Administer protected object policies
Use the administration API to create, modify, examine, and delete Security Verify Access protected object policies (POPs).
We can also use the Administration API to attach or detach POPs from protected objects.
We can use POPs to impose more conditions on operations that are included in the access control list (ACL) policy. These additional conditions are enforced regardless of the user or group identities specified in the ACL entries.
See the following examples of the conditions:
- Specify the quality of protection
- Writing a report record to the auditing service
- Requiring an authentication strength level
- Restricting access to a specific time period
- Enable the warning mode, which allows an administrator to validate security policy
Understand the ISAM POP concepts before we use the administration API to administer POPs.
- Administer protected object policy objects
- Administer protected object policy settings
We can use the administration API to set, modify, or remove attributes in a POP.- Administer protected object policy extended attributes
Parent topic: Administration Java Developer Reference