pdadmin to Web Portal Manager equivalents
This appendix shows the mapping of the administration pdadmin commands to Web Portal Manager.
Information about the pdadmin utility can be found in the IBM Security Verify Access for Web: Command Reference.
pdadmin utility Web Portal Manager acl attach object_name acl_name ACL → List ACL → ACL name → Attach tab → Attach → type protected object path → Attach acl create acl_name ACL → Create ACL → complete the form → Create acl delete acl_name ACL → List ACL → ACL names → Delete acl detach object_name ACL → List ACL → ACL name → Attach tab → protected object → Detach acl find acl_name ACL → List ACL → ACL name → Attach tab acl list ACL → List ACL acl list acl_name attribute ACL → List ACL → ACL name → Extended Attribute tab acl modify acl_name delete attribute attribute_name ACL → List ACL → ACL name → Extended Attribute tab → attributes → Delete acl modify acl_name delete attribute attribute_name attribute_value Not supported acl modify acl_name description description ACL → List ACL → ACL name → modify description → Set acl modify acl_name remove any-other ACL → List ACL → ACL name → Any-other → Delete acl modify acl_name remove group group_name ACL → List ACL → ACL name → group name → Delete acl modify acl_name remove unauthenticated ACL → List ACL → ACL name → Unauthenticated → Delete acl modify acl_name remove user user_name ACL → List ACL → ACL name → user name → Delete acl modify acl_name set any-other permissions ACL → List ACL → ACL name → Any-other → Create → select permissions → Apply acl modify acl_name set attribute attribute_name attribute_value ACL → List ACL → ACL name → Extended Attribute tab → Create → complete the form → Apply acl modify acl_name set group group_name permissions ACL → List ACL → ACL name → Create → select Group → specify group name → permissions → Apply acl modify acl_name set unauthenticated permissions ACL → List ACL → ACL name → Create → select Unauthenticated → permissions → Apply acl modify acl_name set user user_name permissions ACL → List ACL → ACL name → Create → select User → specify user name → permissions → Apply acl show acl_name ACL → List ACL → ACL name acl show acl_name attribute attribute_name ACL → List ACL → ACL name → Extended Attribute tab action create name description action_type ACL → List Action Groups → primary action group → Create → complete the form → Create action create name description action_type action_group_name ACL → List Action Groups → action group → Create → complete the form → Create action delete name ACL → List Action Groups → primary action group → actions → Delete action delete name action_group_name ACL → List Action Groups → action group → actions → Delete action group create action_group_name ACL → Create Action Group → type group name → Create action group delete action_group_name ACL → List Action Groups → action groups → Delete action group list ACL → List Action Groups action list ACL → List Action Groups → primary action group action list action_group_name ACL → List Action Groups → action group admin show configuration Not supported authzrule attach object_name ruleid AuthzRule → List AuthzRule → authorization rule name → Attach tab → Attach → type protected object path → Attach authzrule create ruleid { ruletext}[-desc description] [-failreason failreason] AuthzRule → Create AuthzRule → complete the form → Create authzrule delete ruleid AuthzRule → List AuthzRule → authorization rule name → Delete authzrule detach object_name AuthzRule → List AuthzRule → authorization rule name → Attach tab → object names → Detach authzrule find ruleid AuthzRule → List AuthzRule → authorization rule name → Attach tab authzrule list AuthzRule → List AuthzRule authzrule modify ruleid { ruletext rule_text | description description | failreason failreason AuthzRule → List AuthzRule → authorization rule name → modify fields → Apply authzrule show ruleid AuthzRule → List AuthzRule → authorization rule name config modify svrpassword config_file password Not supported config modify keyvalue set [-obfuscate] config_file stanza key value Not supported config modify keyvalue append [-obfuscate] config_file stanza key value Not supported config modify keyvalue remove config_file stanza key value Not supported config modify keyvalue remove config_file stanza key Not supported config show config_file stanza key Not supported context show Not supported domain create domain domain_admin_id domain_admin_password [-desc description] Secure Domain → Create Secure Domain → complete the form → Create domain delete domain [-registry] Secure Domain → List Secure Domain → secure domain names → Delete domain list Secure Domain → List Secure Domain domain modify domain description description Secure Domain → List Secure Domain → secure domain name → modify description → Apply domain show domain Secure Domain → List Secure Domain → secure domain name errtext error_number Not supported exit Not supported group create group_name dn cn [group_container] Group → Create Group → complete the form → Create group delete [-registry] group_name Group → Search Groups → type pattern and maximum results → Search → select group names → Delete group import group_name dn [group_container] Group → Import Group → complete the form → Import group list pattern max_return Group → Search Groups → type pattern and maximum results → Search group list-dn pattern max_return Not supported group modify group_name add user group modify group_name add (user_1 user_2 [... user_n])
Group → Search Groups → type pattern and maximum results → Search → click group name → Members tab → users → Add group modify group_name description description Group → Search Groups → type pattern and maximum results → Search → click group name → type description → Apply group modify group_name remove user group modify group_name remove (user_1 user_2 [... user_n])
Group → Search Groups → type pattern and maximum results → Search → click group name → Members tab → user names → Remove group show group_name Group → Search Groups → type pattern and maximum results → Search → click group name group show-dn dn Not supported group show-members group_name Group → Search Groups → type pattern and maximum results → Search → click group name → Members tab help {topic | command} Not supported login -a admin_id -p password [-d domain | -m] Not supported login -l Not supported logout Not supported object access object_name permissions Not supported object create object_name description type ispolicyattachable {yes | no} Object Space → Create Object → complete the form → Create The type field is not supported.
We can the Can Policy be attached to this object check box on the Protected Object Properties page.
object delete object_name Object Space → Browse Object Space → expand and select object name → Delete object exists object_name Not supported object list Object Space → Browse Object Space → expand object list object_name Object Space → Browse Object Space → expand and select object name object list object_name attribute Object Space → Browse Object Space → expand and select object name → Extended Attributes tab object listandshow object_name Not supported object modify object_name delete attribute_name Object Space → Browse Object Space → expand and select object name → Extended Attributes tab → attribute → Delete object modify object_name delete attribute_name attribute_value Not supported object modify object_name set attribute attribute_name attribute_value Object Space → Browse Object Space → expand and select object name → Extended Attributes tab → Create → complete the form → Apply object modify object_name set description description Object Space → Browse Object Space → expand and select object name → modify description → Apply object modify object_name isPolicyAttachable {yes | no} Object Space → Browse Object Space → expand and select object name → or clear check box→ Apply object modify object_name type type Not supported object show object_name Object Space → Browse Object Space → expand and select object name object show object_name attribute attribute_name Object Space → Browse Object Space → expand and select object name → Extended Attributes tab objectspace create objectspace_name Object Space → Create Object Space → complete the form → Create objectspace delete objectspace_name Object Space → Browse Object Space → object space name → Delete objectspace list Object Space → Browse Object Space policy get policy_name User → Show Global User Policy policy get policy_name -user user_name User → Search Users → type pattern and maximum results → Search → click user name → Policy tab policy set policy_name policy_value User → Show Global User Policy → modify value → Apply policy set policy_name policy_value -user user_name User → Search Users → type pattern and maximum results → Search → click user name → Policy tab → modify value → Apply pop attach object_name pop_name POP → List POP → POP name → Attach tab → Attach → type protected object path → Attach pop create pop_name POP → Create POP → complete the form → Create pop delete pop_name POP → List POP → POP names → Delete pop detach object_name POP → List POP → POP name → Attach tab → object → Detach pop find pop_name POP → List POP → POP name → Attach tab pop list POP → List POP pop list pop_name POP → List POP → POP name pop list pop_name attribute POP → List POP → POP name → Extended Attributes tab pop modify pop_name delete attribute attribute_name POP → List POP → POP name → Extended Attributes tab → attributes → Delete pop modify pop_name delete attribute attribute_name attribute_value Not supported pop modify pop_name set attribute attribute_name attribute_value POP → List POP → POP name → Extended Attributes tab → Create → complete the form → Apply pop modify pop_name set audit-level {all | none | audit_level_list} POP → List POP → POP name → or clear appropriate check boxes → Apply pop modify pop_name set description description POP → List POP → POP name → modify description → Apply pop modify pop_name set ipauth add network netmask authentication_level POP → List POP → POP name → IP Auth tab → Create → type the network, net mask, and authentication level → Apply pop modify pop_name set ipauth add network netmask forbidden POP → List POP → POP name → IP Auth tab → Create → type network and net mask and Forbidden check box → Apply pop modify pop_name set ipauth anyothernw authentication_level POP → List POP → POP name → IP Auth tab → Create → Any Other Network check box and type authentication level → Create pop modify pop_name set ipauth anyothernw forbidden POP → List POP → POP name → IP Auth tab → Create → Any Other Network and Forbidden check boxes → Create pop modify pop_name set ipauth remove network netmask POP → List POP → POP name → IP Auth tab → IP authorization entries → Delete pop modify pop_name set qop {none | integrity | privacy} POP → List POP → POP name → appropriate quality of protection → Apply pop modify pop_name set tod-access {anyday | weekday | day_list}:{anytime | time_spec-time_spec}[:utc | local] POP → List POP → POP name → define time of day access → Apply pop modify pop_name set warning {yes | no} POP → List POP → POP name → or clear Warn Only On Policy Violation check box → Apply pop show pop_name POP → List POP → POP name pop show pop_name attribute POP → List POP → POP name → Extended Attributes tab quit Not supported rsrc create resource_name [-desc description] GSO Resource → Create GSO → complete the form → Create rsrc delete resource_name GSO Resource → List GSO → resources → Delete rsrc list GSO Resource → List GSO rsrc show resource_name GSO Resource → List GSO → resource rsrccred create resource_name rsrcuser resource_userid rsrcpwd resource_pwd rsrctype {web | group} user user_name User → Search Users → Search → user name → GSO Credentials tab → Create → complete the form → Create rsrccred create resource_group_name rsrcuser resource_userid rsrcpwd resource_pwd rsrctype {web | group} user user_name User → Search Groups → Search → user name → GSO Credentials tab → Create → complete the form → Create rsrccred delete resource_name rsrctype {web | group} user user_name User → Search Users → Search → user name → GSO Credentials tab → credentials → Delete rsrccred delete resource_group_name rsrctype {web | group} user user_name User → Search Groups → Search → user name → GSO Credentials tab → credentials → Delete rsrccred list user user_name User → Search Users → Search → user name → GSO Credentials tab rsrccred modify resource_name rsrctype {web | group}[-rsrcuser resource_userid] [-rsrcpwd resource_pwd] user user_name User → Search Users → Search → user name → GSO Credentials tab → Create → modify form → Create rsrccred modify resource_group_name rsrctype {web | group}[-rsrcuser resource_userid] [-rsrcpwd resource_pwd] user user_name User → Search Groups → Search → user name → GSO Credentials tab → Create → modify form → Create rsrccred show resource_name rsrctype {web | group} user user_name User → Search Users → Search → user name → GSO Credentials tab rsrccred show resource_group_name rsrctype {web | group} user user_name User → Search Groups → Search → user name → GSO Credentials tab rsrcgroup create resource_group_name [-desc description] GSO Resource → Create GSO Group → complete the form → Create rsrcgroup delete resource_group_name GSO Resource → List GSO Groups → resource groups → Delete rsrcgroup list GSO Resource → List GSO Groups rsrcgroup modify resource_group_name add rsrcname resource_name GSO Resource → List GSO Groups → resource group → members → Add rsrcgroup modify resource_group_name remove rsrcname resource_name GSO Resource → List GSO Groups → resource group → members → Remove rsrcgroup show resource_group_name GSO Resource → List GSO Groups → resource group server list Not supported server listtasks server_name Not supported server replicate server_name Not supported server show server_name Not supported server task server_name {help | stats | trace} Not supported server task server_name server_task Not supported For information about the WebSEAL server tasks and junction points, see the IBM Security Verify Access for Web: WebSEAL Administration Guide.
user create [-gsouser] [-no-password-policy] user_name dn cn sn password [group1 [group2 ...]] User → Create User → complete the form → Create user delete [-registry] user_name User → Search Users → type pattern and maximum results → Search → select user names → Delete user import [-gsouser] user_name dn [group_name] User → Import User → complete the form → Import user list pattern max_return User → Search Users → type pattern and maximum results → Search user list-dn pattern max_return Not supported user modify user_name account-valid {yes | no} User → Search Users → type pattern and maximum results → Search → click user name → or clear check box → Apply user modify user_name password password User → Search Users → type pattern and maximum results → Search → click user name → modify password→ Apply user modify user_name password-valid {yes | no} User → Search Users → type pattern and maximum results → Search → click user name → or clear check box → Apply user show user_name User → Search Users → type pattern and maximum results → Search → click user name user show-dn dn Not supported user show-groups user_name User → Search Users → type pattern and maximum results → Search → click user name → Groups tab
Parent topic: Verify Access Platform and Supporting Components administration