Administer protected object policies

Use the administration API to create, modify, examine, and delete Security Verify Access protected object policies (POPs).

We can also use the Administration API to attach or detach POPs from protected objects.

We can use POPs to impose more conditions on operations that are included in the access control list (ACL) policy. These additional conditions are enforced regardless of the user or group identities specified in the ACL entries.

See the following examples of the conditions:

Understand the ISAM POP concepts before we use the administration API to administer POPs.

Parent topic: Administration Java Developer Reference