group. If we do not specify the authorization group, it is determined and the resource is removed from that authorization group.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:


removeUsersFromAdminRole

Remove previously mapped user IDs from administrative roles in the authorization group. The name of the authorization group that we provide determines which authorization table is involved. If we do not specify an authorization group name, the user ID from the cell level authorization table is used. The user ID can be a short name or a fully qualified domain name if a LDAP user registry is used.

Target object: None

Parameters and return values

Examples

Batch mode example usage:

Interactive mode example usage:


  • wsadmin AdminTask
  • Commands for the AdminTask object