pdadmin to Web Portal Manager equivalents

This appendix shows the mapping of the administration pdadmin commands to Web Portal Manager.

Information about the pdadmin utility can be found in the IBM Security Verify Access for Web: Command Reference.

pdadmin utility Web Portal Manager
acl attach object_name acl_name ACL → List ACL → ACL name → Attach tab → Attach → type protected object path → Attach
acl create acl_name ACL → Create ACL → complete the form → Create
acl delete acl_name ACL → List ACL → ACL names → Delete
acl detach object_name ACL → List ACL → ACL name → Attach tab → protected object → Detach
acl find acl_name ACL → List ACL → ACL name → Attach tab
acl list ACL → List ACL
acl list acl_name attribute ACL → List ACL → ACL name → Extended Attribute tab
acl modify acl_name delete attribute attribute_name ACL → List ACL → ACL name → Extended Attribute tab → attributes → Delete
acl modify acl_name delete attribute attribute_name attribute_value Not supported
acl modify acl_name description description ACL → List ACL → ACL name → modify description → Set
acl modify acl_name remove any-other ACL → List ACL → ACL name → Any-other → Delete
acl modify acl_name remove group group_name ACL → List ACL → ACL namegroup name → Delete
acl modify acl_name remove unauthenticated ACL → List ACL → ACL name → Unauthenticated → Delete
acl modify acl_name remove user user_name ACL → List ACL → ACL name → user name → Delete
acl modify acl_name set any-other permissions ACL → List ACL → ACL name → Any-other → Create → select permissions → Apply
acl modify acl_name set attribute attribute_name attribute_value ACL → List ACL → ACL name → Extended Attribute tab → Create → complete the form → Apply
acl modify acl_name set group group_name permissions ACL → List ACL → ACL name → Create → select Group → specify group name → permissions → Apply
acl modify acl_name set unauthenticated permissions ACL → List ACL → ACL name → Create → select Unauthenticated → permissions → Apply
acl modify acl_name set user user_name permissions ACL → List ACL → ACL name → Create → select User → specify user name → permissions → Apply
acl show acl_name ACL → List ACL → ACL name
acl show acl_name attribute attribute_name ACL → List ACL → ACL name → Extended Attribute tab
action create name description action_type ACL → List Action Groups → primary action group → Create → complete the form → Create
action create name description action_type action_group_name ACL → List Action Groups → action group → Create → complete the form → Create
action delete name ACL → List Action Groups → primary action group → actions → Delete
action delete name action_group_name ACL → List Action Groups → action group → actions → Delete
action group create action_group_name ACL → Create Action Group → type group name → Create
action group delete action_group_name ACL → List Action Groups → action groups → Delete
action group list ACL → List Action Groups
action list ACL → List Action Groups → primary action group
action list action_group_name ACL → List Action Groups → action group
admin show configuration Not supported
authzrule attach object_name ruleid AuthzRule → List AuthzRule → authorization rule name → Attach tab → Attach → type protected object path → Attach
authzrule create ruleid { ruletext}[-desc description] [-failreason failreason] AuthzRule → Create AuthzRule → complete the form → Create
authzrule delete ruleid AuthzRule → List AuthzRule → authorization rule name → Delete
authzrule detach object_name AuthzRule → List AuthzRule → authorization rule name → Attach tab → object names → Detach
authzrule find ruleid AuthzRule → List AuthzRule → authorization rule name → Attach tab
authzrule list AuthzRule → List AuthzRule
authzrule modify ruleid { ruletext rule_text | description description | failreason failreason AuthzRule → List AuthzRule → authorization rule name → modify fields → Apply
authzrule show ruleid AuthzRule → List AuthzRule → authorization rule name
config modify svrpassword config_file password Not supported
config modify keyvalue set [-obfuscate] config_file stanza key value Not supported
config modify keyvalue append [-obfuscate] config_file stanza key value Not supported
config modify keyvalue remove config_file stanza key value Not supported
config modify keyvalue remove config_file stanza key Not supported
config show config_file stanza key Not supported
context show Not supported
domain create domain domain_admin_id domain_admin_password [-desc description] Secure Domain → Create Secure Domain → complete the form → Create
domain delete domain [-registry] Secure Domain → List Secure Domain → secure domain names → Delete
domain list Secure Domain → List Secure Domain
domain modify domain description description Secure Domain → List Secure Domain → secure domain name → modify description → Apply
domain show domain Secure Domain → List Secure Domain → secure domain name
errtext error_number Not supported
exit Not supported
group create group_name dn cn [group_container] Group → Create Group → complete the form → Create
group delete [-registry] group_name Group → Search Groups → type pattern and maximum results → Search → select group names → Delete
group import group_name dn [group_container] Group → Import Group → complete the form → Import
group list pattern max_return Group → Search Groups → type pattern and maximum results → Search
group list-dn pattern max_return Not supported
group modify group_name add user

group modify group_name add (user_1 user_2 [... user_n])

Group → Search Groups → type pattern and maximum results → Search → click group name → Members tab → users → Add
group modify group_name description description Group → Search Groups → type pattern and maximum results → Search → click group name → type description → Apply
group modify group_name remove user

group modify group_name remove (user_1 user_2 [... user_n])

Group → Search Groups → type pattern and maximum results → Search → click group name → Members tab → user names → Remove
group show group_name Group → Search Groups → type pattern and maximum results → Search → click group name
group show-dn dn Not supported
group show-members group_name Group → Search Groups → type pattern and maximum results → Search → click group name → Members tab
help {topic | command} Not supported
login -a admin_id -p password [-d domain | -m] Not supported
login -l Not supported
logout Not supported
object access object_name permissions Not supported
object create object_name description type ispolicyattachable {yes | no} Object Space → Create Object → complete the form → Create

The type field is not supported.

We can the Can Policy be attached to this object check box on the Protected Object Properties page.

object delete object_name Object Space → Browse Object Space → expand and select object name → Delete
object exists object_name Not supported
object list Object Space → Browse Object Space → expand
object list object_name Object Space → Browse Object Space → expand and select object name
object list object_name attribute Object Space → Browse Object Space → expand and select object name → Extended Attributes tab
object listandshow object_name Not supported
object modify object_name delete attribute_name Object Space → Browse Object Space → expand and select object name → Extended Attributes tab → attribute → Delete
object modify object_name delete attribute_name attribute_value Not supported
object modify object_name set attribute attribute_name attribute_value Object Space → Browse Object Space → expand and select object name → Extended Attributes tab → Create → complete the form → Apply
object modify object_name set description description Object Space → Browse Object Space → expand and select object name → modify description → Apply
object modify object_name isPolicyAttachable {yes | no} Object Space → Browse Object Space → expand and select object name → or clear check box→ Apply
object modify object_name type type Not supported
object show object_name Object Space → Browse Object Space → expand and select object name
object show object_name attribute attribute_name Object Space → Browse Object Space → expand and select object name → Extended Attributes tab
objectspace create objectspace_name Object Space → Create Object Space → complete the form → Create
objectspace delete objectspace_name Object Space → Browse Object Space → object space name → Delete
objectspace list Object Space → Browse Object Space
policy get policy_name User → Show Global User Policy
policy get policy_name -user user_name User → Search Users → type pattern and maximum results → Search → click user name → Policy tab
policy set policy_name policy_value User → Show Global User Policy → modify value → Apply
policy set policy_name policy_value -user user_name User → Search Users → type pattern and maximum results → Search → click user name → Policy tab → modify value → Apply
pop attach object_name pop_name POP → List POP → POP name → Attach tab → Attach → type protected object path → Attach
pop create pop_name POP → Create POP → complete the form → Create
pop delete pop_name POP → List POP → POP names → Delete
pop detach object_name POP → List POP → POP name → Attach tab → object → Detach
pop find pop_name POP → List POP → POP name → Attach tab
pop list POP → List POP
pop list pop_name POP → List POP → POP name
pop list pop_name attribute POP → List POP → POP name → Extended Attributes tab
pop modify pop_name delete attribute attribute_name POP → List POP → POP name → Extended Attributes tab → attributes → Delete
pop modify pop_name delete attribute attribute_name attribute_value Not supported
pop modify pop_name set attribute attribute_name attribute_value POP → List POP → POP name → Extended Attributes tab → Create → complete the form → Apply
pop modify pop_name set audit-level {all | none | audit_level_list} POP → List POP → POP name → or clear appropriate check boxes → Apply
pop modify pop_name set description description POP → List POP → POP name → modify description → Apply
pop modify pop_name set ipauth add network netmask authentication_level POP → List POP → POP name → IP Auth tab → Create → type the network, net mask, and authentication level → Apply
pop modify pop_name set ipauth add network netmask forbidden POP → List POP → POP name → IP Auth tab → Create → type network and net mask and Forbidden check box → Apply
pop modify pop_name set ipauth anyothernw authentication_level POP → List POP → POP name → IP Auth tab → Create → Any Other Network check box and type authentication level → Create
pop modify pop_name set ipauth anyothernw forbidden POP → List POP → POP name → IP Auth tab → Create → Any Other Network and Forbidden check boxes → Create
pop modify pop_name set ipauth remove network netmask POP → List POP → POP name → IP Auth tab → IP authorization entries → Delete
pop modify pop_name set qop {none | integrity | privacy} POP → List POP → POP name → appropriate quality of protection → Apply
pop modify pop_name set tod-access {anyday | weekday | day_list}:{anytime | time_spec-time_spec}[:utc | local] POP → List POP → POP name → define time of day access → Apply
pop modify pop_name set warning {yes | no} POP → List POP → POP name → or clear Warn Only On Policy Violation check box → Apply
pop show pop_name POP → List POP → POP name
pop show pop_name attribute POP → List POP → POP name → Extended Attributes tab
quit Not supported
rsrc create resource_name [-desc description] GSO Resource → Create GSO → complete the form → Create
rsrc delete resource_name GSO Resource → List GSO → resources → Delete
rsrc list GSO Resource → List GSO
rsrc show resource_name GSO Resource → List GSO → resource
rsrccred create resource_name rsrcuser resource_userid rsrcpwd resource_pwd rsrctype {web | group} user user_name User → Search Users → Search → user name → GSO Credentials tab → Create → complete the form → Create
rsrccred create resource_group_name rsrcuser resource_userid rsrcpwd resource_pwd rsrctype {web | group} user user_name User → Search Groups → Search → user name → GSO Credentials tab → Create → complete the form → Create
rsrccred delete resource_name rsrctype {web | group} user user_name User → Search Users → Search → user name → GSO Credentials tab → credentials → Delete
rsrccred delete resource_group_name rsrctype {web | group} user user_name User → Search Groups → Search → user name → GSO Credentials tab → credentials → Delete
rsrccred list user user_name User → Search Users → Search → user name → GSO Credentials tab
rsrccred modify resource_name rsrctype {web | group}[-rsrcuser resource_userid] [-rsrcpwd resource_pwd] user user_name User → Search Users → Search → user name → GSO Credentials tab → Create → modify form → Create
rsrccred modify resource_group_name rsrctype {web | group}[-rsrcuser resource_userid] [-rsrcpwd resource_pwd] user user_name User → Search Groups → Search → user name → GSO Credentials tab → Create → modify form → Create
rsrccred show resource_name rsrctype {web | group} user user_name User → Search Users → Search → user name → GSO Credentials tab
rsrccred show resource_group_name rsrctype {web | group} user user_name User → Search Groups → Search → user name → GSO Credentials tab
rsrcgroup create resource_group_name [-desc description] GSO Resource → Create GSO Group → complete the form → Create
rsrcgroup delete resource_group_name GSO Resource → List GSO Groups → resource groups → Delete
rsrcgroup list GSO Resource → List GSO Groups
rsrcgroup modify resource_group_name add rsrcname resource_name GSO Resource → List GSO Groups → resource group → members → Add
rsrcgroup modify resource_group_name remove rsrcname resource_name GSO Resource → List GSO Groups → resource group → members → Remove
rsrcgroup show resource_group_name GSO Resource → List GSO Groups → resource group
server list Not supported
server listtasks server_name Not supported
server replicate server_name Not supported
server show server_name Not supported
server task server_name {help | stats | trace} Not supported
server task server_name server_task Not supported

For information about the WebSEAL server tasks and junction points, see the IBM Security Verify Access for Web: WebSEAL Administration Guide.

user create [-gsouser] [-no-password-policy] user_name dn cn sn password [group1 [group2 ...]] User → Create User → complete the form → Create
user delete [-registry] user_name User → Search Users → type pattern and maximum results → Search → select user names → Delete
user import [-gsouser] user_name dn [group_name] User → Import User → complete the form → Import
user list pattern max_return User → Search Users → type pattern and maximum results → Search
user list-dn pattern max_return Not supported
user modify user_name account-valid {yes | no} User → Search Users → type pattern and maximum results → Search → click user name → or clear check box → Apply
user modify user_name password password User → Search Users → type pattern and maximum results → Search → click user name → modify password→ Apply
user modify user_name password-valid {yes | no} User → Search Users → type pattern and maximum results → Search → click user name → or clear check box → Apply
user show user_name User → Search Users → type pattern and maximum results → Search → click user name
user show-dn dn Not supported
user show-groups user_name User → Search Users → type pattern and maximum results → Search → click user name → Groups tab

Parent topic: Verify Access Platform and Supporting Components administration