Security Verify Access conceptualizes
resources in a domain by showing a virtual representation called the protected
object space. The protected object space is the logical and hierarchical
portrayal of resources that belong to a domain.
The structure of the protected object space consists of the following types of objects:
Resource objects
The logical representation of actual physical resources
in a domain, such as files, services, web pages, and message queues.
Container objects
Structural components that group resource objects hierarchically
into distinct functional regions.
Security policy can be applied to both types of objects. Figure 1 shows a logical representation
of a protected object space with multiple container and resource objects.
This illustration shows container objects as white boxes and resource
objects as gray boxes.
Figure 1. Security Verify Access protected object spaceprotected object space.">
The structural top of the protected object space is the root
container object. Below the root container object are one or more
container objects. Each container object represents an object space
that consists of a related set of resources. These resources can be
resource objects or container objects.
The installation of ISAM creates
the /Management object space. This object space consists
of the objects used to manage Security Verify Access itself.
Under the /Management object space, the installation
creates the following container objects:
/Users
/Groups
/POP
/Action
/ACL
/GSO
/Server
/Config
/Replica
Figure 2 shows the complete /Management object
space that is created during the installation of ISAM.
Figure 2. Regions of the ISAM protected object spaceprotected object space.">
Each
resource manager that protects a related set of resources creates
its own object space. For example, the installation of the WebSEAL
component creates the /WebSEAL object space.