Define and apply security policy

We can protect system resources by defining a security policy. You define a security policy with access control lists (ACLs), protected object policies (POPs), and authorization rules. You apply the security policy to the object representations of those resources in the object space.

We can apply ACLs, POPs, and authorization rules to the same object. The Web Portal Manager, pdadmin command-line interface and the administration API are used to define this policy.

The authorization service makes authorization decisions based on the policies applied to these objects. When a requested operation on a protected object is permitted, the resource manager responsible for the resource implements this operation.

One policy can dictate the protection parameters of many objects. Any change to the security policy affects all objects to which the policy is attached.

Parent topic: Implementation of a network security policy